A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks

A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks

B. V. Subba Rao, Vivek Sharma, Neeraj Rathore, Devendra Prasad, Harishchander Anandaram, Gaurav Soni
Copyright: © 2023 |Pages: 22
DOI: 10.4018/IJCAC.317220
Article PDF Download
Open access articles are freely available for download

Abstract

The concept of cloud computing makes it possible to have a shared pool of reconfigurable computing resources that can be deployed and released with little involvement from administration work or service providers. Cloud computing makes this possible. The communication among the nodes is possible with the help of internet. All users are able to use the services of cloud. The small-scale industries are really happy to use the cloud services. The attackers are degrading the performance of services, and also the users are not receiving the response. This paper presents the imprint of cloud computing. Flooding attacks or the DoS attack is one attack that reserves the communication resources in network, and the rest of the attacks, like Sybil attack, misguide the users, and also it is not easy to identify the exact identification of the sender. The security schemes are able to remove attacker infection, and on the basis of that, it is possible to design better schemes against attackers in the cloud.
Article Preview
Top

1. Introduction

Cloud The term “cloud computing” refers to the aggregation of data and the availability of computing resources that are made available via the internet. On your personal computer, there is no data that is saved. The provisioning, on demand, of computing resources such as servers, data storage, networking, and databases, amongst other such resources. The ability to provide multiple users with access to data centres is one of the primary goals of cloud computing (P. Mell et. al. 2009, Zhao G et. al. 2009). Users also have the option to view data stored on a remote server. The potential for financial savings is the primary driver behind the adoption of cloud computing by a large number of companies and organizations. Figure 1 shows how many different kinds of devices and applications are able to satisfy their needs with the help of cloud computing. Cloud computing gives you the freedom to access resources whenever you need them and the flexibility to pay for only what you consume. The infrastructure of the cloud has made it easier to manage IT tasks as an outsourced unit without having to hire a lot of personals.

Figure1.

Example of Cloud Computing

IJCAC.317220.f01

A cutting-edge technology that now allows for the provision of varied computing resources to developers is cloud computing. Through the cloud computing area, resources are offered as Software as a Service, Platform as a Service, and Infrastructure as a Service (P. Mell et. al. 2009).

Cloud computing environments can be broken down into two distinct categories of actors: cloud providers and cloud users (P. Mell et. al. 2009). On the one hand, providers keep massive amounts of computing resources in large data centers and then rent them out to customers on a pay-per-use basis. On the other hand, some users have apps that can handle a variety of loads, and they rent resources from providers in order to run those apps. The relationship that exists between providers of a service and the people who make use of that service typically takes the form shown in Figure 1.1. The process begins with a user sending a request for a resource to a provider. When the request is received by the provider, the provider searches for resources that can satisfy the request and then allocates those resources to the user who made the request, typically in the form of virtual machines (VMs). The user will then run the programmed on the allocated resources, at which point they will be required to pay for the resources that they have used. After the user is finished making use of the resources, they are handed back over to the person who provided them.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing