An Enforcement of Guaranteed Client Level Defensive Mechanism in Public Cloud Services
Main Article Content
Abstract
In the current era of cloud computing, distinct enterprise information technology (IT) and business decision-makers analyze the security implications of cloud computing to benefit and improve business agility. Cloud computing has been playing a major role in various multidisciplinary domains, with recent surveys indicating that 70% of research issues focus on cloud security. Despite providing a vast array of services to users, cloud computing still faces challenges in eradicating client-end security problems. Therefore, there is a significant focus on improving and finding solutions for cloud security, particularly in understanding potential risks at the customer end. Several large cloud vendors have implemented security mechanisms primarily to protect the cloud infrastructure from insider threats and advanced persistent threats. To address these concerns, a proposed model aims to provide guaranteed cloud services in an attack-free manner to web clients. This will be achieved through a client-level guaranteed security system defensive approach. The mechanism will focus on protecting user authentication procedures, security policies, and employing a security layered approach in client-level transactions. The proposed work will be simulated using the cloud sim tool, enabling end-users to obtain a better security solution in the public cloud environment.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
Jang, M., Yoon, M., & Chang, J. (2014). A Privacy-aware query authentication index for database outsourcing. IEEE Conference Publications.
Lu, W., Varna, A. L., & Wu, M. (2014). Confidentiality-Preserving Image Search: A Comparative Study between Homomorphic Encryption and Distance-Preserving Randomization. IEEE Transactions on Volume 2.
Velciu, M.-A., Patrascu, A., & Patriciu, V.-V. (2014). Bio-cryptographic authentication in cloud storage sharing. In Applied Computational Intelligence and Informatics (SACI), 2014 IEEE 9th International Symposium.
Poornima, B., & Rajendran, T. (2014). Improving Cloud Security by Enhanced HASBE Using Hybrid Encryption Scheme. In Computing and Communication Technologies (WCCCT), 2014 World Congress on March-14.
Durrani, A. (2014). Analysis and prevention of vulnerabilities in cloud applications. In Information Assurance and Cyber Security (CIACS), 2014 IEEE Conference.
Liu, C., & more authors. (2014). Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates Parallel and Distributed Systems. IEEE Transactions on Cloud Computing.
Hussain, M. (2014). Effective Third Party Auditing in Cloud Computing. In Advanced Information Networking and Applications Workshops (WAINA), 28th International Conference on 13-16 May 2014.
Saxena, V., et al. (Year). Implementation of a secure genome sequence search platform on a public cloud leveraging open source solutions. Journal of Cloud Computing.