A distributed cloud-prevents attacks and preserves user privacy

C. U. Om Kumar, K. Tejaswi, P. Bhargavi
{"title":"A distributed cloud-prevents attacks and preserves user privacy","authors":"C. U. Om Kumar, K. Tejaswi, P. Bhargavi","doi":"10.1109/ICACT.2013.6710509","DOIUrl":null,"url":null,"abstract":"In today's “era of Tera”, everything is possible in terms of storage and service. The long-held dream of computing as a utility has been achieved in the form of cloud computing. It has transformed the world where large part of IT industry is simplified by Platform as a Service, Software's are developed and rented more attractively in the form of Development as a Service, Software as a Service. It has shaped the IT industry with its Infrastructure as a Service. When all such services are provided to client on demand, security becomes a major concern. Since Cloud is a Data Centre there are conceivable chances of attacks on it. Cloud behaves like a group of interconnected systems since it is run on the backdrop through Distributed systems. Various attacks like DOS, DDOS, Malware Injection attack, Man-In-The-Middle attacks are possible. This paper discusses various Mining attacks that are possible on a Cloud and provides a solution by using a Secure Distributed approach. We use WEKA to predict the patterns in a single cloud and by using Cloud Data Distributor with a secure distributed approach we provide an effective solution that prevents such mining attacks on Cloud thus making the Cloud a secure platform for service and storage.","PeriodicalId":302640,"journal":{"name":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 15th International Conference on Advanced Computing Technologies (ICACT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACT.2013.6710509","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

In today's “era of Tera”, everything is possible in terms of storage and service. The long-held dream of computing as a utility has been achieved in the form of cloud computing. It has transformed the world where large part of IT industry is simplified by Platform as a Service, Software's are developed and rented more attractively in the form of Development as a Service, Software as a Service. It has shaped the IT industry with its Infrastructure as a Service. When all such services are provided to client on demand, security becomes a major concern. Since Cloud is a Data Centre there are conceivable chances of attacks on it. Cloud behaves like a group of interconnected systems since it is run on the backdrop through Distributed systems. Various attacks like DOS, DDOS, Malware Injection attack, Man-In-The-Middle attacks are possible. This paper discusses various Mining attacks that are possible on a Cloud and provides a solution by using a Secure Distributed approach. We use WEKA to predict the patterns in a single cloud and by using Cloud Data Distributor with a secure distributed approach we provide an effective solution that prevents such mining attacks on Cloud thus making the Cloud a secure platform for service and storage.
分布式云可以防止攻击并保护用户隐私
在今天的“Tera时代”,在存储和服务方面,一切皆有可能。将计算作为一种实用工具的长期梦想已经以云计算的形式实现了。它改变了世界,大部分It行业被平台即服务简化,软件以开发即服务、软件即服务的形式被开发和租用。它以其基础设施即服务(Infrastructure as a Service)塑造了It行业。当所有这些服务都按需提供给客户机时,安全性就成为一个主要问题。由于云是一个数据中心,因此可以想象攻击它的可能性。云的行为就像一组相互连接的系统,因为它是通过分布式系统在后台运行的。各种攻击,如DOS, DDOS,恶意软件注入攻击,中间人攻击是可能的。本文讨论了在云上可能出现的各种挖掘攻击,并通过使用安全分布式方法提供了解决方案。我们使用WEKA来预测单个云中的模式,通过使用云数据分发器和安全的分布式方法,我们提供了一个有效的解决方案,可以防止对云的这种挖掘攻击,从而使云成为一个安全的服务和存储平台。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信