Shade Hope - A Protection Model

Authors

  • Abdul Laza  Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy engineering college, Chennai, Tamil Nadu, India
  • Madhavan B  Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy engineering college, Chennai, Tamil Nadu, India
  • Kapila Vani R K  Computer Science and Engineering, Prince Shri Venkateshwara Padmavathy engineering college, Chennai, Tamil Nadu, India

Keywords:

Cloud computing, advanced persistent threats, centralized server, cloud watch.

Abstract

The cloud is considered to be one of the most emerging technologies all around the globe. Cloud differs massively from other methods rather than having a centralized server. Hence we present a protection model in order to present the cloud from the advanced persistent threats. The penetration the cloud leads the vulnerability to the data present in the cloud hence protection to the cloud is considered to be the one of the major action to be action to be taken. Hence we introduce the cloud watch technique by implementing the trust manager and monitor the cloud in order to prevent the cloud from penetration.

References

  1.  W. Jansen and T. Grance, “Guidelines on security and privacy in public cloud computing,” NIST Spec. Publ. 800–144, National Institute of Standards and Technology, Gaithersburg, MD 20899, Dec. 2011.
  2. P. Mell and T. Grance, “The NIST definition of cloud computing,” NIST, Gaithersburg, MD, USA, Tech, Rep. SP 800-145, 2011.
  3. P. Jamshidi, A. Ahmad, and C. Pahl, “Cloud migration research: A systematic review,” IEEE Trans. Cloud Comput., vol. 1, no. 2, pp. 142–157, Jul.–Dec. 2013.
  4. L. Vaquero, L. Rodero-Merino, and D. Moran, “Locking the sky: A survey on IaaS cloud security,” Computing, vol. 91, no. 1, pp. 93–118, Jan. 2011.
  5. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds,” in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 199–212.
  6. A. Sood and R. Enbody, “Targeted cyber-attacks-a superset of advanced persistent threats,” IEEE Security Privacy, vol. 11, no. 1, pp. 54–61, Jan./Feb. 2013.
  7. B. Krekel, “Capability of the people’s republic of china to conduct cyber warfare and computer network exploitation,” U.S.-China Economic and Security Review Commission, Northrop Grumman Corp., DTIC Document, 2009.
  8. S. Zevin, Standards for Security Categorization of Federal Information and Information Systems, DIANE Publishing, 2009.
  9. J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “All your clouds are belong to us: security analysis of cloud management interfaces,” in Proc. 3rd ACM Workshop Cloud.
  10. Comput. Security Workshop, 2011, pp. 3–14. V. J. Winkler, Securing the Cloud: Cloud Computer Security Techniques and Tactics. Amsterdam, The Netherlands: Elsevier, 2011.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Abdul Laza, Madhavan B, Kapila Vani R K, " Shade Hope - A Protection Model, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 5, pp.1875-1880, March-April-2018.