CFP last date
22 April 2024
Reseach Article

Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis

Published on October 2014 by K.kavitha, B.arunkumar
National Conference on Computational Intelligence for Engineering Quality Software
Foundation of Computer Science USA
CIQS - Number 1
October 2014
Authors: K.kavitha, B.arunkumar
e60c8013-2c93-493b-9f84-1a73ced21a0e

K.kavitha, B.arunkumar . Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis. National Conference on Computational Intelligence for Engineering Quality Software. CIQS, 1 (October 2014), 14-19.

@article{
author = { K.kavitha, B.arunkumar },
title = { Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis },
journal = { National Conference on Computational Intelligence for Engineering Quality Software },
issue_date = { October 2014 },
volume = { CIQS },
number = { 1 },
month = { October },
year = { 2014 },
issn = 0975-8887,
pages = { 14-19 },
numpages = 6,
url = { /proceedings/ciqs/number1/18029-1704/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Computational Intelligence for Engineering Quality Software
%A K.kavitha
%A B.arunkumar
%T Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
%J National Conference on Computational Intelligence for Engineering Quality Software
%@ 0975-8887
%V CIQS
%N 1
%P 14-19
%D 2014
%I International Journal of Computer Applications
Abstract

The data that is stored on the computer may be confidential or sensitive according to its applications or usage. The data must be protected from unauthorized users. This paper analyses the security attacks in a) stand-alone computers and b) in cloud computing. A study of existing protective mechanisms is also presented.

References
  1. Nitesh Kumar Dixit, Lokesh mishra, Mahendra Singh Charan and Bhabesh Kumar Dey, "The New Age Of Computer Virus And Their Detection", International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 3, May 2012
  2. Widiasari, Indrastanti R, "Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security", International Journal of Computer Applications;2012, Vol. 57
  3. Peter J. Denning, "Computers Under Attack: Intruders, Worms and Viruses", ACM Press (Addison-Wesley), 1990.
  4. Simar Preet Singh, Renuka Gujral, "Security Threats", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014
  5. J. Aycock, "Computer Viruses and malware," Springer Science+Business Media, 2006.
  6. Lance J. Hoffman, "Rogue Programs:Viruses,Worms, and Trojan Horses", VanNostrand Reinhold, New York, NY, 1990.
  7. Jan Hruska, "Computer Viruses and Anti-VirusWarfare", Ellis Horwood, Chichester, England, 1990.
  8. Ankur Singh Bist, "A Review: Computer Worms", International journal of engineering sciences and research technology, February 2013.
  9. Thomas F. Stafford , Andrew Urbaczewski , "Spyware: The Ghost In The Machine", Communications of the Association for Information Systems, Volume 14, 2004
  10. Preeti Tuli, Priyanka Sahu, "System Monitoring and Security UsingKeylogger", International Journal of Computer Science and Mobile Computing, Vol. 2, Issue. 3, March 2013, pg. 106 – 111
  11. B. A. Forouzan, Debdeep Mukhopadhyay, "Cryptography and Network Security", The McGraw Hill Companies, 2nd Edition.
  12. Sarika Choudhary, Ritika Saroha, Mrs. Sonal Beniwal, "How Anti-virus Software Works??", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 4, April 20132.
  13. G Fragkos, O Angelopoulou, K Xynos, "Antivirus False-Positive Alerts, Evading Malware Detection, and Cyber-security Issues", The journal of Information Warfare, Volume 12, Issue 3.
  14. M. Alshamrani and S. M. Furnell, "Internet User's Awareness and Understanding of Spyware and Anti-Spyware", Advances in Communications, Computing, Networks and Security 7
  15. Kumar Utkarsh, "System Security And Ethical Hacking", International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013
  16. Mehdi Dadkhah, Mohammad Davarpanah Jazi, "Secure Payment in E-commerce: Deal with Keyloggers and Pishings", International Journal of Electronics Communication and Computer Engineering, Volume 5,Issue 3,May 2014
  17. Security Guideline for standalone and Network computers, National Computer Board, Mauritius, September 2007, Issue No 6.
  18. Course Material on "Computer Security and Reliability",Webmaster Chapter 20
  19. Bazrafshan Z, Hashemi H, Fard S. M. H, Hamzeh A, "A survey on heuristic malware detection techniques", IEEE, 5th Conference on Information and Knowledge Technology (IKT), Shiraz, 2013
  20. Mihai Christodorescu, Somesh Jha, Douglas Maughan, "Malware Detection", Springer-verlag, 2007 Edition.
  21. S. Subashini n, V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and Computer Applications 34 (2011) 1–11
  22. PriyankRajvanshi, Varun Singh Nagar, Priyanka Chawla, "Data Protection in Cloud Computing", International Journal of Innovative Technology and Exploring Engineering (IJITEE) Volume-3, Issue-3, August 2013
  23. Sara Qaisar, KausarFiaz Khawaja, "Cloud Computing: Network/Security Threats and counter measures", Interdisciplinary Journal of Contemporary Research in Business, ijcrb. webs. com, January 2012, Vol 3, N0 9, pp: 1323 – 1329.
  24. K. L. Neela, V. Kavitha, R. K. Ramesh, "Cloud Computing: Threats and Security Issues", International Journal Of Engineering Sciences & Research Technology, August, 2013 [2070-2072]
  25. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," Proc. 16th ACM conference on Computer and communications security, 2009, pp. 199-212.
  26. Mather T, Kumaraswamy S, Latif S, "Cloud Security and Privacy", O'Reilly Media, Inc. , Sebastopol, CA
  27. Zhifeng Xiao and Yang Xiao, "Security and Privacy in Cloud Computing", IEEE Communications Surveys & Tutorials.
  28. Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina and Eduardo B Fernandez, "An analysis of security issues for cloud computing", Journal of Internet Services and Applications 2013, 4:5(A SpringerOpen Journal)
  29. Attanasio CR. "Virtual machines and data security", Proceedings of the workshop on virtual computer systems. New York, NY, USA: ACM; 1973. p. 206–9.
  30. Amazon. AmazonElasticComputeCloud (EC2),2010 (http://www. amazon. com/ ec2/S.
  31. M. Descher, P. Masser, T. Feilhauer, A. Tjoa, and D. Huemer, "Retaining Data Control to the Client in Infrastructure Clouds," Availability, Reliability and Security, 2009. ARES '09. International Conference on, 2009, pp. 9
  32. http://www. dmst. aueb. gr/dds/pubs/conf/1999-WISE-TTP/html/ttp. html
  33. Commission of the European Community. Green paper on the security of information systems, ver. 4. 2. 1, 1994. Alshamsi, T. Saito, A technical comparison of IPSec and SSL, Cryptology (2004).
  34. E. Keller, J. Szefer, J. Rexford, and R. B. Lee, "NoHype: virtualized cloud infrastructure without the virtualization," in Proc. 37th annual international symposium on Computer architecture, New York, NY,USA, 2010, pp. 350-361.
  35. Haeberlen. "A Case for the Accountable Cloud," 3rd ACM SIGOPS International Workshop on Large-Scale Distributed Systems and Middleware (LADIS '09), Big Sky, MT, October 2009
  36. KuiRen, Cong Wang, and Qian Wang, "Security Challenges for the Public Cloud", IEEE Press, 2012, pp. 69 – 73
  37. Yinqian Zhang, Ari Juels, Alina Oprea, Michael K. Reiter, "HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis", IEEE Symposium on Security and Privacy, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Stand-alone Security Cloud Computing Virtualization Multi-tenancy Virus.