Detection and Isolation of Zombie Attack under Cloud Environment
Network security, data security and several other security types such as the computer security collectively compose the word "Cloud Security". Cloud computing posses a new challenge because traditional security mechanism is being followed are insufficient to safeguard the cloud resources. Cloud computing can easily be targeted by the attackers. A group of malicious users or illegitimate users can attack on system which may lead to denial the services of legitimate users. Such kinds of attacks are performed by the malicious (zombie) attackers. The zombie attack will degrade the network performance to large extend. Traditional techniques are not easily capable to detect the zombie attacker in the cloud network. So in this paper we have proposed a technique which is the enhancement of the mutual authentication scheme in order to detect and isolate zombie attack for the efficient performance of the network.
Keywords
- A.R.Khan, “Access Control in Cloud Computing Environment,” ARPN Journal of Engineering and Applied Sciences, 7(5), 2012.
- Y. G. Min, Y.H.Bang, “Cloud Computing Security Issues and Access Control Solutions”, Journal of Security Engineering, 2, 2012.
- M.Zhou, Y.Mu, W.Susilo, M.H.Au, “Privacy Preserved Access Control for Cloud Computing,” IEEE International Joint Conference, 2011.
- B. K. Onankunju,”Access Control in Cloud Computing”International Journal of Scientific and Research Publications, 3(9), 2013.
- M. George, C. Suresh, K. Saranya, “A Survey on Attribute Based Encryption Scheme in Cloud Computing” International Journal of Advanced Research in Computer and Communication Engineering 2(11), 2013.
- S. Chugh, S. Peddoju, “Access Control Based Data Security in Cloud Computing” International Journal of Engineering Research and Applications (IJERA) 2(3), 2012.
- M. Ali, C. Pravallika, P. Srinivas, “Multi-Attribute Based Access Control Policy Enforcement for File Accesses in Cloud” International Journal of Engineering Science and Innovative Technology (IJESIT) 2(5), 2013.
- D. Chen, “Data Security and Privacy Protection Issues in Cloud Computing” International Conference on Computer Science and Electronics Engineering, March 2012.
- G G. Ning, L.Jiamao, C. Xiaolu, “Theory and Practice R & D of Web Services” p. 10. Machinery Industry Press , 2006
- D. Contractor, D.R.Patel, “Trust management framework for attenuation of application layer ddos attack in cloud computing”, In: Trust Management VI, pp. 201–208. Springer, 2012.
- T. Karnwal, S. Thandapanii, A. Gnanasekaran, “A filter tree approach to protect Cloud Computing against Xml DDoS and http DDoS Attack”. In: Intelligent Informatics, pp. 459–469. Springer, 2013.
- A.Shitoot, S. Sahu, R. Chawda, “Security Aspects in Cloud Computing”, International Journal of Engineering Trends and Technology (IJETT)– 6,2013.
- S. Singla, J. Singh, “Cloud Data Security using Authentication and Encryption Technique” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) 2(7), 2013.
- B. Sevak, “Security against Side Channel Attack in Cloud Computing” International Journal of Engineering and Advanced Technology (IJEAT), 2(2), 2012.
- B. Makhija, V. Gupta, “Enhanced Data Security in Cloud Computing with Third Party Auditor”, International Journal of Advanced Research in Computer Science and Software Engineering, 2013.
- C. Barron, H. Yu, J. Zhan, “Cloud Computing Security Case Studies and Research”. Proceedings of the World Congress on Engineering, 2,2013.
Abstract Views: 328
PDF Views: 4