Open Access   Article Go Back

A Novel Approach for Security in Cloud Environment

M. Prithika1

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-02 , Page no. 126-133, Jan-2019

Online published on Jan 31, 2019

Copyright © M. Prithika . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Prithika, “A Novel Approach for Security in Cloud Environment,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.126-133, 2019.

MLA Style Citation: M. Prithika "A Novel Approach for Security in Cloud Environment." International Journal of Computer Sciences and Engineering 07.02 (2019): 126-133.

APA Style Citation: M. Prithika, (2019). A Novel Approach for Security in Cloud Environment. International Journal of Computer Sciences and Engineering, 07(02), 126-133.

BibTex Style Citation:
@article{Prithika_2019,
author = {M. Prithika},
title = {A Novel Approach for Security in Cloud Environment},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {02},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {126-133},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=661},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=661
TI - A Novel Approach for Security in Cloud Environment
T2 - International Journal of Computer Sciences and Engineering
AU - M. Prithika
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 126-133
IS - 02
VL - 07
SN - 2347-2693
ER -

           

Abstract

Cloud registering is one of the present most energizing advances, since it can lessen the expense and intricacy of uses, and it is adaptable and versatile. These advantages changed cloud registering from a marvelous thought into one of the quickest developing innovations today. As a matter of fact, virtualization technology is based on virtualization technology which is an old technology and has had security issues that must be tended to before cloud technology is influenced by them. What`s more, the virtualization technology has limit security abilities so as to anchor wide zone condition, for example, the cloud. Along these lines, the improvement of a powerful security framework requires changes in conventional virtualization engineering. This paper proposes new security design in a hypervisor-based virtualization technology so as to anchor the cloud condition.

Key-Words / Index Term

Cloud Computing, Threats, Attack

References

[1] Biggs and S. Vidalis, "Cloud Computing: The Impact on Digital Forensic Investigations," 2010, pp. 1-6.
[2] G. Brunette and R. Mogull, "Security guidance for critical areas of focus in cloud computing v3.0," Cloud Security Alliance, 2011.
[3] Dhage, et al., "Intrusion detection system in cloud computing environment," presented at the Proceedings of the International Conference Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, 2011.
[4] M. B. Salem, et al., "A survey of insider attack detection research," Insider Attack and Cyber Security, pp. 69-90, 2008.
[5] J. Sheridan and C. Cooper, "Whitepaper: Defending the Cloud," 2012.
[6] L. M. Kaufman. Can Public-Cloud Security Meet Its Unique Challenges?, vol. 8, no. 4. IEEE Computer Society, 2010, pp. 55-57.
[7] D. L. Oppenheimer and M. R. Martonosi, "Performance signatures: A mechanism for intrusion detection," in Proceedings of the 1997 IEEE Information Survivability Workshop, 1997.
[8] A. Avritzer, et al., "Monitoring for security intrusion using performance signatures," 2010, pp. 93-104.
[9] M. Christodorescu, et al., "Cloud security is not (just) virtualization security: a short paper," in Proceedings of the 2009 ACM workshop on Cloud computing security, 2009, pp. 97-102.
[10] T. Garfinkel and M. Rosenblum, "A virtual machine introspection based architecture for intrusion detection," 2003.