Intrusion Detection in Cloud Computing Implementation of (SAAS & IAAS) Using Grid Environment

被引:1
|
作者
Moorthy, S. Manthira [1 ]
Masillamani, M. Roberts [1 ]
机构
[1] Hindustan Univ, Sch Comp Sci, Madras, Tamil Nadu, India
关键词
Cloud computing; Grid computing; Data efficiency; Data security; Intrusion detection system; Knowledge analysis; Behavior analysis;
D O I
10.1007/978-81-322-1299-7_6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security requires user authentication with password digital certificates and confidentiality for transmission of data in a distributed system. The Intrusion Detection System (IDS) detect intrusions by means of knowledge and behavior analysis. In this paper, we introduce concept called cloud computing to increase data efficiency and satisfies user request. We also include grid computing to make cloud computing more efficient, reliable, and increase the performance of the systems that are accessing server. This is because of more user logins at the same time and the server is not able to provide equal performance to all other system. We can achieve performance by getting performance from the system that are connected to server and providing it to system that accessing the server.
引用
收藏
页码:53 / 64
页数:12
相关论文
共 50 条
  • [41] A Meta-analytic Review of Intelligent Intrusion Detection Techniques in Cloud Computing Environment
    Raj, Meghana G.
    Pani, Santosh Kumar
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 206 - 217
  • [42] Design of Hypervisor-based Integrated Intrusion Detection System in Cloud Computing Environment
    Wang, Chih-Hung
    Chen, Xuan-Liang
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 972 - 981
  • [43] Virtual Machine-based Intrusion Detection System Framework in Cloud Computing Environment
    Wang, Huaibin
    Zhou, Haiyun
    Wang, Chundong
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (10) : 2397 - 2403
  • [44] Profit Maximization for SaaS Provider using Improved Strategy for Resource Allocation in Cloud Computing Environment
    Ahuja, Nikky
    Kanungo, Priyesh
    Katiyal, Sumant
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATION AND TELECOMMUNICATION (ICACAT), 2018,
  • [45] Detection and Prevention of Criminal Attacks in Cloud Computing Using a Hybrid Intrusion Detection Systems
    Nsabimana, Thierry
    Bimenyimana, Christian Ildegard
    Odumuyiwa, Victor
    Hounsou, Joel Toyigbe
    [J]. INTELLIGENT HUMAN SYSTEMS INTEGRATION 2020, 2020, 1131 : 667 - 676
  • [46] A Virtual Machine Instance Anomaly Detection System for IaaS Cloud Computing
    Lin, Mingwei
    Yao, Zhiqiang
    Gao, Fei
    Li, Yang
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (03): : 255 - 268
  • [47] Unsupervised Outlier Detection Technique for Intrusion Detection in Cloud Computing
    Kumar, Manoj
    Mathur, Robin
    [J]. 2014 INTERNATIONAL CONFERENCE FOR CONVERGENCE OF TECHNOLOGY (I2CT), 2014,
  • [48] Optimization of BPN parameters using PSO for intrusion detection in cloud environment
    Nagarajan, G.
    Sajith, P. J.
    [J]. SOFT COMPUTING, 2023,
  • [49] Securing Cloud Environment using a String based Intrusion Detection System
    Raj, R. Sundar
    Bhaskaran, V. Murali
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [50] Performance comparison of heuristic algorithms for task scheduling in IaaS cloud computing environment
    Madni, Syed Hamid Hussain
    Abd Latiff, Muhammad Shafie
    Abdullahi, Mohammed
    Abdulhamid, Shafi'i Muhammad
    Usman, Mohammed Joda
    [J]. PLOS ONE, 2017, 12 (05):