Intensify Cloud Security and Privacy Against Phishing Attacks

Main Article Content

Article Sidebar

Published Oct 7, 2021
Debabrata Dansana
Vivek Kumar Prasad Madhuri Bhavsar Brojo Kishore Mishra

Abstract

The world of computation has shifted from centralized (client-server, not web-based) to distributed systems during the last three decades. We are now reverting to virtual centralization, i.e., Cloud Computing (CC). The location of data and processes makes all the difference. On the one hand, a person has complete control over the data and operations in their computer. Cloud computing involves a vendor providing service and data upkeep. At the same time, the client or customer is ignorant of where the processes are operating. As a result, the client does not influence it and doesn't have the right to do it. The internet is used as a communication medium for CC. When it comes to data security in cloud computing, the vendor must guarantee service level agreements (SLAs) to persuade the client. Organizations that utilize CC as a service architecture are keen to look into security and confidentiality concerns for their mission-critical and non-sensitive applications. However, because they provide various services such as Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), ensuring the security of business data in the "Cloud" is challenging.

Each service has its own set of security concerns. As a result, the SLA must define several degrees of security and their complexity depending on the benefits for the client to comprehend the security rules in place. Phishing is a social engineering assault frequently used to obtain user information, such as login passwords and credit card details. It happens when an attacker poses as a trustworthy entity and tricks the victim into opening an email, instant message, or text message. In this research paper, the methodology that tries to identify the phishing attack in the Cloud ecosystem has been explored and mentioned to minimize the attacks to increase the Cloud trust level. The approach used here classifies the malicious and non-malicious URLs with an accuracy of 92.89%. The experimental setup and its outcome prove suitable for identifying the fishing attacks in the cloud ecosystem.

How to Cite

Debabrata Dansana, Vivek Kumar Prasad, Madhuri Bhavsar, & Brojo Kishore Mishra. (2021). Intensify Cloud Security and Privacy Against Phishing Attacks. SPAST Abstracts, 1(01). Retrieved from https://spast.org/techrep/article/view/1550
Abstract 161 |

Article Details

Keywords

Cloud Computing, Security, Phishing attacks, Service Level Agreements (SLAs), Trust

References
Prasad, Vivek Kumar, Madhuri D. Bhavsar, and Sudeep Tanwar. ”Influence of monitoring: Fog and edge computing.” Scalable Computing: Practice and Experience 20.2 (2019): 365-376.
Prasad, Vivek Kumar, and Madhuri Bhavsar. ”Exhausting Autonomic Techniques for Meticulous Consumption of Resources at an IaaS Layer of Cloud Computing.” International Conference on Future Internet Technologies and Trends. Springer, Cham, 2017.
Prasad, Vivek Kumar, Sudeep Tanwar, and Madhuri D. Bhavsar. ”Advance Cloud Data Analytics for 5G Enabled IoT.” Blockchain for 5G-Enabled IoT: 159.
Section
GE3- Computers & Information Technology

Most read articles by the same author(s)