ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

OPTIMAL SECURITY SOLUTION AND COVERAGE ON VULNERABILITIES IN CLOUD USING HYBRID OPTIMIZATION ALGORITHMS ACCORDING TO IT-INDUSTRY NEED

Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) (Vol.11, No. 12)

Publication Date:

Authors : ;

Page : 2031-2043

Keywords : vulnerability; CSA security solutions; cuckoo algorithm; cloud computing;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In today's cloud computing technical era, all market strategy is to make software industry growing rapidly, which makes the data also grows in cloud storage. The challenge is to secure the data in cloud server , as everybody moving towards cloud computing technology .Cloud computing is provider of best services because of its inherit features. The Software organization putting lot of sensitive data in cloud servers, which is concern about the safety and security of data from various attacks. The on-demand services by cloud are more venerable on sensitive data that is transmitting over web. Main priority is to maintain integrity, confidentiality and availability .IT organizations keeps on mitigating vulnerability with cutting the cost which benefits the organization without financial loss. This research paper recommends and proposes the comprehensive framework for vulnerabilities coverage and cost mitigation using HCS .The objective is to eliminate the selected vulnerability with optimized cost. The result gives the information to IT organization to choose the correct trend technology as per needs with cost effectiveness using recommended approach

Last modified: 2021-02-24 17:59:25