In computer networks attacks plays a vital role. It also degrades a cloud services nowadays. The attacks
reduce the quality of services in the computer networks as well as cloud platforms. The attack that makes
services engaged to the intended users. For effective use of cloud computing we need to reduce the attacks
vulnerabilities and improve the security. This study discuss about the different types of attacks that affects
the cloud environments and also possible mitigation techniques to reduce the attacks. Issue mitigation
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
Cloud computing is an anthology in which one or more computers are connected in a network. Cloud computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources. The security is one the major problem in cloud computing. Hence security is a major issue in cloud computing. Providing security is a major requirement of cloud computing. The study enclose all the security issues and attack issues in cloud computing.
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
Cloud computing is an anthology in which one or more computers are connected in a network. Cloud
computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an
on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources.
The security is one the major problem in cloud computing. Hence security is a major issue in cloud
computing. Providing security is a major requirement of cloud computing. The study enclose all the
security issues and attack issues in cloud computing.
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environmentsmlaij
Incredible and amazing growths in the meadow of extranet, internet, intranet and its users have developed an innovative period of great global competition and contention. Denial of service attack by several computers is accomplished of distressing the services of competitor servers. The attack can be done for various reasons. So it is a key threat for cloud environment. Distributed-Denial of Service (DDoS) is a key intimidation to network and cloud computing security. Cloud computing Network is a group of nodes that interrelate with each other for switch over the information. So security is the major issue. There are several security attacks in cloud computing. One of the major intimidations to internet examine is DDoS attack. It is a malevolent effort to suspending or suspends services to destination node. DDoS or DoS is an effort to create network resource or the machine is busy to its intentional user. Numerous thoughts are developed for avoid the DDoS or DoS. DDoS occur in two different behaviours they may happen obviously or it may due to some attackers.
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
Abstract Cloud computing is a new computing paradigm that brought a lot of advantages especially in ubiquitous services where everybody can access computer services through internet With cloud computing, there is no need of physical hardware or servers that will support the company’s computer system, internet services and networks. Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to consumers. Consumers can typically requests cloud services via a web browser or web service. Using cloud computing, consumers can safe cost of hardware deployment, software licenses and system maintenance. On the other hand, it also has a few security issues. This paper introduces cloud security problems. The data in cloud need to secure from all types of security attacks. Another core services provided by cloud computing is data storages. Keywords— Cloud Computing, Security and Countermeasures, Consumers, XML Signature Element Wrapping, Browser Security, Cyber Laws, policy, Data Privacy.
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
Abstract Cloud computing is a new computing paradigm that brought a lot of advantages especially in ubiquitous services where everybody can access computer services through internet With cloud computing, there is no need of physical hardware or servers that will support the company’s computer system, internet services and networks. Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to consumers. Consumers can typically requests cloud services via a web browser or web service. Using cloud computing, consumers can safe cost of hardware deployment, software licenses and system maintenance. On the other hand, it also has a few security issues. This paper introduces cloud security problems. The data in cloud need to secure from all types of security attacks. Another core services provided by cloud computing is data storages. Keywords— Cloud Computing, Security and Countermeasures, Consumers, XML Signature Element Wrapping, Browser Security, Cyber Laws, policy, Data Privacy.
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
Cloud computing has recently emerged as new paradigm in field of technology. Cloud computing is attractive to business owners and IT people. It is still in its infancy and many issues are to be addressed. This paper covers the cloud computing basics and discusses load balancing in cloud computing environment as the one of the major challenges of cloud computing. It also discusses the various existing load balancing algorithms.
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
Cloud computing is an anthology in which one or more computers are connected in a network. Cloud computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources. The security is one the major problem in cloud computing. Hence security is a major issue in cloud computing. Providing security is a major requirement of cloud computing. The study enclose all the security issues and attack issues in cloud computing.
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
Cloud computing is an anthology in which one or more computers are connected in a network. Cloud
computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an
on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources.
The security is one the major problem in cloud computing. Hence security is a major issue in cloud
computing. Providing security is a major requirement of cloud computing. The study enclose all the
security issues and attack issues in cloud computing.
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environmentsmlaij
Incredible and amazing growths in the meadow of extranet, internet, intranet and its users have developed an innovative period of great global competition and contention. Denial of service attack by several computers is accomplished of distressing the services of competitor servers. The attack can be done for various reasons. So it is a key threat for cloud environment. Distributed-Denial of Service (DDoS) is a key intimidation to network and cloud computing security. Cloud computing Network is a group of nodes that interrelate with each other for switch over the information. So security is the major issue. There are several security attacks in cloud computing. One of the major intimidations to internet examine is DDoS attack. It is a malevolent effort to suspending or suspends services to destination node. DDoS or DoS is an effort to create network resource or the machine is busy to its intentional user. Numerous thoughts are developed for avoid the DDoS or DoS. DDoS occur in two different behaviours they may happen obviously or it may due to some attackers.
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
Abstract Cloud computing is a new computing paradigm that brought a lot of advantages especially in ubiquitous services where everybody can access computer services through internet With cloud computing, there is no need of physical hardware or servers that will support the company’s computer system, internet services and networks. Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to consumers. Consumers can typically requests cloud services via a web browser or web service. Using cloud computing, consumers can safe cost of hardware deployment, software licenses and system maintenance. On the other hand, it also has a few security issues. This paper introduces cloud security problems. The data in cloud need to secure from all types of security attacks. Another core services provided by cloud computing is data storages. Keywords— Cloud Computing, Security and Countermeasures, Consumers, XML Signature Element Wrapping, Browser Security, Cyber Laws, policy, Data Privacy.
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
Abstract Cloud computing is a new computing paradigm that brought a lot of advantages especially in ubiquitous services where everybody can access computer services through internet With cloud computing, there is no need of physical hardware or servers that will support the company’s computer system, internet services and networks. Cloud computing technology is a new concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to consumers. Consumers can typically requests cloud services via a web browser or web service. Using cloud computing, consumers can safe cost of hardware deployment, software licenses and system maintenance. On the other hand, it also has a few security issues. This paper introduces cloud security problems. The data in cloud need to secure from all types of security attacks. Another core services provided by cloud computing is data storages. Keywords— Cloud Computing, Security and Countermeasures, Consumers, XML Signature Element Wrapping, Browser Security, Cyber Laws, policy, Data Privacy.
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
Cloud computing has recently emerged as new paradigm in field of technology. Cloud computing is attractive to business owners and IT people. It is still in its infancy and many issues are to be addressed. This paper covers the cloud computing basics and discusses load balancing in cloud computing environment as the one of the major challenges of cloud computing. It also discusses the various existing load balancing algorithms.
