ISSUES AND THREATSIN CLOUD NETWORK SECURITY

被引:0
|
作者
Tandon, Anisha [1 ]
Madan, Mamta [2 ]
Dave, Meenu [1 ]
机构
[1] JaganNath Univ, Jaipur, Rajasthan, India
[2] GGSIPU, VIPS, Pitampura, India
来源
ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES | 2021年 / 20卷 / 10期
关键词
Network; Security; Wireless Networks; Cryptography;
D O I
暂无
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Being connected to people has become an indispensable part of our day-to-day lives. We stay constantly connected with the people around us. In simple words, Network security can be defined as a connection of multiple devices. With increasing connectivity of devices, it is essential that data shared among a group of devices stays private as intended by the participants of the group. Today's networking structure is intricate and is faced by constant threat from hackers. Loopholes in network security may lead to serious threats such as Data Modification, DOS attack, Eavesdropping, Botnet, Identity Spoofing, MITM attack, Password - Based attacks etc. This paper briefly introduces the concepts related to Network Security and the threats to which a network may be exposed. It also focuses on resolving various threats faced by networks such as Cryptography, Hashing, Firewalls, VPN, Proxy Servers, Anti-virus soft wares and SSL/TLS. This paper gives in depth consideration to wireless network security and a prospective solution to increase wireless network security.
引用
收藏
页码:2077 / 2083
页数:7
相关论文
共 50 条
  • [31] Security and privacy issues for the network of the future
    Marias, Giannis F.
    Barros, Joao
    Fiedler, Markus
    Fischer, Andreas
    Hauff, Harald
    Herkenhoener, Ralph
    Grillo, Antonio
    Lentini, Alessandro
    Lima, Luisa
    Lorentzen, Charlott
    Mazurczyk, Wojciech
    de Meer, Hermann
    Oliveira, Paulo F.
    Polyzos, George C.
    Pujol, Enric
    Szczypiorski, Krzysztof
    Vilela, Joao P.
    Vinhoza, Tiago T. V.
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (09) : 987 - 1005
  • [32] Analysis of security issues and management standards in Cloud Computing
    Kaur, Jagpreet
    Singh, Sunny
    Karn, Amit
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1474 - 1478
  • [33] Issues And Challenges of Data Security In A Cloud Computing Environment
    Sharma, Pradeep Kumar
    Kaushik, Prem Shankar
    Agarwal, Prerna
    Jain, Payal
    Agarwal, Shivangi
    Dixit, Kamlesh
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 560 - 566
  • [34] Security Issues of Mobile Application Using Cloud Computing
    Cimler, Richard
    Matyska, Jan
    Balik, Ladislav
    Horalek, Josef
    Sobeslav, Vladimir
    AFRO-EUROPEAN CONFERENCE FOR INDUSTRIAL ADVANCEMENT, AECIA 2014, 2015, 334 : 347 - 357
  • [35] Mobile Cloud Computing: Architecture, Advantages and Security Issues
    Fellah, Hadjer
    Mezioud, Chaker
    Batouche, Mohamed Chaouki
    3RD INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEM & SECURITY (NISS'20), 2020,
  • [36] A survey on cloud computing security: Issues, threats, and solutions
    Singh, Saurabh
    Jeong, Young-Sik
    Park, Jong Hyuk
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 75 : 200 - 222
  • [37] Security and Privacy Issues in Cloud, Fog and Edge Computing
    Parikh, Shalin
    Dave, Dharmin
    Patel, Reema
    Doshi, Nishant
    10TH INT CONF ON EMERGING UBIQUITOUS SYST AND PERVAS NETWORKS (EUSPN-2019) / THE 9TH INT CONF ON CURRENT AND FUTURE TRENDS OF INFORMAT AND COMMUN TECHNOLOGIES IN HEALTHCARE (ICTH-2019) / AFFILIATED WORKOPS, 2019, 160 : 734 - 739
  • [38] Security Issues In Cloud Computing And Associated Alleviation Approaches
    Hammami, Hamza
    Brahmi, Hanen
    Brahmi, Imen
    Ben Yahia, Sadok
    2016 12TH INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY & INTERNET-BASED SYSTEMS (SITIS), 2016, : 758 - 765
  • [39] Vehicular Cloud Networks: Architecture, Applications and Security Issues
    Ahmad, Farhan
    Kazim, Muhammad
    Adnane, Asma
    Awad, Abir
    2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2015, : 571 - 576
  • [40] Checkpointing as a Counter to Security Issues in Cloud Computing Infrastructures
    Mbogholi, Msagha J.
    Okoyo, Henry O.
    Mcoyowo, Sylvester J. O.
    2020 IST-AFRICA CONFERENCE (IST-AFRICA), 2020,