International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 116

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 4, April 2017


A Novel Approach to Provide Security for Cloud Data

K. Anbazhagan, R. Sugumar


Abstract: Conceding security in a distributed system needs more than user authentication with passwords or digital certificates and confidentiality in data transmission. Distributed model of cloud makes it vulnerable and prone to sophisticated distributed intrusion attacks like Distributed Denial of Service (DDOS) and Cross Site Scripting (XSS). To knob large scale network access traffic and administrative control of data and application in cloud, a novel multi-threaded distributed cloud IDS model has been proposed. The proposed cloud Intrusion Detection System handles large flow of data packets, analyze them and generate reports efficiently by integrating knowledge and behavior analysis to detect intrusions.


Keywords: Intrusions, Authentication


Edition: Volume 6 Issue 4, April 2017,


Pages: 2410 - 2414


How to Cite this Article?

K. Anbazhagan, R. Sugumar, "A Novel Approach to Provide Security for Cloud Data", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20172839, Volume 6 Issue 4, April 2017, 2410 - 2414

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Intrusions'

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 955 - 959

A Hybrid Approach of Fuzzy C-mean Clustering and Genetic Algorithm (GA) to Improve Intrusion Detection Rate

Kamaldeep Kaur, Navjot Kaur

Share this Article

Downloads: 107

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1689 - 1692

ISRV: Intrusion Detection, Selection of Counter Measures and Recovery of Virtual Network Systems

Vinod Kumar, Syeda Asra, Yallappa Meti

Share this Article

Similar Articles with Keyword 'Authentication'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article
Top