Virtualized Web Desktop Towards A Faster Web Cloud Operating Systemijbuiiir1
All Operating Systems provide interface to users and inherent applications running on a system. Today with the advancement in the field of cloud computing, its services are in high demand. The Cloud is becoming an active paradigm of computation through services. However, such services do not prove to be very efficient in slow networks. Thus, the paper intends to achieve faster response of services provided by the Cloud infrastructure through the use of a new mechanism of servicing client requests. The focus of the paper is to realize most operating system functions at the client side over the Cloud infrastructure using the virtualization technique. It also proposes to overcome the issues present in the current infrastructure service and resulting in a faster service
A brief review: security issues in cloud computing and their solutionsTELKOMNIKA JOURNAL
Cloud computing is an Internet-based, emerging technology, tends to be prevailing in our environment especially in the field of computer sciences and information technologies which require network computing on large scale. Cloud Computing is a shared pool of services which is gaining popularity due to its cost, effectiveness, avilability and great production. Along with its numerous benefits, cloud computing brings much more challenging situation regarding data privacy, data protection, authenticated access, Intellectual property rights etc. Due to these issues, adoption of cloud computing is becoming difficult in today’s world. In this review paper, various security issues regarding data privacy and reliability, key factors which are affecting cloud computing, have been addressed and also suggestions on particular areas have been discussed.
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
Cloud computing is a computing technology aiming to share storage, computation, and services transparently
among a massive users. Current cloud computing systems pose serious limitation to protecting the confidentiality
of user data. Since the data share and stored is presented in unencrypted forms to remote machines owned and
operated by third party service providers despite it sensitivity (example contact address, mails), the risks of
disclosing user confidential data by service providers may be quite high and the risk of attacking cloud storage
by third party is also increasing. The purpose of this study is to review researches done on this technology,
identify the security risk and explore some techniques for protecting users‟ data from attackers in the cloud.
Load Balancing In Cloud Computing:A ReviewIOSR Journals
Abstract: As the IT industry is growing day by day, the need of computing and storage is increasing
rapidly. The amount of data exchanged over the network is constantly increasing. Thus the process of this
increasing mass of data requires more computer equipment to meet the various needs of the organizations.
To better capitalize their investment, the over-equipped organizations open their infrastructures to others by
exploiting the Internet and other important technologies such as virtualization by creating a new computing
model: the cloud computing. Cloud computing is one of the significant milestones in recent times in the
history of computers. The basic concept of cloud computing is to provide a platform for sharing of resources
which includes software and infrastructure with the help of virtualization. This paper presents a brief review
of cloud computing. The main emphasize of this paper is on the load balancing technique in cloud
computing.
Keywords: Cloud Computing, Load Balancing, Dynamic Load Balancing, Virtualization, Data Center.
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
Ant colony Optimization: A Solution of Load balancing in Cloud dannyijwest
As the cloud computing is a new style of computing over internet. It has many advantages along with some
crucial issues to be resolved in order to improve reliability of cloud environment. These issues are related
with the load management, fault tolerance and different security issues in cloud environment. In this paper
the main concern is load balancing in cloud computing. The load can be CPU load, memory capacity,
delay or network load. Load balancing is the process of distributing the load among various nodes of a
distributed system to improve both resource utilization and job response time while also avoiding a
situation where some of the nodes are heavily loaded while other nodes are idle or doing very little work.
Load balancing ensures that all the processor in the system or every node in the network does
approximately the equal amount of work at any instant of time. Many methods to resolve this problem has
been came into existence like Particle Swarm Optimization, hash method, genetic algorithms and several
scheduling based algorithms are there. In this paper we are proposing a method based on Ant Colony
optimization to resolve the problem of load balancing in cloud environment.
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
Cloud Computing has received much attention by the IT-Business world. As compared to the common
computing platforms, cloud computing is more flexible in supporting real-time computation and is
considered a more powerful model for hosting and delivering services over the Internet. However, since
cloud computing is still at its infancy, it faces many challenges that stand against its growth and spread.
This article discusses some challenges facing cloud computing growth and conducts a comparison study
between Amazon EC2 and Windows Azure in dealing with such challenges. It concludes that Amazon EC2
generally offers better solutions than Windows Azure. Nevertheless, the selection between them depends on
the needs of customers.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.
Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with. The paper aims to provide a means of understanding the model and exploring options available for complementing your technology and infrastructure needs.
Establishing applications on on-demand infrastructures rather of building applica-tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the cloud, initiatives can gain fast access to business applications or infrastructure resources with decreased Capital Expenditure (CAPEX). The more and more information is placed into the cloud by someone and initiatives, security issues begins to develop and raised. This paper discusses the different security issues that rise up about how secure the mo-bile cloud computing environment.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
Cloud computing field has reached to the highest level of technical heights. The security problems of cloud computing hinders
its development. It is totally internet based technology where the resources and information shared on a distributed network. So
it is important for both provider as well as consumer to provide the security and trust to share the data for developing clou d
computing applications. Because now organizations are now moving fast towards the cloud. So there is the possibility of threats
that will harm the data on the cloud. In our paper we mainly focuses on security threats of cloud computing system also we
mention some solutions and countermeasures on these security problems
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of user's approach to providing feedback for smart home devices. We will conduct an online survey for a sample of three to five students selected by simple random sampling to study the user's motto for giving feedback on smart home devices and their expectations. We have observed that most users are ready to actively share their input on smart home devices to improve the product's service and quality to fulfill the user’s needs and make their lives easier.
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more
straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame
works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of
user's approach to providing feedback for smart home devices. We will conduct an online survey for a
sample of three to five students selected by simple random sampling to study the user's motto for giving
feedback on smart home devices and their expectations. We have observed that most users are ready to
actively share their input on smart home devices to improve the product's service and quality to fulfill the
user’s needs and make their lives easier.
More Related Content
Similar to SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
Virtualized Web Desktop Towards A Faster Web Cloud Operating Systemijbuiiir1
All Operating Systems provide interface to users and inherent applications running on a system. Today with the advancement in the field of cloud computing, its services are in high demand. The Cloud is becoming an active paradigm of computation through services. However, such services do not prove to be very efficient in slow networks. Thus, the paper intends to achieve faster response of services provided by the Cloud infrastructure through the use of a new mechanism of servicing client requests. The focus of the paper is to realize most operating system functions at the client side over the Cloud infrastructure using the virtualization technique. It also proposes to overcome the issues present in the current infrastructure service and resulting in a faster service
A brief review: security issues in cloud computing and their solutionsTELKOMNIKA JOURNAL
Cloud computing is an Internet-based, emerging technology, tends to be prevailing in our environment especially in the field of computer sciences and information technologies which require network computing on large scale. Cloud Computing is a shared pool of services which is gaining popularity due to its cost, effectiveness, avilability and great production. Along with its numerous benefits, cloud computing brings much more challenging situation regarding data privacy, data protection, authenticated access, Intellectual property rights etc. Due to these issues, adoption of cloud computing is becoming difficult in today’s world. In this review paper, various security issues regarding data privacy and reliability, key factors which are affecting cloud computing, have been addressed and also suggestions on particular areas have been discussed.
