Comprehensive Comparative Study on Intrusion Detection System in Cloud Computing
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 6
Abstract
Cloud computing involves deploying groups of remote servers and software networks that allow different kinds of data sources be uploaded for real time processing to generate computing results without the need to store processed data on the cloud. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.Security is one of the concerns about cloud computing that is delaying its adoption. One of the biggest security concerns about is that when you move your information over the cloud you will lose control of it. The cloud gives you the access data, but you have no way of ensuring no one else has access the data. Intruders are the network security attackers intend to breach cloud security. In spite of security issues cloud computing has become very essential needs of the industry. One of the security mechanisms to prevent this issue is Intrusion Detection Systems (IDS). In this paper our focus is to design an Intrusion Detection System (IDS) to defend against the cloud intruders.
Authors and Affiliations
Gyatri P, Priyanka Rao N, Nishanth N, Abishek Raghav, Mrs. Vani K. A
Study ABO Blood Grouping of Forensically Important Saliva Samples through Assessment of Surface Materials-an Effective Parameter
Detection of saliva stains encountered in forensic investigation is one of the primary objectives for forensic serologist as saliva may be an important source of DNA. Blood grouping can be done from the saliva if the pe...
A Power Equalizer for Shaded PV Module
This paper deals with a photovoltaic (PV)-module embedded power-electronics topology derived from a battery equalizer. The photovoltaic equalizer is a promising response to the problems of partial shading in photovoltai...
Performance Evaluation of Enhanced LocationAided ZRP in MANET
MANET is the infrastructure less and self-configuring network, in which nodes are free to move without the need of localised base station. Zone Routing Protocol (ZRP) is a hybrid protocol which is used to allow communic...
Swelling Properties of Fly Ash Mixed with Bentonite
The present study has been carried out to find out the swelling properties of fly ash and bentonite mixtures. Laboratory tests were conducted at different proportions of fly ash and bentonite. Fly ash is a naturally cem...
Synthesis and Study of Optical Properties of Thiol- Capped CdSe Quantum Dots
Cadmium selenide (CdSe) QDs have been synthesized in aqueous solution using 1-thioglycerol (TGH), thioglycolic acid (TGA) as stabilizers applying freezing temperature injection technique. QDs have been characterized by...