IDEAS home Printed from https://ideas.repec.org/a/igg/jcac00/v13y2023i1p1-22.html
   My bibliography  Save this article

A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks

Author

Listed:
  • B. V. Subba Rao

    (PVP Siddhartha Institute of Technology, India)

  • Vivek Sharma

    (Sharda University, India)

  • Neeraj Rathore

    (University of Petroleum and Energy Studies, Dehradun, India)

  • Devendra Prasad

    (Amity University, Patna, India)

  • Harishchander Anandaram

    (Amrita Vishwa Vidyapeetham, India)

  • Gaurav Soni

    (VIT Bhopal University, India)

Abstract

The concept of cloud computing makes it possible to have a shared pool of reconfigurable computing resources that can be deployed and released with little involvement from administration work or service providers. Cloud computing makes this possible. The communication among the nodes is possible with the help of internet. All users are able to use the services of cloud. The small-scale industries are really happy to use the cloud services. The attackers are degrading the performance of services, and also the users are not receiving the response. This paper presents the imprint of cloud computing. Flooding attacks or the DoS attack is one attack that reserves the communication resources in network, and the rest of the attacks, like Sybil attack, misguide the users, and also it is not easy to identify the exact identification of the sender. The security schemes are able to remove attacker infection, and on the basis of that, it is possible to design better schemes against attackers in the cloud.

Suggested Citation

  • B. V. Subba Rao & Vivek Sharma & Neeraj Rathore & Devendra Prasad & Harishchander Anandaram & Gaurav Soni, 2023. "A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks," International Journal of Cloud Applications and Computing (IJCAC), IGI Global, vol. 13(1), pages 1-22, January.
  • Handle: RePEc:igg:jcac00:v:13:y:2023:i:1:p:1-22
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJCAC.317220
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jcac00:v:13:y:2023:i:1:p:1-22. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.