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
Cloud computing is a computing technology aiming to share storage, computation, and services transparently
among a massive users. Current cloud computing systems pose serious limitation to protecting the confidentiality
of user data. Since the data share and stored is presented in unencrypted forms to remote machines owned and
operated by third party service providers despite it sensitivity (example contact address, mails), the risks of
disclosing user confidential data by service providers may be quite high and the risk of attacking cloud storage
by third party is also increasing. The purpose of this study is to review researches done on this technology,
identify the security risk and explore some techniques for protecting users‟ data from attackers in the cloud.
Load Balancing In Cloud Computing:A ReviewIOSR Journals
Abstract: As the IT industry is growing day by day, the need of computing and storage is increasing
rapidly. The amount of data exchanged over the network is constantly increasing. Thus the process of this
increasing mass of data requires more computer equipment to meet the various needs of the organizations.
To better capitalize their investment, the over-equipped organizations open their infrastructures to others by
exploiting the Internet and other important technologies such as virtualization by creating a new computing
model: the cloud computing. Cloud computing is one of the significant milestones in recent times in the
history of computers. The basic concept of cloud computing is to provide a platform for sharing of resources
which includes software and infrastructure with the help of virtualization. This paper presents a brief review
of cloud computing. The main emphasize of this paper is on the load balancing technique in cloud
computing.
Keywords: Cloud Computing, Load Balancing, Dynamic Load Balancing, Virtualization, Data Center.
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
Ant colony Optimization: A Solution of Load balancing in Cloud dannyijwest
As the cloud computing is a new style of computing over internet. It has many advantages along with some
crucial issues to be resolved in order to improve reliability of cloud environment. These issues are related
with the load management, fault tolerance and different security issues in cloud environment. In this paper
the main concern is load balancing in cloud computing. The load can be CPU load, memory capacity,
delay or network load. Load balancing is the process of distributing the load among various nodes of a
distributed system to improve both resource utilization and job response time while also avoiding a
situation where some of the nodes are heavily loaded while other nodes are idle or doing very little work.
Load balancing ensures that all the processor in the system or every node in the network does
approximately the equal amount of work at any instant of time. Many methods to resolve this problem has
been came into existence like Particle Swarm Optimization, hash method, genetic algorithms and several
scheduling based algorithms are there. In this paper we are proposing a method based on Ant Colony
optimization to resolve the problem of load balancing in cloud environment.
Cloud computing challenges with emphasis on amazon ec2 and windows azureIJCNCJournal
Cloud Computing has received much attention by the IT-Business world. As compared to the common
computing platforms, cloud computing is more flexible in supporting real-time computation and is
considered a more powerful model for hosting and delivering services over the Internet. However, since
cloud computing is still at its infancy, it faces many challenges that stand against its growth and spread.
This article discusses some challenges facing cloud computing growth and conducts a comparison study
between Amazon EC2 and Windows Azure in dealing with such challenges. It concludes that Amazon EC2
generally offers better solutions than Windows Azure. Nevertheless, the selection between them depends on
the needs of customers.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on
demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection
of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious
concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the
cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to
achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that
user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based
privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request
and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing
among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority
sharing is attractive for multi-user collaborative cloud applications.
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
Cloud computing provides the facility to access shared resources and common support which contributes services on demand over the network to perform operations that meet changing business needs. A cloud storage system, consisting of a collection of storage servers, affords long-term storage services over the internet. Storing the data in a third party cloud system cause serious concern over data confidentiality, without considering the local infrastructure limitations, the cloud services allow the user to enjoy the cloud applications. As the different users may be working in the collaborative relationship, the data sharing becomes significant to achieve productive benefit during the data accessing. The existing security system only focuses on the authentication; it shows that user’s private data cannot be accessed by the fake users. To address the above cloud storage privacy issue shared authority based privacy-preserving authentication protocol is used. In the SAPA, the shared access authority is achieved by anonymous access request and privacy consideration, attribute based access control allows the user to access their own data fields. To provide the data sharing among the multiple users proxy re-encryption scheme is applied by the cloud server. The privacy-preserving data access authority sharing is attractive for multi-user collaborative cloud applications.
Cloud Computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Cloud deployed enterprise resource planning (ERP), supply chain management applications (SCM), customer relationship management (CRM) applications, medical applications and mobile applications have potential to reach millions of users. In this paper, we explore the different concepts involved in cloud computing. Leveraging our experiences on various clouds, we examine clouds from technical, and service aspects. We highlight some of the opportunities in cloud computing, underlining the importance of clouds and showing why that technology must succeed. Finally, we discuss some of the issues that this area should deal with. The paper aims to provide a means of understanding the model and exploring options available for complementing your technology and infrastructure needs.
Establishing applications on on-demand infrastructures rather of building applica-tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the cloud, initiatives can gain fast access to business applications or infrastructure resources with decreased Capital Expenditure (CAPEX). The more and more information is placed into the cloud by someone and initiatives, security issues begins to develop and raised. This paper discusses the different security issues that rise up about how secure the mo-bile cloud computing environment.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
Cloud computing field has reached to the highest level of technical heights. The security problems of cloud computing hinders
its development. It is totally internet based technology where the resources and information shared on a distributed network. So
it is important for both provider as well as consumer to provide the security and trust to share the data for developing clou d
computing applications. Because now organizations are now moving fast towards the cloud. So there is the possibility of threats
that will harm the data on the cloud. In our paper we mainly focuses on security threats of cloud computing system also we
mention some solutions and countermeasures on these security problems
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of user's approach to providing feedback for smart home devices. We will conduct an online survey for a sample of three to five students selected by simple random sampling to study the user's motto for giving feedback on smart home devices and their expectations. We have observed that most users are ready to actively share their input on smart home devices to improve the product's service and quality to fulfill the user’s needs and make their lives easier.
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more
straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame
works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of
user's approach to providing feedback for smart home devices. We will conduct an online survey for a
sample of three to five students selected by simple random sampling to study the user's motto for giving
feedback on smart home devices and their expectations. We have observed that most users are ready to
actively share their input on smart home devices to improve the product's service and quality to fulfill the
user’s needs and make their lives easier.
October 2023-Top Cited Articles in IJU.pdfijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSijujournal
In order to avoid unnecessary applications of Miller-Rabin algorithm to the number in question, we resort
to trial division by a few initial prime numbers, since such a division take less time. How far we should go
with such a division is the that we are trying to answer in this paper?For the theory of the matter is fully
resolved. However, that in practice we do not have much use.Therefore, we present a solution that is
probably irrelevant to theorists, but it is very useful to people who have spent many nights to produce
large (probably) prime numbers using its own software.
A novel integrated approach for handling anomalies in RFID dataijujournal
Radio Frequency Identification (RFID) is a convenient technology employed in various applications. The
success of these RFID applications depends heavily on the quality of the data stream generated by RFID
readers. Due to various anomalies found predominantly in RFID data it limits the widespread adoption of
this technology. Our work is to eliminate the anomalies present in RFID data in an effective manner so that
it can be applied for high end applications. Our approach is a hybrid approach of middleware and
deferred because it is not always possible to remove all anomalies and redundancies in middleware. The
processing of other anomalies is deferred until the query time and cleaned by business rules. Experimental
results show that the proposed approach performs the cleaning in an effective manner compared to the
existing approaches.
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the
challenges encountered in healthcare environment. In contribution to this area, this study developed a
system prototype that recommends diagonostic services based on physiological data collected in real time
from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android
smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health
Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location
and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The
uploaded information can be accessed in real time by medical practitioners through a web application.
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESijujournal
The population of elderly folks is ballooning worldwide as people live longer. But getting older often
means declining health and trouble living solo. Smart home tech could keep an eye on old folks and get
help quickly when needed so they can stay independent. This paper looks at a system combining wireless
sensors, video watches, automation, resident monitoring, emergency detection, and remote access. Sensors
track health signs, activities, appliance use. Video analytics spot odd stuff like falls. Sensor fusion and
machine learning find normal patterns so wonks can see unhealthy changes and send alerts. Multi-channel
alerts reach caregivers and emergency folks. A LabVIEW can integrate devices and enables local and
remote oversight and can control and handle emergency responses. Benefits seem to be early illness clues,
quick help, less burden on caregivers, and optimized home settings. But will old folks use all this tech? Can
we prove it really helps folks live longer and better? More research on maximizing reliability and
evaluating real-world impacts is needed. But designed thoughtfully, smart homes could may profoundly
improve the aging experience.
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEijujournal
In today’s Internet world, log file analysis is becoming a necessary task for analyzing the customer’s
behavior in order to improve advertising and sales as well as for datasets like environment, medical,
banking system it is important to analyze the log data to get required knowledge from it. Web mining is the
process of discovering the knowledge from the web data. Log files are getting generated very fast at the
rate of 1-10 Mb/s per machine, a single data center can generate tens of terabytes of log data in a day.
These datasets are huge. In order to analyze such large datasets we need parallel processing system and
reliable data storage mechanism. Virtual database system is an effective solution for integrating the data
but it becomes inefficient for large datasets. The Hadoop framework provides reliable data storage by
Hadoop Distributed File System and MapReduce programming model which is a parallel processing
system for large datasets. Hadoop distributed file system breaks up input data and sends fractions of the
original data to several machines in hadoop cluster to hold blocks of data. This mechanism helps to
process log data in parallel using all the machines in the hadoop cluster and computes result efficiently.
The dominant approach provided by hadoop to “Store first query later”, loads the data to the Hadoop
Distributed File System and then executes queries written in Pig Latin. This approach reduces the response
time as well as the load on to the end system. This paper proposes a log analysis system using Hadoop
MapReduce which will provide accurate results in minimum response time.
SERVICE DISCOVERY – A SURVEY AND COMPARISONijujournal
With the increasing number of services in the internet, companies’ intranets, and home networks: service
discovery becomes an integral part of modern networked system. This paper provides a comprehensive
survey of major solutions for service discovery. We cover techniques and features used in existing systems.
Although a few survey articles have been published on this object, our contribution focuses on comparing
and analyzing surveyed solutions according eight prime criteria, which we have defined before. This
comparison will be helpful to determine limits of existing discovery protocols and identify future research
opportunities in service discovery.
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSijujournal
Opportunistic Networks are able to exploit social behavior to create connectivity opportunities. This
paradigm uses pair-wise contacts for routing messages between nodes. In this context we investigated if the
“six degrees of separation” conjecture of small-world networks can be used as a basis to route messages in
Opportunistic Networks. We propose a simple approach for routing that outperforms some popular
protocols in simulations that are carried out with real world traces using ONE simulator. We conclude that
static graph models are not suitable for underlay routing approaches in highly dynamic networks like
Opportunistic Networks without taking account of temporal factors such as time, duration and frequency of
previous encounters.
International Journal of Ubiquitous Computing (IJU)ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...ijujournal
The aging population and the consequent increase in the incidence of dementias is causing many
challenges to health systems, mainly related to infrastructure, low services quality and high costs. One
solution is to provide the care at house of the patient, through of home care services. However, it is not a
trivial task, since a patient with dementia requires constant care and monitoring from a caregiver, who
suffers physical and emotional overload. In this context, this work presents an modelling for development of
pervasive systems aimed at helping the care of these patients in order to lessen the burden of the caregiver
while the patient continue to receive the necessary care.
A proposed Novel Approach for Sentiment Analysis and Opinion Miningijujournal
as the people are being dependent on internet the requirement of user view analysis is increasing
exponentially. Customer posts their experience and opinion about the product policy and services. But,
because of the massive volume of reviews, customers can’t read all reviews. In order to solve this problem,
a lot of research is being carried out in Opinion Mining. In order to solve this problem, a lot of research is
being carried out in Opinion Mining. Through the Opinion Mining, we can know about contents of whole
product reviews, Blogs are websites that allow one or more individuals to write about things they want to
share with other The valuable data contained in posts from a large number of users across geographic,
demographic and cultural boundaries provide a rich data source not only for commercial exploitation but
also for psychological & sociopolitical research. This paper tries to demonstrate the plausibility of the idea
through our clustering and classifying opinion mining experiment on analysis of blog posts on recent
product policy and services reviews. We are proposing a Nobel approach for analyzing the Review for the
customer opinion
International Journal of Ubiquitous Computing (IJU)ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...ijujournal
Usability engineering and usability testing are concepts that continue to evolve. Interesting research studies
and new ideas come up every now and then. This paper tests the hypothesis of using an EDA-based
physiological measurements as a usability testing tool by considering three measures; which are observers‟
opinions, self-reported data and EDA-based physiological sensor data. These data were analyzed
comparatively and statistically. It concludes by discussing the findings that has been obtained from those
subjective and objective measures, which partially supports the hypothesis.
