International Journal of Advances in Computer Science and Cloud Computing (IJACSCC)
.
Follow Us On :
current issues
Volume-11,Issue-2  ( Nov, 2023 )
Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 20
Paper Published : 176
No. of Authors : 459
  Journal Paper


Paper Title :
Existing Security Measurement Model In Cloud Computing (ESMM)

Author :Irvin Singh Dua, Ved Vyas Diwedi

Article Citation :Irvin Singh Dua ,Ved Vyas Diwedi , (2014 ) " Existing Security Measurement Model In Cloud Computing (ESMM) " , International Journal of Advances in Computer Science and Cloud Computing (IJACSCC) , pp. 19-26, Volume-2,Issue-1

Abstract : Abstract: In last few years, cloud computing concept has emerged a lot which result that it has become the fastest growing business for the IT industry. In this paper, I present an extensive review on cloud computing with the main focus on gaps and security concerns. We identify the top security threats and their existing solutions. We also investigate the challenges/obstacles in implementing threat remediation. To address these issues, we propose a proactive threat detection model by adopting three main goals: (i) detect an attack when it happens, (ii) alert related parties (system admin, data owner) about the attack type and take combating action, and (iii) generate information on the type of attack by analysing the pattern (even if the cloud provider attempts subsection). To emphasize the importance of monitoring cyber-attacks we provide a brief overview of existing literature on cloud computing security. Then I generate some real cyber-attacks that can be detected from performance data in a hypervisor and its guest operating systems. I employ modern machine learning techniques as the core of our model and accumulate a large database by considering the top threats. A variety of model performance measurement tools are applied to verify the model attack prediction capability. I observed that the Support Vector Machine technique from statistical machine learning theory is able to identify the top attacks with an accuracy of 97.13%. I have detected the activities using performance data (CPU, disk, network and memory performance) from the hypervisor and its guest operating systems, which can be generated by any cloud customer using built-in or third party software. Thus, one does not have to depend on cloud providers’ security logs and data. I believe our line of thoughts comprising a series of experiments will give researchers, cloud providers and their customers a useful guide to proactively protect themselves from known or even unknown security issues that follow the same patterns. In this paper will focus on existing models available for security and will discuss the loopholes and later will discuss the Proactive approach to detect and cure the security issues using machine learning techniques.

Type : Research paper

Published : Volume-2,Issue-1


DOIONLINE NO - IJACSCC-IRAJ-DOIONLINE-680   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 67
| Published on 2014-05-05
   
   
IRAJ Other Journals
IJACSCC updates
IJACSCC Volume-11,Issue-2(Nov, 2023)
The Conference World

JOURNAL SUPPORTED BY


Warning: include(footer.php): failed to open stream: No such file or directory in /home/dakhinaray/public_html/ITRESEARCH_WEBSTE/IRAJ.IN/journal/IJACSCC/paper_detail.php on line 842

Warning: include(): Failed opening 'footer.php' for inclusion (include_path='.:/opt/alt/php56/usr/share/pear:/opt/alt/php56/usr/share/php') in /home/dakhinaray/public_html/ITRESEARCH_WEBSTE/IRAJ.IN/journal/IJACSCC/paper_detail.php on line 842