A Novel Approach for Security in Cloud Environment

Authors

  • Prithika M Department of Computer Science, MaruthuPandiyar College, Thanjavur, India

Keywords:

Cloud Computing, Threats, Attack

Abstract

Cloud registering is one of the present most energizing advances, since it can lessen the expense and intricacy of uses, and it is adaptable and versatile. These advantages changed cloud registering from a marvelous thought into one of the quickest developing innovations today. As a matter of fact, virtualization technology is based on virtualization technology which is an old technology and has had security issues that must be tended to before cloud technology is influenced by them. What's more, the virtualization technology has limit security abilities so as to anchor wide zone condition, for example, the cloud. Along these lines, the improvement of a powerful security framework requires changes in conventional virtualization engineering. This paper proposes new security design in a hypervisor-based virtualization technology so as to anchor the cloud condition

References

[1] Biggs and S. Vidalis, "Cloud Computing: The Impact on Digital Forensic Investigations," 2010, pp. 1-6.

[2] G. Brunette and R. Mogull, "Security guidance for critical areas of focus in cloud computing v3.0," Cloud Security Alliance, 2011.

[3] Dhage, et al., "Intrusion detection system in cloud computing environment," presented at the Proceedings of the International Conference Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, 2011.

[4] M. B. Salem, et al., "A survey of insider attack detection research," Insider Attack and Cyber Security, pp. 69-90, 2008.

[5] J. Sheridan and C. Cooper, "Whitepaper: Defending the Cloud," 2012.

[6] L. M. Kaufman. Can Public-Cloud Security Meet Its Unique Challenges?, vol. 8, no. 4. IEEE Computer Society, 2010, pp. 55-57.

[7] D. L. Oppenheimer and M. R. Martonosi, "Performance signatures: A mechanism for intrusion detection," in Proceedings of the 1997 IEEE Information Survivability Workshop, 1997.

[8] A. Avritzer, et al., "Monitoring for security intrusion using performance signatures," 2010, pp. 93-104.

[9] M. Christodorescu, et al., "Cloud security is not (just) virtualization security: a short paper," in Proceedings of the 2009 ACM workshop on Cloud computing security, 2009, pp. 97-102.

[10] T. Garfinkel and M. Rosenblum, "A virtual machine introspection based architecture for intrusion detection," 2003.

Downloads

Published

2025-11-24

How to Cite

[1]
M. Prithika, “A Novel Approach for Security in Cloud Environment”, Int. J. Comp. Sci. Eng., vol. 7, no. 2, pp. 126–133, Nov. 2025.