A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

The concept of cloud computing makes it possible to have a shared pool of reconfigurable computing resources that can be deployed and released with little involvement from administration work or service providers. Cloud computing makes this possible. The communication among the nodes is possible with the help of internet. All users are able to use the services of cloud. The small-scale industries are really happy to use the cloud services. The attackers are degrading the performance of services, and also the users are not receiving the response. This paper presents the imprint of cloud computing. Flooding attacks or the DoS attack is one attack that reserves the communication resources in network, and the rest of the attacks, like Sybil attack, misguide the users, and also it is not easy to identify the exact identification of the sender. The security schemes are able to remove attacker infection, and on the basis of that, it is possible to design better schemes against attackers in the cloud.

Cite

CITATION STYLE

APA

Rao, B. V. S., Sharma, V., Rathore, N., Prasad, D., Anandaram, H., & Soni, G. (2023). A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks. International Journal of Cloud Applications and Computing, 13(1). https://doi.org/10.4018/IJCAC.317220

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free