SAAS: Attack detection and prevention with forensic in cloud environment

1Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Basically cloud computing security is essential nowadays, it has arisen as a technology to allow users as well as clients to access communications, data storage, software as well as exploitation Environment according to pay-as-what-use structure. Conventional digital forensic can’t be investigated due to some technical challenges like environmental as well as technical. The vibrant nature of cloud computing provides massive opportunities to identify malicious request using various security algorithms in cloud environment. Proposed research work identifies the current issues and provides solutions to reduce some challenges in the cloud environment. In this paper system proposed forensic investigation of cloud security for trusted and untrusted environments. System illustrated the various machine learning algorithms for eliminate the malicious request, and investigate the malicious user also. Proposed method generate the user log base snapshot during the active session and manual investigator can verify all logs and identify the malicious user. We offer a skilled technique for forensic examination in the cloud with the help of virtual machine (VM) and generate snapshots. The experimental analysis shows illustration of proposed security of system.

Cite

CITATION STYLE

APA

Rahila, S. A., & Khonde, S. (2019). SAAS: Attack detection and prevention with forensic in cloud environment. International Journal of Innovative Technology and Exploring Engineering, 9(1), 1199–1203. https://doi.org/10.35940/ijitee.L2900.119119

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free