文献类型: 会议论文
第一作者: Mamta Swarnkar
作者: Mamta Swarnkar 1 ; Shekh Kulsum Almas 2 ; Nagendra Singh 3 ; Harsh Pratap Singh 4 ; Anuprita Mishra 5 ; Anula Khare 6 ;
作者机构: 1.Department of Computer Science and Engineering, MANIT, Bhopal, India
2.Department of ECE, Sage University, Indore, India
3.Department of Electrical Engineering, Trinity College of Engineering & Technology, Karimnagar, India
4.Department of Computer Science and Engineering, Shri Vaishnav Vidyapeeth, Vishwavidyalaya, Indore, India
5.Department of Electrical and Electronics Engineering, IES College of Technology, Bhopal, India|Department of Electrical and Electronics Engineering, IES University, Bhopal, India
6.Department of Electrical & Electronics Engineering, Technocrats Institute of Technology, Bhopal, India
关键词: Cloud computing security;Computational modeling;Scalability;Open systems;Machine learning;SQL injection;Blockchains
会议名称: IEEE International Conference on Big Data & Machine Learning
主办单位:
页码: 73-78
摘要: This research paper explores the potential of using blockchain technology in cloud computing security to mitigate DDoS, MITM, and SQL injection attacks. The paper discusses the traditional security measures used in cloud computing and how attackers can bypass these measures at each layer of the OSI model. The proposed solution suggests utilizing blockchain features at each layer of the OSI model to enhance cloud security measures. The paper provides a detailed explanation of how the proposed blockchain-based security measures can be used to prevent DDoS, MITM, and SQL injection attacks. It is crucial to remember that the suggested remedy has not been put to the test in real life, and more investigation and testing are required to confirm its viability and efficacy. Overall, the integration of blockchain technology into cloud computing security shows promising potential to enhance the security of cloud environments.
分类号: tp3-53
- 相关文献
[1]An Innovative Method for Authenticating and Accounting for Cloud-based Financial Transactions is to Publicly Disseminate the User's Private Key. Pravin R. Nerkar,Manoj K. Ramaiya. 2023
[2]Design of an Augmented Clustering Model using LEACH & PEGASIS for Low Complexity & High Network Lifetime. Jaya Raut,Akhilesh Upadhyay. 2022
[3]THE STREAM ALGORITHM: COMPUTATIONALLY EFFICIENT RIDGE-REGRESSION VIA BAYESIAN MODEL AVERAGING, AND APPLICATIONS TO PHARMACOGENOMIC PREDICTION OF CANCER CELL LINE SENSITIVITY. IN SOCK JANG,STEPHEN H. FRIEND,ADAM A. MARGOLIN,ELIAS CHAIBUB NETO. 2014
[4]Validation of a workflow based on Sentinel-2, Sentinel-1 and meteorological data predicting biomass on pastures. Nickmilder C,Tedde A,Dufrasne I.. 2021
[5]SYSTEMATIC ASSESSMENT OF ANALYTICAL METHODS FOR DRUG SENSITIVITY PREDICTION FROM CANCER CELL LINE DATA. IN SOCK JANG,ELIAS CHAIBUB NETO,JUSTIN GUINNEY,STEPHEN H. FRIEND,ADAM A. MARGOLIN. 2014
[6]A Machine Learning Approach to Diffusion MRI Partial Volume Estimation. Emmanuel Vallee,Wenchuan Wu,Francesca Galassi,Saad Jbabdi,Stephen Smith. 2018
[7]Machine Learning-Based Fraud Detection System for Insurance Claims in IoT Environment. Bediga Sharan,Mohammad Hassan,V Divya Vani,Vijilius Helena Raj,GinniNijhawan,Priyanka Prabhakar Pawar. 2024
[8]Evaluation of Solar Energy Generation and Radiation Prediction Using Machine Learning. Santosh S Raghuwanshi,Jagrati Gupta,Gourav Shrivastava. 2023
[9]Deployment of models to predict compressed sward height at a large scale: results and feedback. Nickmilder C.,Tedde A,Dufrasne I.. 2022
[10]Prediction of the Risk of Heart Attack Using Machine Learning Techniques. Pinaki Ghosh,Umesh Kumar Lilhore,Sarita Simaiya,Atul Garg,Devendra Prasad,Ajay Kumar. 2022
[11]MGRFormer: A Multimodal Transformer Approach for Surgical Gesture Recognition. Kevin Feghoul,Deise Santana Maia,Mehdi El Amrani,Mohamed Daoudi,Ali Amad. 2024
[12]Building Common Ground: An Inter-Institutional Computing & Engineering Education Transfer Learning Community. Danyelle Tauryce Ireland,Rebecca Zarch,Ilana Hipshman,Ashley Clark. 2021
[13]Computer Vision-Based Assistance System for Visually Impaired Individuals in Vending Machine Interactions. Karla Miriam Reyes Leiva,Roy Abi Zeid Daou,José Javier Serrano Olmedo. 2023
[14]A Comparative Study of Various Learning Models for Object Detection in Contextual Scene Interpretation. Taranpreet Singh,Dr.Hemang Shrivastava. 2023
[15]Hybrid Confidentiality Framework for Secured Cloud Computing. Gaurav Shrivastava,Sachin Patel. 2022