scholarly journals Detection and Isolation of Zombie Attack under Cloud Environment

2017 ◽  
Vol 10 (2) ◽  
pp. 338-344
Author(s):  
Sunil Kumar ◽  
Maninder Singh

Network security, data security and several other security types such as the computer security collectively compose the word “Cloud Security”. Cloud computing posses a new challenge because traditional security mechanism is being followed are insufficient to safeguard the cloud resources. Cloud computing can easily be targeted by the attackers. A group of malicious users or illegitimate users can attack on system which may lead to denial the services of legitimate users. Such kinds of attacks are performed by the malicious (zombie) attackers. The zombie attack will degrade the network performance to large extend. Traditional techniques are not easily capable to detect the zombie attacker in the cloud network. So in this paper we have proposed a technique which is the enhancement of the mutual authentication scheme in order to detect and isolate zombie attack for the efficient performance of the network.

Author(s):  
Kimaya Arun Ambekar ◽  
Kamatchi R.

Cloud computing is based on years of research on various computing paradigms. It provides elasticity, which is useful in the situations of uneven ICT resources demands. As the world is moving towards digitalization, the education sector is expected to meet the pace. Acquiring and maintaining the ICT resources also necessitates a huge amount of cost. Education sector as a community can use cloud services on various levels. Though the cloud is very successfully running technology, it also shows some flaws in the area of security, privacy and trust. The research demonstrates a model in which major security areas are covered like authorization, authentication, identity management, access control, privacy, data encryption, and network security. The total idea revolves around the community cloud as university at the center and other associated colleges accessing the resources. This study uses OpenStack environment to create a complete cloud environment. The validation of the model is performed using some cases and some tools.


2016 ◽  
pp. 2076-2095
Author(s):  
Abhishek Majumder ◽  
Sudipta Roy ◽  
Satarupa Biswas

Cloud is considered as future of Information Technology. User can utilized the cloud on pay-as-you use basis. But many organizations are stringent about the adoption of cloud computing due to their concern regarding the security of the stored data. Therefore, issues related to security of data in the cloud have become very vital. Data security involves encrypting the data and ensuring that suitable policies are imposed for sharing those data. There are several data security issues which need to be addressed. These issues are: data integrity, data intrusion, service availability, confidentiality and non-repudiation. Many schemes have been proposed for ensuring data security in cloud environment. But the existing schemes lag in fulfilling all these data security issues. In this chapter, a new Third Party Auditor based scheme has been proposed for secured storage and retrieval of client's data to and from the cloud service provider. The scheme has been analysed and compared with some of the existing schemes with respect to the security issues. From the analysis and comparison it can be observed that the proposed scheme performs better than the existing schemes.


2014 ◽  
Vol 701-702 ◽  
pp. 1106-1111 ◽  
Author(s):  
Xin Zheng Zhang ◽  
Ya Juan Zhang

As information and processes are migrating to the cloud, Cloud Computing is drastically changing IT professionals’ working environment. Cloud Computing solves many problems of conventional computing. However, the new technology has also created new challenges such as data security, data ownership and trans-code data storage. We discussed about Cloud computing security issues, mechanism, challenges that Cloud service providers and consumers face during Cloud engineering. Based on concerning of security issues and challenges, we proposed several encryption algorithms to make cloud data secure and invulnerable. We made comparisons among DES, AES, RSA and ECC algorithms to find combinatorial optimization solutions, which fit Cloud environment well for making cloud data secure and not to be hacked by attackers.


2017 ◽  
Vol 16 (3) ◽  
pp. 6219-6224
Author(s):  
Jaspreet Kaur ◽  
Navdeep Kaler

Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. As information exchange plays an important role in today’s life, information security becomes more important. This paper is focused on the security issues of cloud computing and techniques to overcome the data security issue. Before analyzing the security issues, the definition of cloud computing and brief discussion to under cloud computing is presented. The various components that affect the security of the cloud and the problems faced by cloud service provider have been discussed in this paper.


2018 ◽  
Author(s):  
Mohammed-Ali Anwar

Mobile Cloud Computing (MCC) is a recent technological development, which has emerged from two popular technology trends; mobile computing and cloud. In essence it revolutionises the capabilities of mobile devices by integrating both storage and processing of the cloud environment with mobile computing and in doing so providing greater optimisation and operating power, allowing for transparent and seamless use of resources provided by the cloud. However, expanding the capability of resource constrained mobile devices in this manner comes at a price. There are many risks associated with the security of data within the cloud environment and as MCC essentially uses the cloud, it also inherits any security issues that are associated with cloud computing. The aim of this survey is to identify potential data security issues, and analyse and present some pioneering security mechanisms and finally suggest some future directions for better data security with MCC.


2014 ◽  
Vol 556-562 ◽  
pp. 5316-5320
Author(s):  
Yi Peng Zhang ◽  
Zheng Tao Jiang ◽  
Chen Yang

Routers are the key equipments connecting Wan, LAN and Internet network, and are the main part of the Internet. The reliability and security of routers is very important to the network performance and information data security. The analysis and research on the technologies of router security and protection is the core issue for network security. This paper mainly aims at providing a series of test and analysis on the vulnerabilities of Tenda wireless routers. Technically, it’s very difficult to crack the WPA /WPA2 wireless encryption. In this paper, we use the related vulnerabilities of wireless routers, and open Wifi Protection Setup (WPS) and Quick Security Settings (QSS) to get router PIN code, which can help us bypass the WPA/WPA2 encryption and, realizesd the router attack.


2020 ◽  
Vol 8 (5) ◽  
pp. 3454-3457

In the real world cloud robotics network are highly structured. The network security and IOT devices ability to cope with complex problem in such cloud environment crucially depend on exploiting this network security structured.C2M (Cloud to Machine) is the core network technology to implement cloud robotics. This paper firstly introduce the concept of C2M with Cloud Heritage Technique and the cloud network architecture of C2MHT (Cloud to Machine Heritage Technique) .Then it analyses the cloud security threats of C2M , moving the C2M robotics devices to unauthorized location and note.


2016 ◽  
Vol 3 (3) ◽  
Author(s):  
Umesh Joshi ◽  
Prof. Anurag Jain

The evolution of IT technology Cloud computing shows the strength in past year. It takes controls in all three services Saas, Paas and Iaas. But with gradual increment of technology the quality of services also main issues. Services should be accurate up to date and secure. The level of approval for any computing model is calculated by its strength quality and weakness. The current note is focusing on the security of data in Cloud network, it calculate the current scenario and proposed the Hybrid Secure solution. The paper provides the idea implementation to secure the data in cloud. It provides the hybrid secure solution which combine attribute based cryptography with hashing function MD5. It implements the idea on Cloudsim and provides the improved result in tested environment.


Sign in / Sign up

Export Citation Format

Share Document