Prevention of data theft attacks in infrastructure as a service cloud through trusted computing

3Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Dispensed computing is a developmental model that permits cloud consumer to name for assets with on-request management and use the assets utilizing pay in step with use version. Due to this pliability, the dispensed computing implementing colossal safety dangers. Consistent with the pc security Alliance, an insider chance is a noteworthy chance in distributed computing situation. This threat quite influences the data trustworthiness and classification of cloud client applications, administrations, or statistics. In this paper, we generally have a tendency to specializing in corporation reliable attacks on consumer virtual machines and anticipated a structure that upholds facts respectability and privateness, littlest TPM activities, and decreased and irrefutable reliable figuring base. Our exploratory consequences show the us of the united states that custom remember-visor hyper-visor playacting brilliant and it will prevent and word the business enterprise legitimate assaults in cloud surroundings.

Cite

CITATION STYLE

APA

Chaitanya, G. K., Amarendra, K., Aslam, S., Soundharya, U. L., & Saikushwanth, V. (2019). Prevention of data theft attacks in infrastructure as a service cloud through trusted computing. International Journal of Innovative Technology and Exploring Engineering, 8(6 Special Issue 4), 1278–1283. https://doi.org/10.35940/ijitee.F1262.0486S419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free