An Enhanced Attack Graph Model Based Technique to Mitigate Zombie Attack in Cloud Computing using Fuzzy Logic

Ravneet Kaur, Rekha Bhatia

Abstract


A cloud storagea secure cloud of solid cloud data is a solid well-defined framework. This is the confidence of the cloud an essential undertaking for cloud specialist organizations. In this proposed research a technique is developed for security in cloud users. An improvement in the existing technique that is called Role Based Access Model is done by including the command and browser analysis. Using these included features the activities of any unauthorized or authorized person is recorded that is to be analyzed later on to find out the intruder in network of cloud. This implementation aims towards the establishment of performance qualitative analysis on load sharing in VM to VM and then implemented in Clouds with Java language. In this thesis the study of load balancing algorithm with heterogeneous resources of the cloud, followed by comparative survey of other algorithms in cloud computing with respect to scalability, homogeneity or heterogeneity and process migration. Cloudlet long length versus Host bandwidth a pattern is observed in which response time increases in proportionate manner. Using the modified approach the reduction in the down time of the various processes is achieved as shown in results.

Full Text:

PDF

References


Chirag Langaliya, Rajanikanth Aluvalu, “Enhancing Cloud Security through Access Control Models: A Survey”, International Journal of Computer Applications, ISSN: 0975 – 8887, Volume 112, No. 7, February 2015, pp: 8-12

Prachi Shah, “Data Security for Cloud Storage System Using Role Based Access Control”, International Journal of Science and Research, ISSN (Online): 2319-7064, Volume 4 Issue 1, January 2015, pp: 305-307

RajaniKanth Aluvalu, Lakshmi Muddana, “A Survey on Access Control Models in Cloud Computing”, Advances in Intelligent Systems and Computing, Volume: 1, 2016, pp: 653-664

B. Mahesh Babu, Mary Saira Bhanu, “Prevention of Insider Attacks by Integrating Behavior Analysis with Risk based Access Control Model to Protect Cloud”, Eleventh International Multi-Conference on Information Processing, Volume: 54, 2015, pp: 157-166

Daniel Stock, Matthias Stöhr, Ursula Rauschecker, Thomas Bauernhansl, "Cloud-based Platform to facilitate Access to Manufacturing IT", 8th International Conference on Digital Enterprise Technology, Vol: 25, 2014, pp: 320-328

Jordan Shropshire, "Analysis of Monolithic and Microkernel Architectures: Towards Secure Hypervisor Design", 47th Hawaii International Conference on System Science, 2014, pp: 5008-5017

Rizwana Shaikh, M. Sasikumar, "Trust Model for Measuring Security Strength of Cloud Computing Service", International Conference on Advanced Computing Technologies and Applications, Vol: 45, 2015, pp: 380-389

Shams Zawoad, Ragib Hasan, John Grimes, "LINCS: Towards building a trustworthy litigation hold enabled cloud storage system", DFRWS, 2015

Rizwana Shaikh, M. Sasikumar, "Data Classification for achieving Security in cloud computing", Vol: 45, 2015, pp: 493-498

M.Arun Fera, C.manikandaprabhu, Ilakiya Natarajan, K.Brinda, R.Darathiprincy, "Enhancing security in Cloud using Trusted Monitoring Framework", International Conference on Intelligent Computing, Communication & Convergence, Vol: 48, 2015, pp: 198-203


Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.