Comprehensive Comparative Study on Intrusion Detection System in Cloud Computing

Abstract

Cloud computing involves deploying groups of remote servers and software networks that allow different kinds of data sources be uploaded for real time processing to generate computing results without the need to store processed data on the cloud. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.Security is one of the concerns about cloud computing that is delaying its adoption. One of the biggest security concerns about is that when you move your information over the cloud you will lose control of it. The cloud gives you the access data, but you have no way of ensuring no one else has access the data. Intruders are the network security attackers intend to breach cloud security. In spite of security issues cloud computing has become very essential needs of the industry. One of the security mechanisms to prevent this issue is Intrusion Detection Systems (IDS). In this paper our focus is to design an Intrusion Detection System (IDS) to defend against the cloud intruders.

Authors and Affiliations

Gyatri P, Priyanka Rao N, Nishanth N, Abishek Raghav, Mrs. Vani K. A

Keywords

Related Articles

Design and Static Stress Analysis of Material Handling Tool Pallet/Skid

In today’s industries, material handling system is unitary of the significant system. The primary application of material handling equipment for storage and shipping of the products. Pallets are used mostly in storing h...

Extraction of Information from Web Page Using Content Mining Approach

Today internet has made the life of human dependent on it. Almost everything and anything can be searched on net. The rapid growth of World Wide Web has been tremendous in recent years. With the large amount of informa...

Pollution Check in Vehicles and Alerting System Using Location Identifier

This paper presents automated control system for air pollution detection in vehicles. As the usage of vehicles is more in these days, pollution is increasing drastically. As a solution to the above problem we aim to bui...

Secured Data Search over Cloud

Cloud computing is one of the best feature where organizations are interested. The security provided to the cloud ensures the confidentiality of the data in the cloud database to the organizations for the usage of cloud...

Multi-level Security: Data Sharing Using Cryptography and Steganography in Cloud Computing

In cloud computing, sharing of data is considered as a challenging security problem. The sharing of the user’s critical data on a third party cloud server does not guarantee the promised level of security and there is a...

Download PDF file
  • EP ID EP21023
  • DOI -
  • Views 267
  • Downloads 6

How To Cite

Gyatri P, Priyanka Rao N, Nishanth N, Abishek Raghav, Mrs. Vani K. A (2015). Comprehensive Comparative Study on Intrusion Detection System in Cloud Computing. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(6), -. https://europub.co.uk/articles/-A-21023