Detail Study of Cloud Infrastructure Attacks and Security Techniques
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2021, Vol 9, Issue 2
Abstract
Cloud computing is Internet-based computing and the next stage in the evolution of the internet. The uses of the cloud attract different industries in the recent decade, but this brings security challenges against attacks from insider or outsider, human or bot. Many researchers are working continuously to resolve the issues by introducing policies, algorithms for accessing and storage of client data. This paper gives a detailed survey on IAAS security issues. A virtual machine should be secured to handle data and maintain privacy. Methods proposed by various scholars are explained which directly or indirectly enhance the security of the cloud. Tenant-based measures were also in the solutions to various issues. Paper has listed some of the trust techniques developed by researchers for identifying any malicious machine.
Authors and Affiliations
Surendranath Singh B. G. , Dr. Sunil Phulre
CUMULATIVE SUM, CUMULATIVE SCORE AND NONPARAMETRIC CUSUM CONTROL CHARTS FOR DETECTING MEAN/MEDIAN CHANGE
Various control charts are already developed for the problem of detecting any shift in the mean/median of a sequence of observations from a specified control value taken from some process. Some of them for detecting smal...
Concept of the Antenna: A Comprehensive Review
The radio cable is the most fundamental part of a long-distance communication system. Electrical signals are converted into radio waves by radio wire, and vice versa. In order to fulfill the criteria of sign transmission...
Inferring User Search Goals using Feedback
For a wide subject and ambiguous query, diverse users may have distinctive search objectives when they submit it to a web search engine. The derivation and examination of user pursuit objectives i.e. goals can be extreme...
Global Exponential Stability and Stabilization of Fractional-Order Positive Switched Systems
This paper is concerned with the global exponential stability(GES) and stabilization of fractional-order positive switched systems(FOPSS) with average dwell time(ADT). Firstly, the the concept of GES is extended to FOPSS...
Higher Order Statics Based Primary User Emulation Attack Detection
Cognitive radio is one of the promising technique for dynamic spectrum sharing to solve the spectrum scarcity problem. Spectrum sensing is the key process in cognitive radio for the dynamic spectrum usage. But security i...