{"id":"https://openalex.org/W4319071268","doi":"https://doi.org/10.4018/ijcac.317220","title":"A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks","display_name":"A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks","publication_year":2023,"publication_date":"2023-02-03","ids":{"openalex":"https://openalex.org/W4319071268","doi":"https://doi.org/10.4018/ijcac.317220"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijcac.317220","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=317220&isxn=9781668479810","source":{"id":"https://openalex.org/S4210173373","display_name":"International Journal of Cloud Applications and Computing","issn_l":"2156-1834","issn":["2156-1834","2156-1826"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=317220&isxn=9781668479810","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102426918","display_name":"B. Subba Rao","orcid":"https://orcid.org/0000-0003-1863-4653"},"institutions":[{"id":"https://openalex.org/I116891498","display_name":"Siddhartha Medical College","ror":"https://ror.org/058pt1w78","country_code":"IN","type":"education","lineage":["https://openalex.org/I116891498"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"B. V. Subba Rao","raw_affiliation_strings":["PVP Siddhartha Institute of Technology, India"],"affiliations":[{"raw_affiliation_string":"PVP Siddhartha Institute of Technology, India","institution_ids":["https://openalex.org/I116891498"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100687906","display_name":"Vivek Sharma","orcid":"https://orcid.org/0000-0002-9183-3571"},"institutions":[{"id":"https://openalex.org/I74885063","display_name":"Sharda University","ror":"https://ror.org/03b6ffh07","country_code":"IN","type":"education","lineage":["https://openalex.org/I74885063"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Vivek Sharma","raw_affiliation_strings":["Sharda University, India"],"affiliations":[{"raw_affiliation_string":"Sharda University, India","institution_ids":["https://openalex.org/I74885063"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103203640","display_name":"Neeraj Rathore","orcid":"https://orcid.org/0000-0002-5556-8627"},"institutions":[{"id":"https://openalex.org/I5847235","display_name":"University of Petroleum and Energy Studies","ror":"https://ror.org/04q2jes40","country_code":"IN","type":"education","lineage":["https://openalex.org/I5847235"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Neeraj Rathore","raw_affiliation_strings":["University of Petroleum and Energy Studies, Dehradun, India"],"affiliations":[{"raw_affiliation_string":"University of Petroleum and Energy Studies, Dehradun, India","institution_ids":["https://openalex.org/I5847235"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061731276","display_name":"Devendra Prasad","orcid":"https://orcid.org/0000-0002-1771-4670"},"institutions":[],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Devendra Prasad","raw_affiliation_strings":["Amity University, Patna, India"],"affiliations":[{"raw_affiliation_string":"Amity University, Patna, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003679206","display_name":"Harishchander Anandaram","orcid":"https://orcid.org/0000-0003-2993-5304"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Harishchander Anandaram","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham, India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006156649","display_name":"Gaurav Soni","orcid":"https://orcid.org/0000-0002-1270-9426"},"institutions":[{"id":"https://openalex.org/I464993","display_name":"Barkatullah University","ror":"https://ror.org/02ax13658","country_code":"IN","type":"education","lineage":["https://openalex.org/I464993"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gaurav Soni","raw_affiliation_strings":["VIT Bhopal University, India"],"affiliations":[{"raw_affiliation_string":"VIT Bhopal University, India","institution_ids":["https://openalex.org/I464993"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.157,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":5,"citation_normalized_percentile":{"value":0.999828,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":92},"biblio":{"volume":"13","issue":"1","first_page":"1","last_page":"22"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.5841331},{"id":"https://openalex.org/keywords/identification","display_name":"Identification","score":0.49727276}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8687072},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.80191493},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7525177},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.5841331},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.49727276},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.49654394},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47673026},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.44873223},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.4400768},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37464076},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16069824},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijcac.317220","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=317220&isxn=9781668479810","source":{"id":"https://openalex.org/S4210173373","display_name":"International Journal of Cloud Applications and Computing","issn_l":"2156-1834","issn":["2156-1834","2156-1826"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijcac.317220","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=317220&isxn=9781668479810","source":{"id":"https://openalex.org/S4210173373","display_name":"International Journal of Cloud Applications and Computing","issn_l":"2156-1834","issn":["2156-1834","2156-1826"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.48}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1152223117","https://openalex.org/W1966047661","https://openalex.org/W1971246165","https://openalex.org/W2029016145","https://openalex.org/W2076705113","https://openalex.org/W2114296561","https://openalex.org/W2332689491","https://openalex.org/W2548080094","https://openalex.org/W2883184346","https://openalex.org/W2960189490","https://openalex.org/W2964695252","https://openalex.org/W2966506078","https://openalex.org/W2972022273","https://openalex.org/W3011091804","https://openalex.org/W3018220636","https://openalex.org/W3019432121","https://openalex.org/W3033111552","https://openalex.org/W3209351971","https://openalex.org/W4288065721"],"related_works":["https://openalex.org/W65919655","https://openalex.org/W4385451301","https://openalex.org/W4382245407","https://openalex.org/W4230987454","https://openalex.org/W3181161485","https://openalex.org/W2992381278","https://openalex.org/W2915516796","https://openalex.org/W2614778841","https://openalex.org/W2523967339","https://openalex.org/W2125615450"],"abstract_inverted_index":{"The":[0,37,59,70,137],"concept":[1],"of":[2,13,47,57,76,92,114,134,150],"cloud":[3,68,93],"computing":[4,15,33],"makes":[5,34],"it":[6,125,152],"possible":[7,43,154],"to":[8,53,65,129,142,155],"have":[9],"a":[10],"shared":[11],"pool":[12],"reconfigurable":[14],"resources":[16,108],"that":[17,104],"can":[18],"be":[19],"deployed":[20],"and":[21,78,111,123,146],"released":[22],"with":[23,44],"little":[24],"involvement":[25],"from":[26],"administration":[27],"work":[28],"or":[29,97],"service":[30],"providers.":[31],"Cloud":[32],"this":[35],"possible.":[36],"communication":[38,107],"among":[39],"the":[40,45,55,67,74,80,85,90,98,106,112,115,121,131,135,148,162],"nodes":[41],"is":[42,101,126,153],"help":[46],"internet.":[48],"All":[49],"users":[50,81],"are":[51,62,72,82,140],"able":[52,141],"use":[54,66],"services":[56],"cloud.":[58,163],"small-scale":[60],"industries":[61],"really":[63],"happy":[64],"services.":[69],"attackers":[71,160],"degrading":[73],"performance":[75],"services,":[77],"also":[79,124],"not":[83,127],"receiving":[84],"response.":[86],"This":[87],"paper":[88],"presents":[89],"imprint":[91],"computing.":[94],"Flooding":[95],"attacks":[96],"DoS":[99],"attack":[100,103],"one":[102],"reserves":[105],"in":[109,161],"network,":[110],"rest":[113],"attacks,":[116],"like":[117],"Sybil":[118],"attack,":[119],"misguide":[120],"users,":[122],"easy":[128],"identify":[130],"exact":[132],"identification":[133],"sender.":[136],"security":[138],"schemes":[139,158],"remove":[143],"attacker":[144],"infection,":[145],"on":[147],"basis":[149],"that,":[151],"design":[156],"better":[157],"against":[159]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4319071268","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-01-16T09:51:26.820005","created_date":"2023-02-04"}