ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

The Security Threats in Cloud Architecture-A Review

Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 7)

Publication Date:

Authors : ; ;

Page : 1953-1955

Keywords : Cloud Computing; Security; Mutual Authentication Schemes;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The cloud computing architecture in which third party, virtual machine and cloud service provider are involved for data uploading and downloading. The security, access controls are the various issues which are in the cloud architecture. The security is the main issue which reduce the performance of cloud architecture. Among security attacks zombie attack is the most advance type of attack. This attack reduces network performance in terms of delay and bandwidth consumption. In the zombie attack, some malicious nodes may join the network which spoof data of the legitimate and zombie nodes start communicate with virtual machine on the behalf of legitimate node. In this work, enhancement will be proposed in access control scheme which will detect malicious nodes from the network and isolate then from the cloud architecture.

Last modified: 2021-07-01 14:40:32