Downloads: 107 | Views: 254
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.3 / 10
Security Service Model for Cloud Environment
Shafali Gupta, Neha R Gedam
Abstract: Cloud computing is becoming increasingly important for provision of services and storage of data in the Internet. However there are several significant challenges in securing cloud infrastructures from different types of attacks. The focus of this paper is on the security services that a cloud provider can offer as part of its infrastructure to its customers (tenants) to counteract these attacks. We have to describes the design of the security architecture and discusses how different types of attacks are counteracted by the proposed architecture.
Keywords: Cloud security, security architecture, security issues and privacy
Edition: Volume 3 Issue 12, December 2014
Pages: 1259 - 1361
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, United States of America, Volume 12 Issue 11, November 2023
Pages: 998 - 1004AI-Infused Threat Detection and Incident Response in Cloud Security
Sumanth Tatineni
Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 1816 - 1822Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing
Pushpjeet Cholkar, Dr. Margi Patel
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, India, Volume 12 Issue 12, December 2023
Pages: 2074 - 2078DevSecOps: Integrating Security into the DevOps Pipeline
Dinesh Reddy Chittibala
Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 213 - 217An Automated Data Deletion: A Secure Method for Multi-Cloud Security with Intrusion Detection System
Jashanbir Singh, Dr. Gurjit Singh Bhathal
Downloads: 11 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 10, October 2024
Pages: 862 - 868Cybersecurity Tool Rationalization: A Strategic Approach to Optimizing Cybersecurity Infrastructure with Machine Learning Integration
Mohammad Usama Qureshi, Akshat Kumawat, Yash Saxena