helen parimala - Academia.edu (original) (raw)

helen parimala

Uploads

Papers by helen parimala

Research paper thumbnail of Security Enhancing Techniques for Data in IoT Cloud – Analysis

Internet of Things integrated with Cloud makes revolution in every field, starting with business,... more Internet of Things integrated with Cloud makes revolution in every field, starting with business, home, and medicine. IoT is playing a major role by connecting living and non-living via Internet forming a network. Cloud residing at the virtual corner and serving IoT via Internet. If Internet is detached both the technologies may not be named so. Here data from IoT devices were processed and may be preserved on Cloud. Providing numerus benefits and spanning their service they have few issues to be fixed. Dealing with the security issues present, IoT and Cloud would be more trusted and could replace the present workforce. While providing benefits this may help business improve by limiting the time and economy. Therefore, it is clear that security issues if fixed would enhance the growth of these technologies. Such an improvement would help the business and the society grow to a greater extend. The paper presents the existing security mechanism in a multidimensional perspective. The de...

Research paper thumbnail of Taxonomy of Distributed Denial of Service Attacks and Popular Defense Mechanism using Integration of IoT and Cloud Environment

Distributed Denial of Service (DDOS) pose a great challenge to the researchers and other professi... more Distributed Denial of Service (DDOS) pose a great challenge to the researchers and other professionals in the domain of data security. Among one of the most serious threats in the area of cloud computing is DDoS. The services to the legitimate users are disrupted by DDoS attacks which are typically explicit attempts. It even leads to shutting down the system and makes the resources unusable through a group of Zombies trying to attack a single target. Moreover, it is hard to trace the actual attacker. Botnets are been setup by attackers to gain access to a huge number of computers by exploiting their vulnerabilities. A coordinated and large scale attack against one or more targets can happen once an attack army has been setup. A desired goal of data of the intrusion detection is to develop a comprehensive defense mechanism against identified and anticipated DDos attack. The immediate need for a detection approach is been highlighted in this work. The main motive behind this work is t...

Research paper thumbnail of DNA Based Hybrid Approach for Data Integrity on Integrated Cloud Based Smart Environment: An Analysis

Cloud computing is outsourcing IT’s costly infrastructures over the web. Increasing the convenien... more Cloud computing is outsourcing IT’s costly infrastructures over the web. Increasing the convenience of IT users, one of its major contributions is storage. Though storage's over the internet make cost efficiency in IT tasks, there exist risks. Fixing the risks relies on the bed of the algorithms that can also keep cloud storage safe and secure. Few security issues that threaten cloud include, theft of data, Integrity of data, data availability, and security at vendor level. As algorithms could determine the complexity and execution time, it also has the property of identifying the efficiency of the system. As the algorithm is presently used highly in the security of data and storage and there is a lack of data integrity in the cloud environment, this paper is intended to make a detailed study on the existing algorithms used to enhance the security of the data on storage. The study is conducted in various dimensions to explore the facts, such as level of security, efficiency, and...

Research paper thumbnail of Shield Advanced Mitigation System of Distributed Denial of Service Attack in integration of Internet of Things and Cloud Computing Environment

International Journal of Innovative Technology and Exploring Engineering, 2019

Cloud services among public and business companies have become popular in recent years. For produ... more Cloud services among public and business companies have become popular in recent years. For production activities, many companies rely on cloud technology. Distributed Denial of Services (DDoS) attack is an extremely damaging general and critical type of cloud attacks. Several efforts have been made in recent years to identify numerous types of DDoS attacks. This paper discusses the different types of DDoS attacks and their cloud computing consequences. Distributed Denial of Service attack (DDoS) is a malicious attempt to disrupt the normal movement of a targeted server, service or network through influx of internet traffic overwhelming the target or its infrastructure. The use of multiple affected computer systems as a source of attacks makes DDoS attacks effective. Computers and other networked tools, including IoT phones, may be included on exploited machines. A DDoS attack from a high level resembles a traffic jam that is caused by roads that prevents normal travel at their desi...

