Enhanced Cloud Security Implementation using Modified ECC Algorithm
Journal: International Journal of Trend in Scientific Research and Development (Vol.3, No. 5)Publication Date: 2019-15-8
Authors : R. Dhiviya K. Mohamed Amanullah;
Page : 2225-2230
Keywords : Computer Engineering; Cloud computing; Security challenges;
Abstract
Cloud computing is a distributed environment that encompasses thousands of computers that work in parallel to perform a task in lesser time than the traditional computing models. This parallelism enables the low cost virtualization of hardware resources with increased computational performances. Cloud computing provides tremendous opportunity for small and medium scale enterprises to grow their business using IT services with zero deployment cost. Whenever, a task is distributed over web, there encounters a series of potential threats that challenges the security of data such as buffer overflow, session hijacking and black hole attacks. A cloud computing based services also face such kinds of security issues where applications deployed on cloud can face same kind of attacks as that on client server model. Storage as a Service SaaS based applications are vulnerable to virus attacks .Online operating systems are available on cloud to the user for free .Viruses can spread as attachments of email, of part of the software or can stay in Master Boot Record MBR of the operating system available on cloud. Worms residing on one system in cloud can migrate to another system on its own. Trojan horse is software with wrong intentions. Thus the present system needs an effective mechanism to address the problem encountered in cloud computing. R. Dhiviya | K. Mohamed Amanullah "Enhanced Cloud Security Implementation using Modified ECC Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27870.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/27870/enhanced-cloud-security-implementation-using-modified-ecc-algorithm/r-dhiviya
Other Latest Articles
- The Effect of Dosage and Modulus of Activator on the Strength of Alkali Activated Slag and Fly Ash Based on Geopolymer Mortar
- Comparative Study on Construction Sequence Analysis on Steel Structure without and with Floating Columns
- Environmental Management Reporting and Corporate Performance Evidence from Natural Resources, Agriculture, Oil and Gas Firms in Nigeria
- Effective Methods and Strategies of Developing the Reading Skill
- Toward Cloud Network Infrastructure Approach Service and Security Perspective
Last modified: 2019-09-10 15:58:41