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSijujournal
Ubiquitous Computing uses mobile phones or tiny devices for application development with sensors
embedded in mobile phones. The information generated by these devices is a big task in collection and
storage. For further, the data transmission to the intended destination is delay tolerant. In this paper, we
made an attempt to propose a new security algorithm for providing security to Pervasive Computing
Environment (PCE) system using Public-key Encryption (PKE) algorithm, Biometric Security (BS)
algorithm and Visual Cryptography Scheme (VCS) algorithm. In the proposed PCE monitoring system it
automates various home appliances using VCS and also provides security against intrusion using Zigbee
IEEE 802.15.4 based Sensor Network, GSM and Wi-Fi networks are embedded through a standard Home
gateway.
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have
elaborated several routing protocols that possess different performance levels. In this paper we give a
performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing
protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their
performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to
End Delay, Normalised Routing Load and Average Throughput.
Optical Character Recognition (OCR) is a technique, used to convert scanned image into editable text
format. Many different types of Optical Character Recognition (OCR) tools are commercially available
today; it is a useful and popular method for different types of applications. OCR can predict the accurate
result depends on text pre-processing and segmentation algorithms. Image quality is one of the most
important factors that improve quality of recognition in performing OCR tools. Images can be processed
independently (.png, .jpg, and .gif files) or in multi-page PDF documents (.pdf). The primary objective of
this work is to provide the overview of various Optical Character Recognition (OCR) tools and analyses of
their performance by applying the two factors of OCR tool performance i.e. accuracy and error rate.
Optical Character Recognition (OCR) is a technique, used to convert scanned image into editable text
format. Many different types of Optical Character Recognition (OCR) tools are commercially available
today; it is a useful and popular method for different types of applications. OCR can predict the accurate
result depends on text pre-processing and segmentation algorithms. Image quality is one of the most
important factors that improve quality of recognition in performing OCR tools. Images can be processed
independently (.png, .jpg, and .gif files) or in multi-page PDF documents (.pdf). The primary objective of
this work is to provide the overview of various Optical Character Recognition (OCR) tools and analyses of
their performance by applying the two factors of OCR tool performance i.e. accuracy and error rate.
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to
different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high
throughput for the network and increase the chance for multi path routing. This is because the multiple
channel availability for transmission decreases the probability of the most elegant problem called as
interference problem which is either of interflow and intraflow type. For avoiding the problem like
interference and maintaining the constant network performance or increasing the performance the WMN
need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting
several packets ready for transmission and sending them to the intended recipient through the channel,
while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different
available multiple paths is most the important factor in the both case for a routing algorithm. Hence the
most challenging factor is to determine a forwarding strategy which will provide the schedule for each
node for transmission within the channel. In this research work we have tried to implement two forwarding
strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We
have implemented Global State Routing (GSR) which will consider the packet forwarding concept and
Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding
and packet aggregation. After the successful implementation the network performance has been measured
by means of simulation study.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
SECURITY ATTACK ISSUES AND MITIGATION TECHNIQUES IN CLOUD COMPUTING ENVIRONMENTS
1. International Journal of UbiComp (IJU), Vol.7, No.1, January 2016
DOI:10.5121/iju.2016.7101 1
SECURITY ATTACK ISSUES AND MITIGATION
TECHNIQUES IN CLOUD COMPUTING
ENVIRONMENTS
Subramaniam.T.K1*,
Deepa.B2
*1
M.E.Scholar, Department of Computer Science & Engineering Nandha Engineering
College, Erode, Tamil Nadu, India
2
Assistant Professor, Department of Computer Science & Engineering, Nandha
Engineering College, Erode, Tamil Nadu, India
ABSTRACT
In computer networks attacks plays a vital role. It also degrades a cloud services nowadays. The attacks
reduce the quality of services in the computer networks as well as cloud platforms. The attack that makes
services engaged to the intended users. For effective use of cloud computing we need to reduce the attacks
vulnerabilities and improve the security. This study discuss about the different types of attacks that affects
the cloud environments and also possible mitigation techniques to reduce the attacks. Issue mitigation
KEYWORDS
Attacks, cloud services
1. INTRODUCTION
In the network computer system’s large number of computer system is associated with different
machine that are geographically distributed network. Network attacks, threats security are major
difficulty in computer system networks. The network security or web services are method of
earning unofficial admittance to network. And also the attacks take part in a chief role in security.
The attacks are classified into two related type’s that is passive attacks and active attacks. The
network impostor capture data travelling through the network is said to be a passive attack. Idle
scan, wire patter, and port scanner are some of examples of passive attacks. Intruder instructs
command to disrupt networks usual operation. This is called active attacks. Man-in-middle attack,
Denial-of-service attack, spoofing are some of the examples of active attacks. This attack can be
accepted in various ways and various policies. The essential facet would be to block victim’s
network system and thus make it unreachable by other client computer system [1] [2]. There are
numerous ways of creating service that are unavailable to target users. Rather than just flooding
with copious IP packets. The dupe could also be hit at various loopholes [12]. By creating it
unstable which may depends on the nature of the attack.
2. International Journal of UbiComp (IJU), Vol.7, No.1, January 2016
2
2. RELATED WORK
Cloud computing other wise said to be an on-demand computing. Cloud computing is one of the
types of Internet-based computing in which sharing of cloud resources, data and information.
Normally data and programs are run on individual desktop computers. Instead these are run on
cloud environments. Cloud computing provides platform, communications services and end user
application services. The Cloud computing plays a vital role in IT industry [2] [3]. The network
of networks gives a remote access to set of resources that would be a decentralized. Cloud
computing is flexible, multi-tendency and scalable. In this study the section 3 provides a
deployment model of cloud computing, section 4 provides security attack in cloud computing
and solutions.
2. CLOUD SERVICE MODEL
Cloud computing connect delivering computing resources such as remote servers machines, data
storages space, and cloud users applications are services to end users by cloud computing service
supplier. End users access on-demand cloud services via web browsers. Cloud computing service
providers propose specific cloud services and make sure the significance of the services.
Essentially, cloud computing consist of three layers: the system layer, the middle layer or
platform layer, and the top layer or application layer.
Infrastructure as a service
The bottom layer is the system layer, which comprise of additional resources such as
communications of servers, network devices, and memory storage. It is said to be Infrastructures-
a-service (IaaS). The computational resources are prepared and accessible for users as on-demand
services [14]. With the exploit of virtualization technology, IaaS also offer virtual machines that
allow clients to build composite network infrastructures. This model not only diminish the cost in
importing physical apparatus for commerce, it also reduces the weight load of computer network
administration since IT professionals are not essential to frequently monitor the health of physical
network resources. The examples of a cloud computing service supplier of IaaS are Amazon’s
EC2. It offers a virtual computing environment with web service interfaces. By using the
boundary, users can deploy Solaris or Windows based virtual machines, Linux, and execute their
own tradition applications.
