THREAD SPECIFIC SECURITY RISK EVALUATION IN THE CLOUD
- Version
- Download 9
- File Size 262.48 KB
- File Count 1
- Create Date 23 May 2023
- Last Updated 23 May 2023
THREAD SPECIFIC SECURITY RISK EVALUATION IN THE CLOUD
Ms.S.Thangamani1, J.Mohamod suhail2, S.Nandhakumaran3, B.Dhiyanesh4,S.Senthilkumar5
1Assistant Professor, Department of Information Technology, Nandha Engineering College-Erode- 638052, Tamilnadu, India.
2,3,4,5UG Scholar, Information Technology, Nandha Engineering College-Erode- 638052, Tamilnadu, India.
E-mail : mohamodsuhail@gmail.com
Abstract. We offer a threat-specific risk evaluation technique that makes use of multiple cloud security aspects (e.g., vulnerability information, attack likelihood, and the effect of each assault associated with the detected threat(s)) as well as client-specific cloud security needs.
Our solution enables a cloud provider's security administrator to make fine-grained judgments for selecting mitigation measures in order to safeguard particular customers' outsourced computing assets against specific attacks depending on their specific security demands. This differs from conventional asset-based systems, which lack the functionality to give a security review of the cloud in relation to specific risks.
The suggested technique, on the other hand, enables security managers to calculate a range of more effective client-specific countermeasures based on the relevance of security needs and threats. Frothy Disturbance Intrusion Detection Systems (FIDSs) can be useful in identifying and preventing security threats. The internet is being integrated with entities from several fields of human civilization (such as smart homes, health care, smart grids, industrial processes, product supply networks, and environmental monitoring).
Download