Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/353364
Title: | SaaS Security Solutions Through Soft Computing Techniques |
Researcher: | Reddy Saisindhutheja |
Guide(s): | Gopal K Shyam |
Keywords: | Computer Science Computer Science Information Systems Engineering and Technology |
University: | REVA University |
Completed Date: | 2021 |
Abstract: | The Cloud prototype is growing extremely fast owing to its on-demand services. newlineSoftware-as-a Service (SaaS) is surrounded by the excellent and best ever rising field newlinein the epoch of Cloud computing. Companies are considering SaaS solutions which newlineprovide various advantages predominantly with decrease in cost and time. The major newlinefactor in the achievement of SaaS is based upon client s fulfilment. Security is found newlineas the major critical issue for SaaS in Cloud computing. SaaS in Cloud computing newlineprovides following benefits: efficient use of software licenses, modest tools, centralized newlinemanagement of data, multi-tenant solutions, minimal maintenance, easy upgrades and newlinescalability. newlineThe existing works on security in Cloud focuses on multi factor authentication, newlineverifying the access control, monitoring the data access, verifying the data deletion, newlinecontrolling the consumer access devices, security check events etc. However, these newlineservices are delayed and sometimes totally disrupted because of the Internet s newlineunavailability that provides opportunities for a lot of attacks. The range of intimidation newlinethat possibly attacks a network is considered as a hazardous. Worms, DoS or botnet newlineattacks are the subsets of threats that frequently occur in the networks. Further, there is newlinea need to implement a holistic solution for the model that allows malware prevention, newlinerisk assessment, malicious behaviour identification, data loss prevention and data newlineclassification. newlineImportant reasons for this gap could be due to the misconfigurations of Cloud services, newlinenot having an exit strategy; difficult to maintain noisy, voluminous and high newlinedimensionality data, increase in false positive percentage, lower attack detection rate, newlinepoor testing and training accuracy, less throughput which incurs in high delay. newlineInsufficient research exists; however, this research work is envisioned to fully newlineunderstand how attack detection, mitigation and risk assessment can be combined with newlinehybridised and enhanced soft computing techniques. newlineThis thesis has four contributio |
Pagination: | |
URI: | http://hdl.handle.net/10603/353364 |
Appears in Departments: | School of Computing and Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 91.05 kB | Adobe PDF | View/Open |
02_declaration.pdf | 121.88 kB | Adobe PDF | View/Open | |
03_acknoweledgements.pdf | 111.97 kB | Adobe PDF | View/Open | |
04_abstarct.pdf | 113.6 kB | Adobe PDF | View/Open | |
05_table of contents.pdf | 110.21 kB | Adobe PDF | View/Open | |
06_list of tables-figures-abbreviations.pdf | 129.03 kB | Adobe PDF | View/Open | |
07_chapter.1.pdf | 266.07 kB | Adobe PDF | View/Open | |
08_chapter.2.pdf | 171.55 kB | Adobe PDF | View/Open | |
09_chapter.3.pdf | 683.47 kB | Adobe PDF | View/Open | |
10_chapter.4.pdf | 737.3 kB | Adobe PDF | View/Open | |
11_chapter.5.pdf | 780.84 kB | Adobe PDF | View/Open | |
12_chapter.6.pdf | 1.03 MB | Adobe PDF | View/Open | |
13_chapter.7.pdf | 115.17 kB | Adobe PDF | View/Open | |
14_references.pdf | 252.5 kB | Adobe PDF | View/Open | |
15_publications.pdf | 109.04 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 327.51 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: