Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/467026
Full metadata record
DC FieldValueLanguage
dc.coverage.spatialThe impact of reliable cloud storage model for direct and indirect attacks
dc.date.accessioned2023-03-09T06:31:42Z-
dc.date.available2023-03-09T06:31:42Z-
dc.identifier.urihttp://hdl.handle.net/10603/467026-
dc.description.abstractCloud computing, as an emerging information service model, has had a significant impact on computing services in this era. However, because of the dynamic and complicated nature of the cloud environment, consumers who use cloud services face a variety of data security and personal privacy issues. These issues have become a significant impediment to the growth of cloud computing. In this perspective, trust is critical in the cloud environment in order to provide dependable services to cloud customers. It is the main reason for the popularity of cloud services among users. When analyzing and selecting cloud services, however, consumers are confronted with the diversity and complexity of Quality of Service (QoS).To boost user satisfaction and interaction success rates, it is critical to research and build an effective and objective cloud storage model. Many cloud services with comparable functions but variable performance is often available. This makes it tough for users to choose the best cloud service. As a result, determining trustworthiness is becoming increasingly important in order to find and use the best cloud storage Model. In a cloud context, Quality of Service (QoS) criteria is critical for assessing trust. Traditional trust assessment methodologies ignore these traits since they are dynamically changing. To provide a secure cloud storage Model, the security requirements of cloud computing should be taken into account. Cloud computing services may have many security issues due to direct and indirect attacks from malicious users. Direct attacks like Economic Denial of Sustainability (EDoS) attack does not allow the user to access the cloud services at a time by flooding the traffic which leads to economic loss for the user. Phishing and Malware injection attacks indirectly attack the user by sending a fake link to the user to hack their account or inject malicious code into the VM of the user. A Cloud storage model is secure only if it can overcome these attacks and allow the users to work at ease and pro
dc.format.extentxvi,174p.
dc.languageEnglish
dc.relationp.165-173
dc.rightsuniversity
dc.titleThe impact of reliable cloud storage model for direct and indirect attacks
dc.title.alternative
dc.creator.researcherKarthika , A
dc.subject.keywordEngineering and Technology
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Hardware and Architecture
dc.subject.keywordCloud storage
dc.subject.keywordSecurity
dc.subject.keywordDirect Attacks
dc.description.note
dc.contributor.guideMuthukumaran, N
dc.publisher.placeChennai
dc.publisher.universityAnna University
dc.publisher.institutionFaculty of Information and Communication Engineering
dc.date.registered
dc.date.completed2022
dc.date.awarded2022
dc.format.dimensions21cm
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File26.95 kBAdobe PDFView/Open
02_prelim pages.pdf2.35 MBAdobe PDFView/Open
03_content.pdf28.15 kBAdobe PDFView/Open
04_abstract.pdf252.06 kBAdobe PDFView/Open
05_chapter 1.pdf1.3 MBAdobe PDFView/Open
06_chapter 2.pdf670.47 kBAdobe PDFView/Open
07_chapter 3.pdf1 MBAdobe PDFView/Open
08_chapter 4.pdf672.52 kBAdobe PDFView/Open
09_chapter 5.pdf883.68 kBAdobe PDFView/Open
10_annexures.pdf149.91 kBAdobe PDFView/Open
80_recommendation.pdf126.06 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: