International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107 | Views: 254

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.3 / 10


     

Security Service Model for Cloud Environment

Shafali Gupta, Neha R Gedam


Abstract: Cloud computing is becoming increasingly important for provision of services and storage of data in the Internet. However there are several significant challenges in securing cloud infrastructures from different types of attacks. The focus of this paper is on the security services that a cloud provider can offer as part of its infrastructure to its customers (tenants) to counteract these attacks. We have to describes the design of the security architecture and discusses how different types of attacks are counteracted by the proposed architecture.


Keywords: Cloud security, security architecture, security issues and privacy


Edition: Volume 3 Issue 12, December 2014


Pages: 1259 - 1361



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Shafali Gupta, Neha R Gedam, "Security Service Model for Cloud Environment", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 1259-1361, https://www.ijsr.net/getabstract.php?paperid=SUB14667, DOI: https://www.doi.org/10.21275/SUB14667

Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, United States of America, Volume 12 Issue 11, November 2023

Pages: 998 - 1004

AI-Infused Threat Detection and Incident Response in Cloud Security

Sumanth Tatineni

Share this Article

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 1816 - 1822

Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing

Pushpjeet Cholkar, Dr. Margi Patel

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 12 Issue 12, December 2023

Pages: 2074 - 2078

DevSecOps: Integrating Security into the DevOps Pipeline

Dinesh Reddy Chittibala

Share this Article

Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 213 - 217

An Automated Data Deletion: A Secure Method for Multi-Cloud Security with Intrusion Detection System

Jashanbir Singh, Dr. Gurjit Singh Bhathal

Share this Article

Downloads: 11 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 10, October 2024

Pages: 862 - 868

Cybersecurity Tool Rationalization: A Strategic Approach to Optimizing Cybersecurity Infrastructure with Machine Learning Integration

Mohammad Usama Qureshi, Akshat Kumawat, Yash Saxena

Share this Article



Top