IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 6 - Issue 1, January 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Research About Attacks Over Cloud Environment

[Full Text]

 

AUTHOR(S)

Li Jie, Fatma Fawzi

 

KEYWORDS

cloud computing, attacks, countermeasures.

 

ABSTRACT

Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information, data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud (Next Generation Secure Cloud Storage) is used and modified to administer the proposed model. This implementation achieved security functions, potential attacks as defined in the proposed model. Finally, we also solve some attacks over cloud computing to provide the security and safety of the cloud.

 

REFERENCES

[1] G. P. Pragnesh, and M. S. Sanjay," Survey On Data Security In Cloud Computing, " International Journal of Engineering Research & Technology (IJERT), vol. 1, no. 9, pp. 1-8, 2012.

[2] Z. Dimitrios, and L. Dimitrios," Addressing cloud computing security issues," FutureGenerationComputerSystems, vol. 28, pp. 583–592, 2012.

[3] S. O. Kuyoro, F. Ibikunle, and O. Awodele," Cloud Computing Security Issues and Challenges," International Journal of Computer Networks (IJCN), vol. 3, no. 5, pp. 247-255, 2011.

[4] R. Ajay, L. Sharma, and R. Bhardwaj “Possible Attacks in Cloud Computing,” National Conference on Advanced Computing Technologies (NCACT) at Maharshi Dayanand University, Rohtak, 2013

[5] C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A survey of intrusion detection techniques in Cloud," Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42–57, 2013.

[6] E. Ogren, “Whitelists SaaS modify traditional security, tackle flaws,” Sep. 17, 2009. http://searchsecurity. techtarget. com/news/column/0, 29 4698, sid14_gci1368647, 00. html. 2009.

[7] Z. Trabelsi, H. Rahmani, K. Kaouech, and M. Frikha, “Malicious Sniffing System Detection Platform,” Proceedings of the 2004 International Symposium on Applications and the Internet (SAINT'04), pp. 201-207, 2004.

[8] E. D. John, “Spammers break Hotmail’s CAPTCHA yet again,” Tech- world, Feb. 16, 2009.

[9] M. Gregg "10 Security Concerns for Cloud Computing," Expert Reference Series of White Papers, www.globalknowledge.com.

[10] X. Dong, J. Yu, Y. Luo, Y. Chen, G. Xue, amd M. Li,”Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing,“ journal of computer & security, vol. 42, pp. 151-164, 2014.

[11] P. Lavanya, S. Komala, and N. Vikram,” Anonymous Data Sharing Scheme for Dynamic Groups in an Untrusted Cloud,” International Journal of Computer Science (IIJCS), vol. 2, no. 8, pp. 39-45, 2014.

[12] T. Davis, "RSA encryption." Chapter one (2003): 1-4.