Comprehensive Comparative Study on Intrusion Detection System in Cloud Computing

Abstract

Cloud computing involves deploying groups of remote servers and software networks that allow different kinds of data sources be uploaded for real time processing to generate computing results without the need to store processed data on the cloud. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.Security is one of the concerns about cloud computing that is delaying its adoption. One of the biggest security concerns about is that when you move your information over the cloud you will lose control of it. The cloud gives you the access data, but you have no way of ensuring no one else has access the data. Intruders are the network security attackers intend to breach cloud security. In spite of security issues cloud computing has become very essential needs of the industry. One of the security mechanisms to prevent this issue is Intrusion Detection Systems (IDS). In this paper our focus is to design an Intrusion Detection System (IDS) to defend against the cloud intruders.

Authors and Affiliations

Gyatri P, Priyanka Rao N, Nishanth N, Abishek Raghav, Mrs. Vani K. A

Keywords

Related Articles

An Overview of Women Milk Producing CoOperatives in Karnataka

This paper analyzed the dairy development is one the strategies for women empowerment in developing countries like India. In this direction the present paper tries to highlight on the growth of milk production in India...

Solution of the Generalised Elastic Column Buckling Problem by the Galerkin Variational Method

In this paper, a system of three differential equations describing the generalized elastic column buckling problem for axial compressive load, Nx acting through the centroid of the cross-section; and such that the bimom...

The Relationship between Granite Stones and Lung Cancer in Iranian homes kitchen (Case Study: City of Hamedan)

Radon is a radioactive noble gas that can be produced from the decay of radium and detected by special devices. In the air, radon compounds stick to the dust particles and other suspended particles and enter into the hu...

Similarity between Soil Seed Bank and AboveGround Vegetation in Different Ecosystems of Tropic and Temperate Regions

Similarity between seed bank and standing vegetation depends upon seed dispersal mechanism, presence of seeds of target/non target plant species in soil, dormancy period, and seed size. These parameters affect similarit...

Performance Analysis of Self-Organizing Networks

The capacity and coverage area of a radio network will vary due to changed environment, or malfunctioning in base stations. Suboptimal capacity and coverage area leads to the waste of network resources and the lower qua...

Download PDF file
  • EP ID EP21023
  • DOI -
  • Views 239
  • Downloads 6

How To Cite

Gyatri P, Priyanka Rao N, Nishanth N, Abishek Raghav, Mrs. Vani K. A (2015). Comprehensive Comparative Study on Intrusion Detection System in Cloud Computing. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(6), -. https://europub.co.uk./articles/-A-21023