{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T23:35:24Z","timestamp":1721172924087},"reference-count":27,"publisher":"IGI Global","issue":"1","license":[{"start":{"date-parts":[[2023,2,3]],"date-time":"2023-02-03T00:00:00Z","timestamp":1675382400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2023,2,3]],"date-time":"2023-02-03T00:00:00Z","timestamp":1675382400000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2023,2,3]],"date-time":"2023-02-03T00:00:00Z","timestamp":1675382400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,3]]},"abstract":"

The concept of cloud computing makes it possible to have a shared pool of reconfigurable computing resources that can be deployed and released with little involvement from administration work or service providers. Cloud computing makes this possible. The communication among the nodes is possible with the help of internet. All users are able to use the services of cloud. The small-scale industries are really happy to use the cloud services. The attackers are degrading the performance of services, and also the users are not receiving the response. This paper presents the imprint of cloud computing. Flooding attacks or the DoS attack is one attack that reserves the communication resources in network, and the rest of the attacks, like Sybil attack, misguide the users, and also it is not easy to identify the exact identification of the sender. The security schemes are able to remove attacker infection, and on the basis of that, it is possible to design better schemes against attackers in the cloud.<\/p>","DOI":"10.4018\/ijcac.317220","type":"journal-article","created":{"date-parts":[[2023,2,3]],"date-time":"2023-02-03T13:24:49Z","timestamp":1675430689000},"page":"1-22","source":"Crossref","is-referenced-by-count":4,"title":["A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks"],"prefix":"10.4018","volume":"13","author":[{"given":"B. V. Subba","family":"Rao","sequence":"first","affiliation":[{"name":"PVP Siddhartha Institute of Technology, India"}]},{"given":"Vivek","family":"Sharma","sequence":"additional","affiliation":[{"name":"Sharda University, India"}]},{"given":"Neeraj","family":"Rathore","sequence":"additional","affiliation":[{"name":"University of Petroleum and Energy Studies, Dehradun, India"}]},{"given":"Devendra","family":"Prasad","sequence":"additional","affiliation":[{"name":"Amity University, Patna, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2993-5304","authenticated-orcid":true,"given":"Harishchander","family":"Anandaram","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham, India"}]},{"given":"Gaurav","family":"Soni","sequence":"additional","affiliation":[{"name":"VIT Bhopal University, India"}]}],"member":"2432","reference":[{"key":"IJCAC.317220-0","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2019.8757549"},{"key":"IJCAC.317220-1","doi-asserted-by":"publisher","DOI":"10.1109\/CSNet47905.2019.9108923"},{"key":"IJCAC.317220-2","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"IJCAC.317220-3","unstructured":"Bajaj, Breslau, Estrin, Fall, Floyd, Haldar, Handley, Helmy, Heidemann, Huang, Kumar, McCanne, Rejaie, Sharma, Varadhan, Xu, Yu, & Zappala. (2000). Improving simulation for network research. IEEE Computer."},{"key":"IJCAC.317220-4","unstructured":"Bhandari, N. H. (2013). Survey on DDoS Attacks and its Detection & Defence Approaches. International Journal of Science and Modern Engineering, 2(7)."},{"key":"IJCAC.317220-5","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2013.114"},{"key":"IJCAC.317220-6","year":"2009","journal-title":"An Experimental Investigation of Malware Attacks on SCADA Systems. International Journal of Critical Infrastructure Protection, 2"},{"key":"IJCAC.317220-7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2194508"},{"key":"IJCAC.317220-8","article-title":"Siddiqui. (2019). Detection of DDOS Attacks in Cloud Computing Environment","author":"Hamdani","journal-title":"Proceedings of the International Conference on Intelligent Computing and Control Systems (ICICCS 2019)"},{"key":"IJCAC.317220-9","doi-asserted-by":"crossref","unstructured":"Kim, Lee, Kim, & Park. (2013). Detection of Advanced Persistent Threat by Analyzing the Big Data Log. Advanced Science and Technology Letters, 29, 30\u201336.","DOI":"10.14257\/astl.2013.29.06"},{"key":"IJCAC.317220-10","article-title":"A Novel Distributed Semi-Supervised Approach for Detection of Network Based Attacks","author":"J. G. K.Meenal","journal-title":"9th International Conference on Cloud Computing, Data Science & Engineering (Confluence)"},{"key":"IJCAC.317220-11","unstructured":"Mell & Grance. (2009). The NIST definition of Cloud Computing, Version 15. National Institute of Standards and Technology."},{"key":"IJCAC.317220-12","doi-asserted-by":"crossref","unstructured":"Nalajala, Akhil, Sai, Shekhar, & Tumuluru. (2019). Light Weight Secure Data Sharing Scheme For Mobile Cloud Computing. Proceedings of the Third International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).","DOI":"10.1109\/I-SMAC47947.2019.9032618"},{"key":"IJCAC.317220-13","unstructured":"OMNeT++ Home Page. (n.d.). http:\/\/www.omnetpp.org"},{"key":"IJCAC.317220-14","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA.2019.8821844"},{"key":"IJCAC.317220-15","article-title":"Detection of known and unknown DDoS Attacks using Artificial Neural Networks","author":"A.Saied","year":"2015","journal-title":"Neurocomputing"},{"key":"IJCAC.317220-16","doi-asserted-by":"publisher","DOI":"10.1145\/2980258.2980379"},{"key":"IJCAC.317220-17","doi-asserted-by":"crossref","unstructured":"Song, Heo, & Hong. (2007). Collaborative Defense Mechanism Using Statistical Detection Method against DDoS Attacks. IEICE Transaction Fundamentals\/Communication\/Electronics\/Information & System, E 85-A\/B\/C\/D(1), 1-10.","DOI":"10.1093\/ietcom\/e90-b.10.2655"},{"key":"IJCAC.317220-18","doi-asserted-by":"crossref","unstructured":"Soni & Sudhakar. (2020). A L-IDS against Dropping Attack to Secure and Improve RPL Performance in WSN Aided IoT. 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN), 377-383.","DOI":"10.1109\/SPIN48934.2020.9071118"},{"key":"IJCAC.317220-19","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2017.8418546"},{"key":"IJCAC.317220-20","doi-asserted-by":"publisher","DOI":"10.1109\/IoT-SIU.2019.8777670"},{"key":"IJCAC.317220-21","doi-asserted-by":"publisher","DOI":"10.1109\/ICACFCT53978.2021.9837360"},{"key":"IJCAC.317220-22","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN52536.2021.9566066"},{"key":"IJCAC.317220-23","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMIA48430.2020.9074924"},{"key":"IJCAC.317220-24","unstructured":"Vrushali, D. (2015). Interactive image segmentation using combined MRF and ant colony optimization. International Journal of Engineering and Computer Science."},{"key":"IJCAC.317220-25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195714"},{"key":"IJCAC.317220-26","article-title":"Liu, Tang, Sun, Zhang, Ye, & Tang. (2009). Cloud Computing: A statistics aspect of users.","author":"Zhao","journal-title":"First International Conference on Cloud Computing (CloudCom)"}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=317220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T10:02:36Z","timestamp":1699956156000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCAC.317220"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2023,2,3]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.317220","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,3]]}}}