A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks | IGI Global Scientific Publishing
Reference Hub4
A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks

A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks

B. V. Subba Rao, Vivek Sharma, Neeraj Rathore, Devendra Prasad, Harishchander Anandaram, Gaurav Soni
Copyright: © 2023 |Volume: 13 |Issue: 1 |Pages: 22
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781668479810|DOI: 10.4018/IJCAC.317220
Cite Article Cite Article

MLA

Rao, B. V. Subba, et al. "A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks." IJCAC vol.13, no.1 2023: pp.1-22. https://doi.org/10.4018/IJCAC.317220

APA

Rao, B. V., Sharma, V., Rathore, N., Prasad, D., Anandaram, H., & Soni, G. (2023). A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks. International Journal of Cloud Applications and Computing (IJCAC), 13(1), 1-22. https://doi.org/10.4018/IJCAC.317220

Chicago

Rao, B. V. Subba, et al. "A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks," International Journal of Cloud Applications and Computing (IJCAC) 13, no.1: 1-22. https://doi.org/10.4018/IJCAC.317220

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The concept of cloud computing makes it possible to have a shared pool of reconfigurable computing resources that can be deployed and released with little involvement from administration work or service providers. Cloud computing makes this possible. The communication among the nodes is possible with the help of internet. All users are able to use the services of cloud. The small-scale industries are really happy to use the cloud services. The attackers are degrading the performance of services, and also the users are not receiving the response. This paper presents the imprint of cloud computing. Flooding attacks or the DoS attack is one attack that reserves the communication resources in network, and the rest of the attacks, like Sybil attack, misguide the users, and also it is not easy to identify the exact identification of the sender. The security schemes are able to remove attacker infection, and on the basis of that, it is possible to design better schemes against attackers in the cloud.