Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/467026
Title: The impact of reliable cloud storage model for direct and indirect attacks
Researcher: Karthika , A
Guide(s): Muthukumaran, N
Keywords: Engineering and Technology
Computer Science
Computer Science Hardware and Architecture
Cloud storage
Security
Direct Attacks
University: Anna University
Completed Date: 2022
Abstract: Cloud computing, as an emerging information service model, has had a significant impact on computing services in this era. However, because of the dynamic and complicated nature of the cloud environment, consumers who use cloud services face a variety of data security and personal privacy issues. These issues have become a significant impediment to the growth of cloud computing. In this perspective, trust is critical in the cloud environment in order to provide dependable services to cloud customers. It is the main reason for the popularity of cloud services among users. When analyzing and selecting cloud services, however, consumers are confronted with the diversity and complexity of Quality of Service (QoS).To boost user satisfaction and interaction success rates, it is critical to research and build an effective and objective cloud storage model. Many cloud services with comparable functions but variable performance is often available. This makes it tough for users to choose the best cloud service. As a result, determining trustworthiness is becoming increasingly important in order to find and use the best cloud storage Model. In a cloud context, Quality of Service (QoS) criteria is critical for assessing trust. Traditional trust assessment methodologies ignore these traits since they are dynamically changing. To provide a secure cloud storage Model, the security requirements of cloud computing should be taken into account. Cloud computing services may have many security issues due to direct and indirect attacks from malicious users. Direct attacks like Economic Denial of Sustainability (EDoS) attack does not allow the user to access the cloud services at a time by flooding the traffic which leads to economic loss for the user. Phishing and Malware injection attacks indirectly attack the user by sending a fake link to the user to hack their account or inject malicious code into the VM of the user. A Cloud storage model is secure only if it can overcome these attacks and allow the users to work at ease and pro
Pagination: xvi,174p.
URI: http://hdl.handle.net/10603/467026
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File26.95 kBAdobe PDFView/Open
02_prelim pages.pdf2.35 MBAdobe PDFView/Open
03_content.pdf28.15 kBAdobe PDFView/Open
04_abstract.pdf252.06 kBAdobe PDFView/Open
05_chapter 1.pdf1.3 MBAdobe PDFView/Open
06_chapter 2.pdf670.47 kBAdobe PDFView/Open
07_chapter 3.pdf1 MBAdobe PDFView/Open
08_chapter 4.pdf672.52 kBAdobe PDFView/Open
09_chapter 5.pdf883.68 kBAdobe PDFView/Open
10_annexures.pdf149.91 kBAdobe PDFView/Open
80_recommendation.pdf126.06 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: