Security plays a distinctive role in the digital computing. All the operations are automatic and ... more Security plays a distinctive role in the digital computing. All the operations are automatic and servers maintain large volumes of data. This paper discusses different techniques and extends with the issues such as challenges, security attacks, DDoS attacks and intrusion detection methods. Cloud computing allows huge volume of storage on web which makes available the data and services in distributed environment. Intruders target the cloud based data due to its storage nature. The most famous attack of cloud computing is Distributed Denial of Service (DDoS) attack. The DDoS is the biggest threat in the areas of internet and internet of things (IOT). To prevent these kinds of attack, the intrusion detection system should have strong protective mechanism. This paper delivers an ample survey and comparative study on various cloud security attacks in browser, application, network and server level. The survey includes the DDoS attack types, vulnerabilities and intrusion detection techniques.
Cloud based E-Learning is the method to reduce cost and complexity of data accessing, which are c... more Cloud based E-Learning is the method to reduce cost and complexity of data accessing, which are controlled by third party services. Traditional E-Learning methods are incorporated with cloud computing technology to provide massive advantages to the academic users but it compromises in security aspects. Proposed methodology ensures data availability and provides solution to protect indispensable data from the attackers. This study identifies different security issues in cloud service delivery model with an aim to suggest a solution in the form of security measures related to the cloud based e-learning. Different types of attacks in service delivery models of e-learning proposed by different researchers are discussed. Threats, security requirements, and challenges involved are also taken into consideration. This study of e-Learning models advocates users to access their data in the cloud through a secured layer using the internet.
Security plays a distinctive role in the digital computing. All the operations are automatic and ... more Security plays a distinctive role in the digital computing. All the operations are automatic and servers maintain large volumes of data. This paper discusses different techniques and extends with the issues such as challenges, security attacks, DDoS attacks and intrusion detection methods. Cloud computing allows huge volume of storage on web which makes available the data and services in distributed environment. Intruders target the cloud based data due to its storage nature. The most famous attack of cloud computing is Distributed Denial of Service (DDoS) attack. The DDoS is the biggest threat in the areas of internet and internet of things (IOT). To prevent these kinds of attack, the intrusion detection system should have strong protective mechanism. This paper delivers an ample survey and comparative study on various cloud security attacks in browser, application, network and server level. The survey includes the DDoS attack types, vulnerabilities and intrusion detection techniques.
Cloud based E-Learning is the method to reduce cost and complexity of data accessing, which are c... more Cloud based E-Learning is the method to reduce cost and complexity of data accessing, which are controlled by third party services. Traditional E-Learning methods are incorporated with cloud computing technology to provide massive advantages to the academic users but it compromises in security aspects. Proposed methodology ensures data availability and provides solution to protect indispensable data from the attackers. This study identifies different security issues in cloud service delivery model with an aim to suggest a solution in the form of security measures related to the cloud based e-learning. Different types of attacks in service delivery models of e-learning proposed by different researchers are discussed. Threats, security requirements, and challenges involved are also taken into consideration. This study of e-Learning models advocates users to access their data in the cloud through a secured layer using the internet.
Uploads