2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) 2014
DOI: 10.1109/iccicct.2014.6992976
|View full text |Cite
|
Sign up to set email alerts
|

Cloud computing: Security threats & control strategy using tri-mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…Difficulty arises when it comes to distinguishing the illegal packet from the legitimate packet [10]. Obviously, these attacks have to be simultaneously to achieve their objectives, where it can be triggered by amateur hackers since they only have to run simple codes and tools [13]. As a result, the targeted service provider will be flooded by packets and becomes out of service.…”
Section: ▪ Denial Of Service Attacksmentioning
confidence: 99%
“…Difficulty arises when it comes to distinguishing the illegal packet from the legitimate packet [10]. Obviously, these attacks have to be simultaneously to achieve their objectives, where it can be triggered by amateur hackers since they only have to run simple codes and tools [13]. As a result, the targeted service provider will be flooded by packets and becomes out of service.…”
Section: ▪ Denial Of Service Attacksmentioning
confidence: 99%
“…Step 4: It demonstrates the encryption round utilizations number-crunching in the limited field that is Galois field GF (27), with the irreducible polynomial.…”
Section: Figure 1 Work Flowmentioning
confidence: 99%
“…Gupta et al [27] They investigates the cloud security dangers furthermore talks about the current security ways to deal with secure the cloud environment .They additionally proposed a novel Tri-system for cloud security against information break which give all around security to the cloud structural planning.…”
Section: Literature Surveymentioning
confidence: 99%