Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/594819
Title: Design Trust Based Malware Detection System for Secure Cloud Computing
Researcher: Manjushree, C V
Guide(s): Nandakumar, A N
Keywords: Computer Science
Computer Science Interdisciplinary Applications
Engineering and Technology
University: Visvesvaraya Technological University, Belagavi
Completed Date: 2024
Abstract: Cloud Computing refers to the use of computer resources as a service on demand via the newlineInternet. It is mainly based on data and applications outsourcing, traditionally stored on users newlinecomputers, to remote servers (data centers) owned, administered, and managed by third parties. Data newlinesecurity is a common concern for all technologies. However, it becomes a major challenge when newlineapplied to an uncontrolled environment like Cloud Computing. It is important to distinguish between newlinethe security risks associated with all IT infrastructures and those introduced by the use of Cloud newlineComputing. These risks are generally associated with open, shared, and distributed environments. newlineTherefore, when analyzing the risks, it is important to separate existing problems from those raised newlineby Cloud Computing. newlineComputing remotely also brings with it the most sensitive and significant aspect of data newlinesecurity. Data being resident on servers and infrastructure that are opaque to users brings with it the newlinehuge advantage of ridding users of all the infrastructure operational liabilities. But this also means newlinethe data owned by users navigates through routes either unknown or no control territory. This newlineglaringly brings the security of data on the cloud with high vulnerability. The first research work newlineexplores dimensionally various such vulnerabilities and related strategies to circumvent them does newlineinvolve a sensitive section of modern technology in today s world of computing. An insight through newlinevarious levels of infrastructure, application, data, and network architecture gives this research newlineenough evidence that the complexities involved in maintaining the security problems of cloud newlinecomputing is nevertheless a path most discussed and debated. newlineDue to diverse software vulnerabilities and hardware attacks, user credentials are vulnerable newlineor could land in demilitarized zones. In the second research work, an attempt is made to explore and newlinefinally propose a trust-based malware detection based on optimal data classification. An improved newlineglowworm swarm opti
Pagination: 136
URI: http://hdl.handle.net/10603/594819
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File298.1 kBAdobe PDFView/Open
02_prelim pages.pdf563.55 kBAdobe PDFView/Open
03_content.pdf308.99 kBAdobe PDFView/Open
04_abstract.pdf464.8 kBAdobe PDFView/Open
05_chapter 1.pdf528.67 kBAdobe PDFView/Open
06_chapter 2.pdf231.18 kBAdobe PDFView/Open
07_chapter 3.pdf236.05 kBAdobe PDFView/Open
08_chapter 4.pdf322.43 kBAdobe PDFView/Open
09_chapter 5.pdf379.5 kBAdobe PDFView/Open
10_annexures.pdf149.13 kBAdobe PDFView/Open
11_chapter 6.pdf321.5 kBAdobe PDFView/Open
80_recommendation.pdf58.42 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: