Call for Paper - July 2019 Edition
IJCA solicits original research papers for the July 2019 Edition. Last date of manuscript submission is June 20, 2019. Read More

Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis

Print
PDF
IJCA Proceedings on National Conference on Computational Intelligence for Engineering Quality Software
© 2014 by IJCA Journal
CiQS - Number 1
Year of Publication: 2014
Authors:
K. Kavitha
B. Arunkumar

K.kavitha and B.arunkumar. Article: Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis. IJCA Proceedings on National Conference on Computational Intelligence for Engineering Quality Software CiQS(1):14-19, October 2014. Full text available. BibTeX

@article{key:article,
	author = {K.kavitha and B.arunkumar},
	title = {Article: Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis},
	journal = {IJCA Proceedings on National Conference on Computational Intelligence for Engineering Quality Software},
	year = {2014},
	volume = {CiQS},
	number = {1},
	pages = {14-19},
	month = {October},
	note = {Full text available}
}

Abstract

The data that is stored on the computer may be confidential or sensitive according to its applications or usage. The data must be protected from unauthorized users. This paper analyses the security attacks in a) stand-alone computers and b) in cloud computing. A study of existing protective mechanisms is also presented.

References

  • Nitesh Kumar Dixit, Lokesh mishra, Mahendra Singh Charan and Bhabesh Kumar Dey, "The New Age Of Computer Virus And Their Detection", International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 3, May 2012
  • Widiasari, Indrastanti R, "Combining Advanced Encryption Standard (AES) and One Time Pad (OTP) Encryption for Data Security", International Journal of Computer Applications;2012, Vol. 57
  • Peter J. Denning, "Computers Under Attack: Intruders, Worms and Viruses", ACM Press (Addison-Wesley), 1990.
  • Simar Preet Singh, Renuka Gujral, "Security Threats", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014
  • J. Aycock, "Computer Viruses and malware," Springer Science+Business Media, 2006.
  • Lance J. Hoffman, "Rogue Programs:Viruses,Worms, and Trojan Horses", VanNostrand Reinhold, New York, NY, 1990.
  • Jan Hruska, "Computer Viruses and Anti-VirusWarfare", Ellis Horwood, Chichester, England, 1990.
  • Ankur Singh Bist, "A Review: Computer Worms", International journal of engineering sciences and research technology, February 2013.
  • Thomas F. Stafford , Andrew Urbaczewski , "Spyware: The Ghost In The Machine", Communications of the Association for Information Systems, Volume 14, 2004
  • Preeti Tuli, Priyanka Sahu, "System Monitoring and Security UsingKeylogger", International Journal of Computer Science and Mobile Computing, Vol. 2, Issue. 3, March 2013, pg. 106 – 111
  • B. A. Forouzan, Debdeep Mukhopadhyay, "Cryptography and Network Security", The McGraw Hill Companies, 2nd Edition.
  • Sarika Choudhary, Ritika Saroha, Mrs. Sonal Beniwal, "How Anti-virus Software Works??", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 4, April 20132.
  • G Fragkos, O Angelopoulou, K Xynos, "Antivirus False-Positive Alerts, Evading Malware Detection, and Cyber-security Issues", The journal of Information Warfare, Volume 12, Issue 3.
  • M. Alshamrani and S. M. Furnell, "Internet User's Awareness and Understanding of Spyware and Anti-Spyware", Advances in Communications, Computing, Networks and Security 7
  • Kumar Utkarsh, "System Security And Ethical Hacking", International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013
  • Mehdi Dadkhah, Mohammad Davarpanah Jazi, "Secure Payment in E-commerce: Deal with Keyloggers and Pishings", International Journal of Electronics Communication and Computer Engineering, Volume 5,Issue 3,May 2014
  • Security Guideline for standalone and Network computers, National Computer Board, Mauritius, September 2007, Issue No 6.
  • Course Material on "Computer Security and Reliability",Webmaster Chapter 20
  • Bazrafshan Z, Hashemi H, Fard S. M. H, Hamzeh A, "A survey on heuristic malware detection techniques", IEEE, 5th Conference on Information and Knowledge Technology (IKT), Shiraz, 2013
  • Mihai Christodorescu, Somesh Jha, Douglas Maughan, "Malware Detection", Springer-verlag, 2007 Edition.
  • S. Subashini n, V. Kavitha, "A survey on security issues in service delivery models of cloud computing", Journal of Network and Computer Applications 34 (2011) 1–11
  • PriyankRajvanshi, Varun Singh Nagar, Priyanka Chawla, "Data Protection in Cloud Computing", International Journal of Innovative Technology and Exploring Engineering (IJITEE) Volume-3, Issue-3, August 2013
  • Sara Qaisar, KausarFiaz Khawaja, "Cloud Computing: Network/Security Threats and counter measures", Interdisciplinary Journal of Contemporary Research in Business, ijcrb. webs. com, January 2012, Vol 3, N0 9, pp: 1323 – 1329.
  • K. L. Neela, V. Kavitha, R. K. Ramesh, "Cloud Computing: Threats and Security Issues", International Journal Of Engineering Sciences & Research Technology, August, 2013 [2070-2072]
  • T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," Proc. 16th ACM conference on Computer and communications security, 2009, pp. 199-212.
  • Mather T, Kumaraswamy S, Latif S, "Cloud Security and Privacy", O'Reilly Media, Inc. , Sebastopol, CA
  • Zhifeng Xiao and Yang Xiao, "Security and Privacy in Cloud Computing", IEEE Communications Surveys & Tutorials.
  • Keiko Hashizume, David G Rosado, Eduardo Fernández-Medina and Eduardo B Fernandez, "An analysis of security issues for cloud computing", Journal of Internet Services and Applications 2013, 4:5(A SpringerOpen Journal)
  • Attanasio CR. "Virtual machines and data security", Proceedings of the workshop on virtual computer systems. New York, NY, USA: ACM; 1973. p. 206–9.
  • Amazon. AmazonElasticComputeCloud (EC2),2010 (http://www. amazon. com/ ec2/S.
  • M. Descher, P. Masser, T. Feilhauer, A. Tjoa, and D. Huemer, "Retaining Data Control to the Client in Infrastructure Clouds," Availability, Reliability and Security, 2009. ARES '09. International Conference on, 2009, pp. 9
  • http://www. dmst. aueb. gr/dds/pubs/conf/1999-WISE-TTP/html/ttp. html
  • Commission of the European Community. Green paper on the security of information systems, ver. 4. 2. 1, 1994. Alshamsi, T. Saito, A technical comparison of IPSec and SSL, Cryptology (2004).
  • E. Keller, J. Szefer, J. Rexford, and R. B. Lee, "NoHype: virtualized cloud infrastructure without the virtualization," in Proc. 37th annual international symposium on Computer architecture, New York, NY,USA, 2010, pp. 350-361.
  • Haeberlen. "A Case for the Accountable Cloud," 3rd ACM SIGOPS International Workshop on Large-Scale Distributed Systems and Middleware (LADIS '09), Big Sky, MT, October 2009
  • KuiRen, Cong Wang, and Qian Wang, "Security Challenges for the Public Cloud", IEEE Press, 2012, pp. 69 – 73
  • Yinqian Zhang, Ari Juels, Alina Oprea, Michael K. Reiter, "HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis", IEEE Symposium on Security and Privacy, 2011.