Research paper thumbnail of Security Enhancing Techniques for Data in IoT Cloud – Analysis

Internet of Things integrated with Cloud makes revolution in every field, starting with business,... more Internet of Things integrated with Cloud makes revolution in every field, starting with business, home, and medicine. IoT is playing a major role by connecting living and non-living via Internet forming a network. Cloud residing at the virtual corner and serving IoT via Internet. If Internet is detached both the technologies may not be named so. Here data from IoT devices were processed and may be preserved on Cloud. Providing numerus benefits and spanning their service they have few issues to be fixed. Dealing with the security issues present, IoT and Cloud would be more trusted and could replace the present workforce. While providing benefits this may help business improve by limiting the time and economy. Therefore, it is clear that security issues if fixed would enhance the growth of these technologies. Such an improvement would help the business and the society grow to a greater extend. The paper presents the existing security mechanism in a multidimensional perspective. The de...

Research paper thumbnail of Taxonomy of Distributed Denial of Service Attacks and Popular Defense Mechanism using Integration of IoT and Cloud Environment

Distributed Denial of Service (DDOS) pose a great challenge to the researchers and other professi... more Distributed Denial of Service (DDOS) pose a great challenge to the researchers and other professionals in the domain of data security. Among one of the most serious threats in the area of cloud computing is DDoS. The services to the legitimate users are disrupted by DDoS attacks which are typically explicit attempts. It even leads to shutting down the system and makes the resources unusable through a group of Zombies trying to attack a single target. Moreover, it is hard to trace the actual attacker. Botnets are been setup by attackers to gain access to a huge number of computers by exploiting their vulnerabilities. A coordinated and large scale attack against one or more targets can happen once an attack army has been setup. A desired goal of data of the intrusion detection is to develop a comprehensive defense mechanism against identified and anticipated DDos attack. The immediate need for a detection approach is been highlighted in this work. The main motive behind this work is t...

Research paper thumbnail of DNA Based Hybrid Approach for Data Integrity on Integrated Cloud Based Smart Environment: An Analysis

Cloud computing is outsourcing IT’s costly infrastructures over the web. Increasing the convenien... more Cloud computing is outsourcing IT’s costly infrastructures over the web. Increasing the convenience of IT users, one of its major contributions is storage. Though storage's over the internet make cost efficiency in IT tasks, there exist risks. Fixing the risks relies on the bed of the algorithms that can also keep cloud storage safe and secure. Few security issues that threaten cloud include, theft of data, Integrity of data, data availability, and security at vendor level. As algorithms could determine the complexity and execution time, it also has the property of identifying the efficiency of the system. As the algorithm is presently used highly in the security of data and storage and there is a lack of data integrity in the cloud environment, this paper is intended to make a detailed study on the existing algorithms used to enhance the security of the data on storage. The study is conducted in various dimensions to explore the facts, such as level of security, efficiency, and...

Research paper thumbnail of Shield Advanced Mitigation System of Distributed Denial of Service Attack in integration of Internet of Things and Cloud Computing Environment

International Journal of Innovative Technology and Exploring Engineering, 2019

Cloud services among public and business companies have become popular in recent years. For produ... more Cloud services among public and business companies have become popular in recent years. For production activities, many companies rely on cloud technology. Distributed Denial of Services (DDoS) attack is an extremely damaging general and critical type of cloud attacks. Several efforts have been made in recent years to identify numerous types of DDoS attacks. This paper discusses the different types of DDoS attacks and their cloud computing consequences. Distributed Denial of Service attack (DDoS) is a malicious attempt to disrupt the normal movement of a targeted server, service or network through influx of internet traffic overwhelming the target or its infrastructure. The use of multiple affected computer systems as a source of attacks makes DDoS attacks effective. Computers and other networked tools, including IoT phones, may be included on exploited machines. A DDoS attack from a high level resembles a traffic jam that is caused by roads that prevents normal travel at their desi...

Log In