Title of article :
Neutralizing the Impact of Account or Service Traffic Hijacking in Cloud Computing.
Author/Authors :
Kumar، Virender نويسنده FIMT Bareilly , , Gupta، Hiresh Kumar نويسنده - , , Sharma، Sunil نويسنده Department of Medicine, Postgraduate Institute of Medical Education & Research, Chandigarh, India ,
Issue Information :
روزنامه با شماره پیاپی سال 2014
Abstract :
Cloud computing is a booming computing model in the IT industry. Machines involved in cloud computing provide efficient computing power. Though massive adoption of this technology is seen across the globe, yet security issues are preventing its deep penetration. In a recent survey, 69 percent of North American IT professionals expressed a belief that the risks of using a cloud based service currently outweighed the benefits. The main reason cited was a concern over data security. Another feather in this was added by Cloud Security Alliance Annual report 2013 in which “Account or Service Traffic Hijacking”, was cited as one of major security threat .In account or service traffic hijacking an attacker gains access to our credentials, therefore, he or she can eavesdrop on our activities and transactions, manipulate data, return falsified information, and redirect your clients to illegitimate sites. In this paper we present a model that will neutralize this security threat and thereby making cloud computing promising.
Journal title :
International Journal of Electronics Communication and Computer Engineering
Journal title :
International Journal of Electronics Communication and Computer Engineering