An Immuno-based Autonomic Computing System for IaaS Security in Public Clouds

Abdelwahhab Satta, Sihem Mostefai, Imane Boussebough


Cloud Computing is the new way for computing infrastructures exploitation. These infrastructures, offered as a service by the cloud IaaS service model are being very appealing to the new industry and business. However, surveys reveal that security issues are still the major barrier facing the migration from Infrastructure in premise to public clouds. On the other hand, Autonomic Computing Systems have been used so far to enable the cloud, and in this work, we will investigate these systems capabilities to enable security management for IaaS in public clouds.


  1. Ahmad, I., Namal, S., Ylianttila, M. and Gurtov, A., 2015. Security in software defined networks: A survey. IEEE Communications Surveys & Tutorials, 17(4), pp.2317- 2346.
  2. Aickelin, U., Dasgupta, D. and Gu, F., 2014. Artificial immune systems. In Search Methodologies (pp. 187- 211). Springer US.
  3. Cayzer, U.A.S., 2002. The danger theory and its application to artificial immune system. In Proceedings of the 1st International Conference on Artificial Immune Systems (pp. 141-148).
  4. Dasgupta, D., 1993. An overview of artificial immune systems and their applications. In Artificial immune systems and their applications (pp. 3-21). Springer Berlin Heidelberg.
  5. Dasgupta, D., 2007. An immuno-inspired autonomic system for cyber defense. Information security technical report, 12(4), pp.235-241.
  6. Dasgupta, D., Ji, Z. and Gonzalez, F., 2003, December. Artificial immune system (AIS) research in the last five years. In Evolutionary Computation, 2003. CEC'03. The 2003 Congress on (Vol. 1, pp. 123-130). IEEE.
  7. Friedman-Hill, E., 2003. JESS in Action (Vol. 46). Greenwich, CT: Manning.
  8. Gonzales, D., Kaplan, J., Saltzman, E., Winkelman, Z. and Woods, D., 2015. Cloud-trust-a security assessment model for infrastructure as a service (IaaS) clouds. IEEE Transactions on Cloud Computing.
  9. Harmer, P.K., Williams, P.D., Gunsch, G.H. and Lamont, G.B., 2002. An artificial immune system architecture for computer security applications. IEEE transactions on evolutionary computation, 6(3), pp.252-280.
  10. Hill, R., Hirsch, L., Lake, P. and Moshiri, S., 2012. Guide to cloud computing: principles and practice. Springer Science & Business Media.
  11. Horn, P., 2001. Autonomic computing: IBM\'s Perspective on the State of Information Technology.
  12. Huang, W., Ganjali, A., Kim, B.H., Oh, S. and Lie, D., 2015. The state of public infrastructure-as-a-service cloud security. ACM Computing Surveys (CSUR), 47(4), p.68.
  13. Huebscher, M.C. and McCann, J.A., 2008. A survey of autonomic computing-degrees, models, and applications. ACM Computing Surveys (CSUR), 40(3), p.7.
  14. Kavis, M.J., 2014. Architecting the cloud: Design decisions for cloud computing service models (SaaS, PaaS, AND IaaS). John Wiley & Sons.
  15. Kephart, J.O. and Chess, D.M., 2003. The vision of autonomic computing. Computer, 36(1), pp.41-50.
  16. Krutz, R.L. and Vines, R.D., 2010. Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing.
  17. Liu, D., 2014. Securing Outsourced Databases in the Cloud. In Security, Privacy and Trust in Cloud Systems (pp. 259-282). Springer Berlin Heidelberg.
  18. Mather, T., Kumaraswamy, S. and Latif, S., Cloud Security and Privacy (2009).
  19. Mell, P. and Grance, T., 2011. The NIST definition of cloud computing.
  20. Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A. and Rajarajan, M., 2013. A survey of intrusion detection techniques in the cloud. Journal of Network and Computer Applications, 36(1), pp.42-57.
  21. Rufus, R., Nick, W., Shelton, J. and Esterline, A., 2016. An Autonomic Computing System based on a Rule-based Policy Engine and Artificial Immune Systems.
  22. Subashini, S. and Kavitha, V., 2011. A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), pp.1-11.
  23. Vaquero, L.M., Rodero-Merino, L. and MorĂ¡n, D., 2011. Locking the sky: a survey on IaaS cloud security. Computing, 91(1), pp.93-118.
  24. Xing, T., Huang, D., Xu, L., Chung, C.J. and Khatkar, P., 2013, March. Snortflow: A openflow-based intrusion prevention system in cloud environment. In Research and Educational Experiment Workshop (GREE), 2013 Second GENI (pp. 89-92). IEEE.
  25. Yeluri, R. and Castro-Leon, E., 2014. Building the Infrastructure for Cloud Security: A Solutions View. Apress.
  26. Zhang, T., Zhang, Y. and Lee, R.B., 2016, September. Cloudradar: A real-time side-channel attack detection system in clouds. In International Symposium on Research in Attacks, Intrusions, and Defenses (pp. 118- 140). Springer International Publishing.
  27. Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues. Future Generation computer systems, 28(3), pp.583-592.

Paper Citation

in Harvard Style

Satta A., Mostefai S. and Boussebough I. (2017). An Immuno-based Autonomic Computing System for IaaS Security in Public Clouds . In Proceedings of the 7th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-758-243-1, pages 574-581. DOI: 10.5220/0006352405740581

in Bibtex Style

author={Abdelwahhab Satta and Sihem Mostefai and Imane Boussebough},
title={An Immuno-based Autonomic Computing System for IaaS Security in Public Clouds},
booktitle={Proceedings of the 7th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},

in EndNote Style

JO - Proceedings of the 7th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - An Immuno-based Autonomic Computing System for IaaS Security in Public Clouds
SN - 978-989-758-243-1
AU - Satta A.
AU - Mostefai S.
AU - Boussebough I.
PY - 2017
SP - 574
EP - 581
DO - 10.5220/0006352405740581