Divyashu Banerjee, G. Appa Rao


An open cloud is standard model which providers make several sources, for example applications and storage, open to the general public. Public cloud services might be free or otherwise. Hybrid cloud is definitely an atmosphere that the company provides and controls some sources internally and it has many others for public use. You will find three major kinds of service within the cloud atmosphere: SaaS, PaaS, and laaS. Ideally, cloud-computing provider won't ever go bankrupt or get acquired with a bigger company with maybe new policies. But clients should be sure their data will stay available despite this kind of event. A malicious user, whether internal or exterior, just like a legal user will find this IP addresses too. Within this situation, malicious user will discover which physical servers the victim is applying then by implanting a malicious virtual machine at this place to launch a panic attack. Furthermore, simply because the program can run inside a Virtual machine does not necessarily mean it performs well in cloud atmosphere always. A hacker may use a cloud for hosting a malicious application for achieve his object which can be a Web sites attacks against cloud itself or organizing another user within the cloud. In cloud-computing where infrastructure is shared by many clients, Web sites attacks make have the possibility of getting much greater impact than against single tenanted architectures. In migration, available method should be predict adaptation time and then try to avoid cloud nodes overload by a few procedure for example partitioning and fragment and moving data in smaller sized bits of data and looking after the opportunity to run transactions while movement occurs. Indeed, because of the collaborative property of some applications, an information owner enables specific parties to decrypt the encrypted data stored around the cloud storage.


Hacker; DDoS; Cloud Computing; Hybrid Cloud;


Martinez F,Toh, Cano J.C, Calafate C. and Manzoni P, 2010,‘Emergency services in future intelligent transportation systems based on vehicular communication networks’, IEEE Intelligent Transportation Systems Magazine.

M. Chehreghani Bozchalui, “Optimal operation of energy hubs in the context of smart grids,” Ph.D. dissertation, Dept. Elect. Comput. Eng., Univ. Waterloo, Waterloo, ON, Canada, 2011.

T. Kitagawa, P. Yang, G. Hanaoka, R. Zhang, K. Matsuura, and H. Imai, “Generic transforms to acquire CCA-security for identity based encryption: The Cases of FOPKC and REACT,” Proc. ACISP’06, LNCS, vol. 4058, pp. 348-359, 2006.

J. Li, Y. Shi, and Y. Zhang, ”Searchable ciphertext-policy attributebased encryption with revocation in cloud storage,” International Journal of Communication Systems, article in press (DOI: 10.1002/dac.2942), 2015.

C. Almond, "A Practical Guide to Cloud Computing Security," 27 August 2009 2009.

S. Roschke, et aI., "Intrusion Detection in the Cloud," presented at the Eighth IEEE International Conference on Dependable, AutonomIc and Secure Computing, Chengdu, China, 2009.

Chin Teng Lin, 2014‘Wireless and Wearable EEG System for Evaluating Driver Vigilance’, IEEE Transactions on biomedical circuits and systems, Vol.15,No.8,pp.230-255.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at