Fig 1: cloud service Deployment Model
3. International Journal of UbiComp (IJU), Vol.7, No.1, January 2016
3
Platform as a service
The middle layer is the platform layer and is said to be a Platform-as-a-Service (PaaS). It is
planned to supply a development platform for users to design their explicit applications. Middle
layer services offers by this cloud model contain tools and libraries for application enlargement,
permit users to have organized over the application deployment and configuration settings. With
Platform-as-a-Service model, programmers are not necessary to obtain software development
tools, therefore dropping the cost of buying tools. Google Apps is an example of Platform- as-a-
Service model it is a suite of Google tools that comprises Google Talk, Gmail, Google Groups,
Google Docs, Google Calendar, and Google Sites. It permits users to modify these tools on their
own domain names [12]. Windows Azure is another Platform-as-a-Service provider. It enables
users to construct own applications using various languages and domains, tools or frameworks.
Users can then incorporate the applications into their presented IT environments.
Software as a service
The top layer is the application layer, also called as Software-as-a-Service (SaaS). This layer
permits users to lease applications runs clouds as a substitute of paying to purchase these
applications. Because of its ability to decrease costs. Software-as-a-Service is popular in the
middle of companies that install their businesses. Group on is an example that uses Software-as-
a-Service[13]. With the use of the online bearer solutions provided by Zen desk, Groupon
processes its thousands of daily customer tickets more efficiently.
Benefits of cloud computing
Lower IT costs Infrastructure
Moving to cloud computing may diminish the cost of running and preserve IT systems. Rather
than acquire costly systems and equipment for your business, cloud computing can decrease the
costs by using the resources of cloud computing service supplier. It may be able to diminish the
working costs because: the cost of system upgrades, original hardware and software may be built-
in in the agreement; cloud computing no longer need to pay wages for expert staff, the energy
utilization costs may be condensed, there are fewer time delays.
Timeliness
The business can scale up or scale down the procedure and storage desires quickly to suit
situation, permit flexibility as needs change. Rather than purchase and install expensive upgrade
in individual computer, cloud computer service provider can handle this all works. Use the cloud
frees up the moment so we can get on with managing business.
Durability in Business
Defending data and systems is an imperative part of business durability development. Whether
experience a natural tragedy, power collapse or other predicament, encloses the data accumulate
in the cloud environments ensure that it is backed up and confined in a secure and safe position.
Being able to right to use data again rapidly permit conducting business as usual, minimizing any
downtime and overcome of productivity.
4. International Journal of UbiComp (IJU), Vol.7, No.1, January 2016
4
Effective collaboration
Collaboration in a cloud computing environment gives the business capacity to commune and
share more easily external of the traditional communication methods. If cloud computing
operating on a project across different locations, might use cloud computing to provide
employees, contractors and third parties admission to the equal files. The cloud users choose a
cloud computing representation that formulates it easy for to share your report with adviser.
3. CLOUD COMPUTING ATTACKS
Cloud computing faces a some of following types of attacks. Proper mitigation techniques should
be taken care to avoid or reduce these types of attacks.
Fig 2: Types of attacks in cloud
3.1. Denial of service attacks
Cloud computing plays a vital role in IT industry. Many users are involved in cloud
environments. Cloud environments provide a cost effective services to the users. Denial of
service can easily occur in the environments. Cloud increases the computational power by with
help of virtual machines. The Denial of service overloads the servers. The attackers can perform
the attacks by sending huge number of request to the target servers. Hence the server cannot
process the further requests. Denial of service can be performed in several ways such as UDP
Flood Attack, ICMP flood attack. This type of denial of service attack happens in User Data
Gram protocol. It establishes a session less connection by user datagram protocol. It enters into
any one of the port in host computer with one or more numerous UDP packets. This session-less
service roots the port that will require confirming the port wether the packets will be reached or
TYPES OF
ATTACKS
IN CLOUD
DOS ATTACKS
MALWARE
INJECTION
ATTACKS
SIDE CHANNEL
ATTACKS
AUTHENTICATION
ATTACKS
MAN IN MIDDLE
ATTACKS
5. International Journal of UbiComp (IJU), Vol.7, No.1, January 2016
5
not. Internet Control Message Protocol Attacks. Normally ping request packets are send to
destination host to check whether the host is connected are not. This is identified by ping replies.
Attackers send more number of packets without waiting for replies [5,6]. This consumes more
bandwidth and cause ICMP flood attacks.
3.1.1. Solution to Denial of Service attacks
This type of attacks can eliminated by using following approaches such as filter based approach,
signature based approach, firewalls.
Filter based approach: Flow level filter is used to detect the low rate DoS attack. Low rate DoS
attack which gradually increase the traffic rate and attack the network host. Flow level filter
which blocks the DoS attacks [34, 35].
In computer network, the traffic of the network is monitored along with signature pattern. The
attacks pattern is compared with help of signature database. The database encloses one or more
number pre-defined signatures. If the traffics match with database signature traffic it will take
necessary steps to block the attacks.
Fig 3: Approaches to DoS attacks
Firewalls are one of the methods of Intrusion Prevention System. The main idea of using firewall
within the environment to impose endeavour strategy and preserve association state information
for genuine users both internally and also externally and not to prevent high volume DoS / DDoS
style attacks.
3.2. Malware Injection Attacks
In the cloud computing environment the client’s request is processed based on authentication and
authorization, at that time there is a enormous chances of raw data’s control over between the
web server and web browser. An attacker can take advantage during this switch over time of
metadata. During this time the attacker attempts to introduce a harmful code or any other service
to cloud computing environments. This infuses service or code that looks like a service that are
6. International Journal of UbiComp (IJU), Vol.7, No.1, January 2016
6
already available in the cloud environments. Once the malicious code is injected in cloud, it will
run continuously as a single instance. And it affects the cloud environments [15,22]. This will
create a loop hole for attackers in cloud environments. It is one of the major security challenges in
cloud.
