Home > Engineering > Computer Engineering > Volume-3 > Issue-5 > Enhanced Cloud Security Implementation using Modified ECC Algorithm

Enhanced Cloud Security Implementation using Modified ECC Algorithm

Call for Papers

Volume-8 | Advancing Multidisciplinary Research and Analysis - Exploring Innovations

Last date : 28-Mar-2024

Best International Journal
Open Access | Peer Reviewed | Best International Journal | Indexing & IF | 24*7 Support | Dedicated Qualified Team | Rapid Publication Process | International Editor, Reviewer Board | Attractive User Interface with Easy Navigation

Journal Type : Open Access

First Update : Within 7 Days after submittion

Submit Paper Online

For Author

Research Area


Enhanced Cloud Security Implementation using Modified ECC Algorithm


R. Dhiviya | K. Mohamed Amanullah



R. Dhiviya | K. Mohamed Amanullah "Enhanced Cloud Security Implementation using Modified ECC Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5, August 2019, pp.2225-2230, URL: https://www.ijtsrd.com/papers/ijtsrd27870.pdf

Cloud computing is a distributed environment that encompasses thousands of computers that work in parallel to perform a task in lesser time than the traditional computing models. This parallelism enables the low cost virtualization of hardware resources with increased computational performances. Cloud computing provides tremendous opportunity for small and medium scale enterprises to grow their business using IT services with zero deployment cost. Whenever, a task is distributed over web, there encounters a series of potential threats that challenges the security of data such as buffer overflow, session hijacking and black hole attacks. A cloud computing based services also face such kinds of security issues where applications deployed on cloud can face same kind of attacks as that on client-server model. Storage as a Service (SaaS) based applications are vulnerable to virus attacks .Online operating systems are available on cloud to the user for free .Viruses can spread as attachments of email, of part of the software or can stay in Master Boot Record (MBR) of the operating system available on cloud. Worms residing on one system in cloud can migrate to another system on its own. Trojan horse is software with wrong intentions. Thus the present system needs an effective mechanism to address the problem encountered in cloud computing.

Cloud computing, Security challenges


IJTSRD27870
Volume-3 | Issue-5, August 2019
2225-2230
IJTSRD | www.ijtsrd.com | E-ISSN 2456-6470
Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)

International Journal of Trend in Scientific Research and Development - IJTSRD having online ISSN 2456-6470. IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas like Sciences, Technology, Innovation, Engineering, Agriculture, Management and many more and it is recommended by all Universities, review articles and short communications in all subjects. IJTSRD running an International Journal who are proving quality publication of peer reviewed and refereed international journals from diverse fields that emphasizes new research, development and their applications. IJTSRD provides an online access to exchange your research work, technical notes & surveying results among professionals throughout the world in e-journals. IJTSRD is a fastest growing and dynamic professional organization. The aim of this organization is to provide access not only to world class research resources, but through its professionals aim to bring in a significant transformation in the real of open access journals and online publishing.

Thomson Reuters
Google Scholer
Academia.edu

ResearchBib
Scribd.com
archive

PdfSR
issuu
Slideshare

WorldJournalAlerts
Twitter
Linkedin