Abstract—Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing. Keywords—Cloud computing, intrusion detection system, privacy, trust. I. INTRODUCTION HE emergence and use of new technology solutions such as cloud computing is due to the rapid evolution of business processes, the need for data storage, sharing services and to disregard/substitution of machinery and work/ calculation tools. The cloud allows storing information and focuses on data independently their support [1]. The Internet allows the cloud to provide services at any time and in anywhere, which allows to have ubiquitous services [2], [3]. The advantages of cloud computing; namely: The supply of infrastructure services, data and insurance services availability, rapid scalability and accessibility [4], [5]; exposing the network to malicious activities. To stop malicious activities, it is necessary to implement IDS [6], [7]. IDSs detect and respond (react) to attacks occurring in the network by implementing new security policies [8]. To solve the problems in intrusion networks, IDSs have been widely applied [1]. This paper includes and focuses on the ubiquitous service aspect of cloud computing [9]. In this article, we present an IDS that aims to overcome the problems of network intrusions in cloud computing. The remainder of this paper is divided into five sections. Section II presents the paradigm of cloud computing and how it relates F. L. Sellami is with Department of Computer Science, A/Mira University of Bejaiaa, Algeria (corresponding author to provide phone: 00213657348254; e-mail: slynda1@yahoo.fr). S. I. Idoughi is with Applied Mathematics Laboratory, A/Mira University of Bejaia, Algeria. T. PF. Tiako is with CITR,Langston University & CITDR, Tiako University, Oklahoma, USA. to related work on intrusion detection in cloud computing, is introduced. Section III details our proposal, while Section IV exposes advantages and privileges of the proposed solution. Section V describes a test of our approach in virtual environment and Section VI presents the conclusion and directions for further work. II. BACKGROUND AND RELATED WORK A. Cloud Computing In [10], [11], National Institute of Standards and Technology (NIST) has given the definition of Cloud Computing as: Cloud computing is a model for enabling ubiquitous, provides on-line computer services or applications, accessible to anywhere, anytime, and by any device (smartphone, desktop, laptop and tablet). Cloud computing allows sharing an infrastructure, an application solution or a platform to any user on-demand it via a simple self-service website (also called a portal) [12]. Among the services provided by cloud computing, we have infrastructure, storage, development platforms, and web applications through the cloud (Internet). Cloud computing is composed of the special characteristics that are the distributed and open structure of cloud computing and services become, shared resources, node mobility, services availability assurance, rapid accessibility, scalability, and availability of service and information, etc. [11], [13]. B. Intrusion Detection System (IDS) The IDS are implemented in order to detect any attempted violation of the security mechanisms, this is permanent or regular monitoring systems. Intrusion detection is the discovery or identification of the use of a computer system for purposes other than those intended [14]. They identify abuse of computer systems, by unauthorized users, detect attack on computing resources, and also deal with misuse of the Internet system [15], [16]. Intrusion detection is to scrutinize network traffic, collect all events, analyze them and generate alarms in case of identification of malicious attempts. Optionally, IDS can react against these malicious behaviors and take measures against [17]. With the goal of classifying IDS, two approaches have been proposed; the behavioral approach (anomaly detection) [18] and the scenario approach (misuse detection or knowledge based detection) [19], [20]. The first is based on a model describing the normal exploitation of the system (normal behavior) by classifying as intrusive any significant deviation from this model [21]. L. Sellami, D. Idoughi, P. F. Tiako Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures T World Academy of Science, Engineering and Technology International Journal of Computer and Information Engineering Vol:11, No:4, 2017 434 International Scholarly and Scientific Research & Innovation 11(4) 2017 scholar.waset.org/1307-6892/10006735 International Science Index, Computer and Information Engineering Vol:11, No:4, 2017 waset.org/Publication/10006735