ENHANCED SECURITY MECHANISM AGAINST MALICIOUS ATTACKS FROM INTRUDERS IN CLOUDS

Main Authors: N. Abhishek, M. Rakesh Chowdary, A. Yashwanth Reddy
Format: Article eJournal
Terbitan: , 2016
Subjects:
Online Access: https://zenodo.org/record/1034471
ctrlnum 1034471
fullrecord <?xml version="1.0"?> <dc schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><creator>N. Abhishek</creator><creator>M. Rakesh Chowdary</creator><creator>A. Yashwanth Reddy</creator><date>2016-12-27</date><description>Cloud computing is architecture for providing computing service via the internet on demand and pay per use access to a pool of shared resources namely networks, storage, servers, services and applications, without physically acquiring them. So it saves managing cost and time for organizations. Many industries, such as banking, healthcare and education are moving towards the cloud due to the efficiency of services provided by the pay-per-use pattern based on the resources such as processing power used, transactions carried out, bandwidth consumed, data transferred, or storage space occupied etc. Cloud computing is a completely internet dependent technology where client data is stored and maintain in the data center of a cloud provider like Google, Amazon, Salesforce.som and Microsoft etc. Limited control over the data may incur various security issues and threats which include data leakage, insecure interface, sharing of resources, data availability and inside attacks. There are various research challenges also there for adopting cloud computing such as well managed service level agreement (SLA), privacy, interoperability and reliability. Some logical and trial results prove the effectiveness of this new security infrastructure to safeguard mobile cloud services.</description><identifier>https://zenodo.org/record/1034471</identifier><identifier>10.5281/zenodo.1034471</identifier><identifier>oai:zenodo.org:1034471</identifier><relation>doi:10.5281/zenodo.1034470</relation><rights>info:eu-repo/semantics/openAccess</rights><rights>https://creativecommons.org/licenses/by/4.0/legalcode</rights><source>International Journal of Computational Research and Development 1(2) 148-151</source><subject>Security Issues, Cloud Security, Cloud Architecture, Data Protection, Cloud Platform &amp; Grid Computing</subject><title>ENHANCED SECURITY MECHANISM AGAINST MALICIOUS ATTACKS FROM INTRUDERS IN CLOUDS</title><type>Journal:Article</type><type>Journal:Article</type><recordID>1034471</recordID></dc>
format Journal:Article
Journal
Journal:eJournal
author N. Abhishek
M. Rakesh Chowdary
A. Yashwanth Reddy
title ENHANCED SECURITY MECHANISM AGAINST MALICIOUS ATTACKS FROM INTRUDERS IN CLOUDS
publishDate 2016
topic Security Issues
Cloud Security
Cloud Architecture
Data Protection
Cloud Platform & Grid Computing
url https://zenodo.org/record/1034471
contents Cloud computing is architecture for providing computing service via the internet on demand and pay per use access to a pool of shared resources namely networks, storage, servers, services and applications, without physically acquiring them. So it saves managing cost and time for organizations. Many industries, such as banking, healthcare and education are moving towards the cloud due to the efficiency of services provided by the pay-per-use pattern based on the resources such as processing power used, transactions carried out, bandwidth consumed, data transferred, or storage space occupied etc. Cloud computing is a completely internet dependent technology where client data is stored and maintain in the data center of a cloud provider like Google, Amazon, Salesforce.som and Microsoft etc. Limited control over the data may incur various security issues and threats which include data leakage, insecure interface, sharing of resources, data availability and inside attacks. There are various research challenges also there for adopting cloud computing such as well managed service level agreement (SLA), privacy, interoperability and reliability. Some logical and trial results prove the effectiveness of this new security infrastructure to safeguard mobile cloud services.
id IOS17403.1034471
institution Universitas PGRI Palembang
institution_id 189
institution_type library:university
library
library Perpustakaan Universitas PGRI Palembang
library_id 587
collection Marga Life in South Sumatra in the Past: Puyang Concept Sacrificed and Demythosized
repository_id 17403
city KOTA PALEMBANG
province SUMATERA SELATAN
repoId IOS17403
first_indexed 2022-07-26T05:31:33Z
last_indexed 2022-07-26T05:31:33Z
recordtype dc
merged_child_boolean 1
_version_ 1739495933922508800
score 17.538404