CFP last date
20 December 2024
Reseach Article

Security Solutions for Cloud Computing

by Aarti Potdar, Pranav Patil, Raunak Bagla, Rohitashwa Pandey
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 128 - Number 16
Year of Publication: 2015
Authors: Aarti Potdar, Pranav Patil, Raunak Bagla, Rohitashwa Pandey
10.5120/ijca2015906747

Aarti Potdar, Pranav Patil, Raunak Bagla, Rohitashwa Pandey . Security Solutions for Cloud Computing. International Journal of Computer Applications. 128, 16 ( October 2015), 17-21. DOI=10.5120/ijca2015906747

@article{ 10.5120/ijca2015906747,
author = { Aarti Potdar, Pranav Patil, Raunak Bagla, Rohitashwa Pandey },
title = { Security Solutions for Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 128 },
number = { 16 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume128/number16/22957-2015906747/ },
doi = { 10.5120/ijca2015906747 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:21:52.485267+05:30
%A Aarti Potdar
%A Pranav Patil
%A Raunak Bagla
%A Rohitashwa Pandey
%T Security Solutions for Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 128
%N 16
%P 17-21
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the recent times, most organizations in the world have increasingly realized the importance of cloud platforms. Cloud computing is an emerging technology to store and access personal data along with business information from remote locations. One of the benefits of using cloud computing is the ability to tap into huge quantities of both structured and unstructured data. With every new technology there are certain drawbacks associated with it and cloud is no exception. Unlike others, Cloud environment also faces challenges such as Distributed denial of service (DDoS) attacks, data thefts, particularly when they are insider attacks. Increase in the number of DDoS attacks is one of the latest issues. We have studied various intrusion detection techniques that includes Cloud trace back model, use of back propagation neural network and Virtual Intrusion Detection Systems (V-IDS). Now these attacks can be prevented using the proposed Intrusion Prevention System i.e. Service-based Intrusion Prevention System in Cloud Computing (SIPSCC). A technique called fog computing can be used to detect and prevent data theft attacks by malicious insiders is studied.

References
  1. Pasquale Donadio, ”Virtual Intrusion Detection Systems in the Cloud”, Bell Labs Technical Journal 17(3), 2012, pp 113-128
  2. Saeed M. Alqahtani , Maqbool Al Balushi, Robert John, “An Intelligent Intrusion Prevention System for Cloud Computing (SIPSCC)” in 2014 International Conference on Computational Science and Computational Intelligence, IEEE, 2014, pp 152-158
  3. Bansidhar Joshi, A. Santhana Vijayan, Bineet Kumar
  4. Joshi, “Securing Cloud Computing Environment Against DDoS Attacks” DOI:10.1109/ICCCI.2012.6158817
  5. Salvatore J. Stolfo, “Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud”,2012, Under license to IEEE.DOI 10.1109/SPW.2012.19
  6. Marinos A. and Briscoe G., “Community Cloud Computing”, (pp. 472-484). Heidelberg: Springer, 2009, pp. 472- 484
  7. M. Ben-Salem and S. J. Stolfo, “Modeling user search behavior for masquerade detection,” in Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection. Heidelberg: Springer, September 2011, pp. 120.
  8. “Cloud Computing Vulnerability Incidents: A Statistical Overview”, Cloud Security Alliance, August 23, 2012; Revised March 13, 2013
  9. http://www.ibm.com/cloud-computing/
  10. www.ibm.com/services/us/en/it-services/securityservices/data-breach/
  11. https://paulsparrows.files.wordpress.com/2015/01/
  12. Trostle J, (2006), protecting Against Distributed Denial of service attacks Using Distributed Filtering, Securecomm and Workshops, Aug 28 2006- sept1 2006, pp 1-11
  13. A. K. Singh and S. Roy, “A network based vulnerability scanner for detecting sqli attacks in web applications” in Recent Advances in Information Technology (RAIT), 2012 1st International Conference on. IEEE, 2012, pp. 58.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Denial of Service Intrusion prevention Cloud Trace back Model Intrusion Detection Intrusion Prevention System Fog Computing.