scispace - formally typeset
Search or ask a question
Author

Manu

Bio: Manu is an academic researcher from Sharda University. The author has contributed to research in topics: Cloud computing security & Cloud computing. The author has an hindex of 1, co-authored 2 publications receiving 5 citations.

Papers
More filters
Proceedings ArticleDOI
01 Oct 2018
TL;DR: This paper is provide support and background knowledge for new researchers in area of side channel attack in different environments and the strength of prevention method as well as drawbacks of that method.
Abstract: The Cloud Computing (CC) is famous due to shared resources technology. Cloud computing share resources among distrusting customers and provide on demand, cost effective, elasticity services. Due to rapid growth of cloud computing environment, vulnerabilities and their preventions methods are potential increase. We had seen that conventional prevention methods for Side Channel (SC) attack are not suitable for avoidance of cross-VM cashed based SC attacks.In 2016, shared technology issues is a one of top threat consider by cloud security alliance (CSA), which has been published in February 2016 in The Treacherous 12 [1]. This is a under top threat by CSA from last 5 year. In this paper we will discuss multiple method for performing side channel attack and prevention methods. We also discuss the strength of prevention method as well as drawbacks of that method. So that this paper will generate more research scope and new effective idea for prevention of side channel attack, this paper is provide support and background knowledge for new researchers in area of side channel attack in different environments.

4 citations

Proceedings ArticleDOI
01 Oct 2018
TL;DR: This paper proposes a framework which includes all these features and you can add or delete any security feature related with scheduling, resource allocation and security protocols and it is proposed that this framework should be applied to cloud plateform.
Abstract: Cloud techology is growing fast and every new technology is developed and supported by cloud plateform. There are various issues has been raised when task is executing on cloud, So we need a new and secure framework on which each and every task securily executed. For every task execution we need a efficient task sheduling algorithms, realible resorces and security features by which we will assigned and run our tasks. In this paper we are proposed a framework which includes all these features and you can add or delete any security feature related with scheduling, resource allocation and security protocols.

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The main objective of this analysis is to explore various kinds of attacks and its solution model of the cloud, which provides the complete information about cloud resource level security and its solutions.

6 citations

Proceedings Article
Man-Ki Yoon1, Mengqi Liu1, Hao Chen1, Jung-Eun Kim1, Zhong Shao1 
01 Jan 2021

1 citations

Journal ArticleDOI
TL;DR: Efficient fast processing Advanced Encryption Standard (AES), Secure Hashing Algorithm (SHA-3) and other session key distribution mechanisms are used and shows that SEDAP has 20% more stability and ensures multilevel security in cloud job administration process.
Book ChapterDOI
01 Jan 2021
TL;DR: In this paper, the authors focus on the study and analysis of security techniques specifically applied to cloud environments and use a machine learning algorithm to identify threat patterns that enable security of the cloud.
Abstract: There is increasing use of cloud computing in the Industry 4.0 era. Cloud computing provides scalable and highly available resources as per requirement. The resources may be considered as a database, virtual machine, central processing unit, storage, applications, etc. Cloud computing consists of layers such as IaaS, PaaS, and SaaS. With the growing use of cloud computing, it is becoming essential to study the threats and security at each service model. The existing security system cannot be applied as it is to cloud computing due to its characteristics, especially elasticity. Many researchers indicated that security is still a major concern for cloud computing. It is also observed that the main vulnerabilities are bypass authentication, gain information, and gain privileges to get the important credentials. This chapter focuses on the study and analysis of security techniques specifically applied to cloud environments. It is essential to secure the resources in cloud computing using cryptography operations as well as the key that secures the resources. The chapter addresses how key management is playing an important role in providing security of the cloud. The chapter mentions how secret sharing algorithms can be applied for managing the key and achieving elastic security to the cloud. Performance analysis and security analysis are also performed. It is observed due to elastic security applied through secret sharing algorithms, and it is not possible to compromise the system by the attackers. Finally, the chapter concludes with the use of a machine-learning algorithm to identify threat patterns that enable security of the cloud.