Improving cloud network security using the Tree-Rule firewall

2014 ◽  
Vol 30 ◽  
pp. 116-126 ◽  
Author(s):  
Xiangjian He ◽  
Thawatchai Chomsiri ◽  
Priyadarsi Nanda ◽  
Zhiyuan Tan
2020 ◽  
Vol 8 (5) ◽  
pp. 3454-3457

In the real world cloud robotics network are highly structured. The network security and IOT devices ability to cope with complex problem in such cloud environment crucially depend on exploiting this network security structured.C2M (Cloud to Machine) is the core network technology to implement cloud robotics. This paper firstly introduce the concept of C2M with Cloud Heritage Technique and the cloud network architecture of C2MHT (Cloud to Machine Heritage Technique) .Then it analyses the cloud security threats of C2M , moving the C2M robotics devices to unauthorized location and note.


2017 ◽  
Vol 10 (2) ◽  
pp. 338-344
Author(s):  
Sunil Kumar ◽  
Maninder Singh

Network security, data security and several other security types such as the computer security collectively compose the word “Cloud Security”. Cloud computing posses a new challenge because traditional security mechanism is being followed are insufficient to safeguard the cloud resources. Cloud computing can easily be targeted by the attackers. A group of malicious users or illegitimate users can attack on system which may lead to denial the services of legitimate users. Such kinds of attacks are performed by the malicious (zombie) attackers. The zombie attack will degrade the network performance to large extend. Traditional techniques are not easily capable to detect the zombie attacker in the cloud network. So in this paper we have proposed a technique which is the enhancement of the mutual authentication scheme in order to detect and isolate zombie attack for the efficient performance of the network.


2011 ◽  
Vol 3 (1) ◽  
pp. 52-54 ◽  
Author(s):  
N. Amsaveni N. Amsaveni ◽  
◽  
R. Vasanthi R. Vasanthi

2010 ◽  
Vol 69 (7) ◽  
pp. 629-638
Author(s):  
J. Sisniega-Gonzalez ◽  
E. Aguirre-Anaya ◽  
Mariko Nakano-Miyatake ◽  
Hector Manuel Perez-Meana

2007 ◽  
Vol 1 (4) ◽  
pp. 85-91
Author(s):  
Jeya S ◽  
◽  
Ramar K ◽  

Sign in / Sign up

Export Citation Format

Share Document