• Title of article

    Neutralizing the Impact of Account or Service Traffic Hijacking in Cloud Computing.

  • Author/Authors

    Kumar، Virender نويسنده FIMT Bareilly , , Gupta، Hiresh Kumar نويسنده - , , Sharma، Sunil نويسنده Department of Medicine, Postgraduate Institute of Medical Education & Research, Chandigarh, India ,

  • Issue Information
    روزنامه با شماره پیاپی سال 2014
  • Pages
    4
  • From page
    206
  • To page
    209
  • Abstract
    Cloud computing is a booming computing model in the IT industry. Machines involved in cloud computing provide efficient computing power. Though massive adoption of this technology is seen across the globe, yet security issues are preventing its deep penetration. In a recent survey, 69 percent of North American IT professionals expressed a belief that the risks of using a cloud based service currently outweighed the benefits. The main reason cited was a concern over data security. Another feather in this was added by Cloud Security Alliance Annual report 2013 in which “Account or Service Traffic Hijacking”, was cited as one of major security threat .In account or service traffic hijacking an attacker gains access to our credentials, therefore, he or she can eavesdrop on our activities and transactions, manipulate data, return falsified information, and redirect your clients to illegitimate sites. In this paper we present a model that will neutralize this security threat and thereby making cloud computing promising.
  • Journal title
    International Journal of Electronics Communication and Computer Engineering
  • Serial Year
    2014
  • Journal title
    International Journal of Electronics Communication and Computer Engineering
  • Record number

    2010908