3.2.1. Solution to Malware injection Attacks
Normally when a cloud customer opens an account in the cloud environments, the service
providers creates an image of the customer’s Virtual Machine in the image database repository
system of the cloud. The applications that the customer will execute are measured with high
efficiency and integrity. Cloud proposes to think the integrity in the hardware level, because it is
very complex for an attacker to intrude in the Infrastructure as a Service level. They utilize the
File Allocation Table (FAT) system construction, because it is one of the clear-cut technique .It
hold up by virtually all existing operating systems. From the File Allocation Table they can
identify about the code or application that a cloud customer is going to execute. They can confirm
with the preceding instances that had been previously accomplished from the customer’s device
to establish the validity and integrity of the upcoming instance. For this purpose, need to install a
Hypervisor in the provider’s end [23]. This Hypervisor will be measured the most secured and
sophisticated part of the cloud system those security cannot be violated by any resources. The
Hypervisor is accountable for preparing all the instances, but prior to scheduling it will make sure
the integrity of the instance from the File Allocation Table of the cloud customer’s Virtual
Machines.
One more solution is to store the Operating System type of the cloud customer in the first phase
when a cloud customer opens an account in cloud environments. As the cloud is totally Operating
System platform independent, prior to launching an instance in the cloud, cross checking can be
done with the Operating System type from which the instance was requested from with the
account holder’s Operating System type.
3.3. Side channel attacks
This side channel attacks happens in Infrastructure as a Service Platforms. Infrastructure as a
Service (IaaS) model in cloud computing make available infrastructures like a collection of
several computers, virtual machines(VMs) and storage resources to store confidential
information, data documents etc., An attacker endeavor to concession the cloud system by placing
a malevolent virtual machine in target cloud server system and then entrance a side channel attack
[24]. Side channel attacks follow two steps that is placement and Extraction. Placement is placing
virtual machines and arranging the machines in cloud environments. Second thing is extraction
.After placing the virtual achiness stars extracting confidential information from other servers in
cloud computing environments.
3.3.1. Solutions to side channel attack
Virtual Firewall
Firewall is a collection of related programs that shield the resources of users from other networks
and impostor. In this approach executing a virtual firewall in the cloud server’s .It is possible to
detect the new malicious virtual machines in cloud computing environments [24]. With the help
of virtual firewall server these types of attacks can prevented in cloud computing environments.
7. International Journal of UbiComp (IJU), Vol.7, No.1, January 2016
7
The attacker tries to place virtual machines in cloud environments. This virtual firewall system
blocks these types of new malicious virtual machine placements.
Encryption and Decryption
Side channel attacks can be prevented in cloud computing environments by means of virtual
firewalls. This can prevent side channel attacks in environments. In order to provide a more
security to cloud computing data’s and confidential information they use an Encryption and
Decryption. The client side Data’s are randomly encrypted that uses the concept of confusion and
diffusion [24]. The different security keys and different encryption algorithm are used to encrypt
the client side data’s. Even though side channel attacks can occurs it is difficult to decrypt the
client’s data’s. It provides a more security to cloud computing environments.
3.4. Authentication attack
This type of attacks can be easily occurs in the cloud environments. The attackers easily target the
servers by these types of authentication attacks [18]. The attackers target the mechanism that is
followed user. The mechanism used for authentication is captured and attackers and tries to
access the confidential information. They use different encryption and decryption mechanism to
transfer the data as more confidential. The service provider stores the key value of users and must
be authorized before going to access a service.
3.4.1. Solution to Authentication Attack
This problem arises when using a simple authentication mechanism such as simple username and
password. More than one authentication mechanism must be established in the environments. The
secondary authentication mechanism must be used and also use advanced authentication
mechanism must be used to avoid these types of attacks. Advanced authentication attacks such as
one time password, virtual key boards, site key etc.
3.5. Man-in-middle attack
This type of attacks can be occurs while communication established in two node or computer
system. The attackers in the communication system modify the message content or message
sequences [20]. A man-in-the-middle attack permits a malevolent actor to interrupt, send and
receive data between two users.
3.5.1. Solution to man-in-middle attack
This type of attacks is avoided by proper authentication mechanism. The advanced authentication
mechanism can be used. The encryption is used for sender’s side and decryption is used for
receiver side. This mechanism is to be used. The attacker cannot modify the encrypted data. The
different encryption and decryption algorithm such as AES, DES, and Triple DES etc is to be
used.
3.6. Wrapping attacks
Wrapping attacks use XML signature wrapping to increase a weakness when web servers validate
the signed requests [15]. The attack is done at the time of the translation of SOAP messages
8. International Journal of UbiComp (IJU), Vol.7, No.1, January 2016
8
between a valid user and the web server. By replica the user’s account and password in the login
period, the hacker inserts a bogus element into the communication structure, shift the original
message body under the wrapper that replaces the content of the message content with harmful
code, and then sends the message packets to the server. Hence the original body is still valid; the
server will be scam into approve the message that has actually been distorted. As a result, the
attacker is able to gain unauthorized admittance to secured resources and succession the proposed
operations.
3.6.1. Solution to wrapping attacks
The attacker can infringe in the Transport Layer Services. They enhance the security by using a
SOAP message while communicating with web server and web browser. In this add an additional
bit called redundant STAMP bit. This bit will be toggled when the message is interfered with by a
third party during the communication between web server and web browser. When the message
ruches the other ends it verifies any toggle in the STAMP bit. At the end the source receives a
signature value from the other end.
3.7. Data Stealing Problem:
Data stealing problem is the most conventional approach to break a user account in cloud
computing environments [14]. The account password is stolen by attackers. Then the attacker
cracks the confidential information the cloud computing environments. In sometimes they crash
the system information’s.
The service providers and cloud users are affected by those kinds of problems.
3.7.1 Data Stealing Solution
At the time of logout the service provider send an email messages to the customer about session
used duration with a special number. This number is used for further login. In this approach
customer can known about the usage time and charges and also unique random number is
generated for next login. By using this become more confidential.
4. CONCLUSION
Attacks affect the cloud computing environments. It leads to data loss and also financially loss to
the cloud owners and cloud service providers and cloud users. This study focuses on cloud
computing attacks and possible solution to those attacks. Attacks are to be prevented before going
to occur. By applying these solutions we can prevent the attacks in cloud computing
environments.
REFERENCES
[1] Zhao G, Liu J, Tang Y, Sun W, Zhang F, Ye X, Tang N “ Cloud Computing: A Statistics Aspect of
Users. In: First International Conference on Cloud Computing (CloudCom),” Beijing, China.
Springer Berlin, Heidelberg, pp 347–358, 2009.
9. International Journal of UbiComp (IJU), Vol.7, No.1, January 2016
9
[2] Zhang S, Zhang S, Chen X, Huo X “Cloud Computing Research and Development Trend. In:
Second International Conference on Future Networks (ICFN’10), Sanya, Hainan, China” IEEE
Computer Society, Washington, DC, USA, pp 93–97, 2010.
[3] R. Sherman, Distributed systems security, Computers & Security 11 (1) (1992).
[4] M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On technical security issues in cloud
computing,” in Cloud Computing, 2009. CLOUD’09. IEEE International Conference on, pp. 109–
116, IEEE, 2009
[5] A. M. Lonea, D. E. Popescu, and H. Tianfield, “Detecting ddos attacks in cloud computing
environment.,”
International Journal of Computers, Communications & Control, vol. 8, no. 1, 2013.
[6] M. H. Sqalli, F. Al-Haidari, and K. Salah, “Edos-shield-a two-steps mitigation technique against
edos attacks in cloud computing,” in Utility and Cloud Computing (UCC), 2011 Fourth IEEE
International
Conference on, pp. 49–56, IEEE, 2011.
[7] T. Grance and P. Mell, “The nist definition of cloud computing,” National Institute of Standards
and
Technology (NIST), 2011.
[8] cloud Security Alliance. Top threats to cloud computing, Cloud Security Alliance, 2010.
[9] D. Lekkas, S. Gritzalis, S. Katsikas, Quality assured trusted third parties for deploying secure
Internet-based healthcare applications, International Journal of Medical Informatics (2002).
[10] Cloud Security Alliance “Security guidance for critical areas of focus in Cloud Computing V3.0..
Available: https://cloudsecurityalliance.org/ guidance/csaguide.v3.0.pdf, 2011.
[11] Marinos A, Briscoe G “Community Cloud Computing. In: 1st International Conference on Cloud
Computing (CloudCom), Beijing, China. Springer-Verlag Berlin, Heidelberg”2009.
[12] Khalid A ,” Cloud Computing: applying issues in Small Business. In: International Conference on
Signal Acquisition and Processing (ICSAP’10),pp 27,2010.
[13] Gartner. Assessing the security risks of cloud computing, Gartner, 2008.
[14] Mather T, Kumaraswamy S, Latif S ,” Cloud Security and Privacy”. O’Reilly Media, Inc.,
Sebastopol, CA,2009.
[15] Li W, Ping L “ Trust model to enhance Security and interoperability of Cloud environment. In:
Proceedings of the 1st International conference on Cloud Computing”,. Springer Berlin Heidelberg,
Beijing, China, pp 69–79,2009.
[16] Rittinghouse JW, Ransome JF,”Security in the Cloud. In: Cloud Computing. Implementation,
Management, and Security, CRC Press,2009
[17] Grobauer B, Walloschek T, Stocker E ,”Understanding Cloud Computing vulnerabilities.” IEEE
Security Privacy 9(2):50–57,2011.
[18] Subashini S, Kavitha V ,”A survey on Security issues in service delivery models of Cloud
Computing. J Netw Comput Appl 34(1):1,2011.
10. International Journal of UbiComp (IJU), Vol.7, No.1, January 2016
10
[19] Onwubiko C,” Security issues to Cloud Computing. In: Antonopoulos N, Gillam L (ed) Cloud
Computing: principles, systems & applications. Springer-Verlag,2010.
[20] National Institute of Standards and Technology. Guide for mapping types of information and
information systems to security categories, NIST 800-60,2008.
[21] Morsy MA, Grundy J, Müller I ,” An analysis of the Cloud Computing Security problem. In:
Proceedings of APSEC 2010 Cloud Workshop. APSEC, Sydney, Australia”,2010.
[22] K. Zunnurhain and S. Vrbsky, “Security attacks and solutions in clouds,” in Proceedings of the 1st
international conference on cloud computing, pp. 145–156, Citeseer, 2010.
[23] Q. Luo and Y. Fei, “Algorithmic collision analysis for evaluating cryptographic systems and
sidechannel
attacks,” in Hardware-Oriented Security and Trust (HOST), 2011 IEEE International Symposium
on, pp. 75–80, IEEE, 2011.
[24] B. Sevak, “Security against side channel attack in cloud computing,” International Journal of
Engineering and Advanced Technology (IJEAT), vol. 2, no. 2, p. 183, 2013.
[25] Jansen WA ,” Cloud Hooks: Security and Privacy Issues in Cloud Computing. In: Proceedings of
the 44th Hawaii International Conference on System Sciences, Koloa”, Kauai, HI. IEEE Computer
Society, Washington, DC,USA, pp 1–10,2011.
[26] Zissis D, Lekkas D ,”Addressing Cloud Computing Security issues. Future Generations Computer
System “,28(3):583–592,2012.
[27] Kazi Zunnurhain and Susan V. Vrbsky, “Security Attacks and Solutions in Clouds”2013.
[28] Apurva Shitoot, Sanjay Sahu, Rahul Chawda, “Security Aspects in Cloud Computing”, IJETT,
Volume 6 number 3 - Dec 2013.
[29] A. Singh and M. Shrivastava, “Overview of attacks on cloud computing,” International Journal of
Engineering and Innovative Technology (IJEIT), vol. 1, no. 4, 2012.
[30] Atici, A.C., Yilmaz, C., Savas, E.: An approach for isolating the sources of information leakage
exploited in cache-based side-channel attacks. In: Software Security and Reliability-Companion
(SERE-C), 2013 IEEE 7th
International Conference on, pp. 74{83. IEEE, 2013.
[31] Varadharajan, V., Tupakula, U.: Counteracting security attacks in virtual machines in the cloud
using property based attestation. Journal of Network and Computer Applications , 2013.
[32] He, X., Chomsiri, T., Nanda, P., Tan, Z.: Improving cloud network security using the tree-rule
_rewall. Future Generation Computer Systems 30, 116{126, 2014.
[33] Singh and M. Shrivastava, “Overview of attacks on cloud computing,” International Journal of
Engineering and Innovative Technology (IJEIT), vol. 1, no. 4, 2012.
[34] Subramaniam.T.K, Deepa.B , “A Review towards DDoS Prevention and Detection Methodology”
International Journal of Computational Science and Information Technology (IJCSITY)
Vol.3,No.1/2/3,August 2015.
11. International Journal of UbiComp (IJU), Vol.7, No.1, January 2016
11
[35] Subramaniam.T.K, Deepa.B, “A Survey On DDOS Attack Detection And Prevention
Methodology” International Journal of Intellectual Advancements and Research in Engineering
Computations, JUNE 2015.
T.K.SUBRAMANIAM received the B.Tech degree in Information technology from
Nandha Engineering College in the year 2014.He is currently doing his M.E Computer
science and Engineering in Nandha engineering college, Erode, India. His area of
interest is web services. He has published many journal papers.
B.DEEPA received the M.E degree in Computer Science and Engineering from
Nandha Engineering College in the year 2011.She is currently working as Assistant
Professor in Nandha Engineering College, Erode, India. She has published many
international and national research papers. Her area is Network security and web
services. She has depth knowledge of her research area.