Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/467026
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | The impact of reliable cloud storage model for direct and indirect attacks | |
dc.date.accessioned | 2023-03-09T06:31:42Z | - |
dc.date.available | 2023-03-09T06:31:42Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/467026 | - |
dc.description.abstract | Cloud computing, as an emerging information service model, has had a significant impact on computing services in this era. However, because of the dynamic and complicated nature of the cloud environment, consumers who use cloud services face a variety of data security and personal privacy issues. These issues have become a significant impediment to the growth of cloud computing. In this perspective, trust is critical in the cloud environment in order to provide dependable services to cloud customers. It is the main reason for the popularity of cloud services among users. When analyzing and selecting cloud services, however, consumers are confronted with the diversity and complexity of Quality of Service (QoS).To boost user satisfaction and interaction success rates, it is critical to research and build an effective and objective cloud storage model. Many cloud services with comparable functions but variable performance is often available. This makes it tough for users to choose the best cloud service. As a result, determining trustworthiness is becoming increasingly important in order to find and use the best cloud storage Model. In a cloud context, Quality of Service (QoS) criteria is critical for assessing trust. Traditional trust assessment methodologies ignore these traits since they are dynamically changing. To provide a secure cloud storage Model, the security requirements of cloud computing should be taken into account. Cloud computing services may have many security issues due to direct and indirect attacks from malicious users. Direct attacks like Economic Denial of Sustainability (EDoS) attack does not allow the user to access the cloud services at a time by flooding the traffic which leads to economic loss for the user. Phishing and Malware injection attacks indirectly attack the user by sending a fake link to the user to hack their account or inject malicious code into the VM of the user. A Cloud storage model is secure only if it can overcome these attacks and allow the users to work at ease and pro | |
dc.format.extent | xvi,174p. | |
dc.language | English | |
dc.relation | p.165-173 | |
dc.rights | university | |
dc.title | The impact of reliable cloud storage model for direct and indirect attacks | |
dc.title.alternative | ||
dc.creator.researcher | Karthika , A | |
dc.subject.keyword | Engineering and Technology | |
dc.subject.keyword | Computer Science | |
dc.subject.keyword | Computer Science Hardware and Architecture | |
dc.subject.keyword | Cloud storage | |
dc.subject.keyword | Security | |
dc.subject.keyword | Direct Attacks | |
dc.description.note | ||
dc.contributor.guide | Muthukumaran, N | |
dc.publisher.place | Chennai | |
dc.publisher.university | Anna University | |
dc.publisher.institution | Faculty of Information and Communication Engineering | |
dc.date.registered | ||
dc.date.completed | 2022 | |
dc.date.awarded | 2022 | |
dc.format.dimensions | 21cm | |
dc.format.accompanyingmaterial | None | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 26.95 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 2.35 MB | Adobe PDF | View/Open | |
03_content.pdf | 28.15 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 252.06 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 1.3 MB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 670.47 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 1 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 672.52 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 883.68 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 149.91 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 126.06 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: