SAAS: Attack Detection and Prevention with Forensic in cloud environment
Sayeda A Rahila1, Shraddha Khonde2
1Sayeda A Rahila*, P.G. Student, Department of Computer Engineering, Modern Education Society of Eng. Pune, MH, India
2Prof. Shraddha Khonde, Professor, Department of Computer Engineering, Modern Education Society of Eng. Pune, MH, India
Manuscript received on October 15, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 1199-1203 | Volume-9 Issue-1, November 2019. | Retrieval Number: L29001081219/2019©BEIESP | DOI: 10.35940/ijitee.L2900.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Basically cloud computing security is essential nowadays, it has arisen as a technology to allow users as well as clients to access communications, data storage, software as well as exploitation Environment according to pay-as-what-use structure. Conventional digital forensic can’t be investigated due to some technical challenges like environmental as well as technical. The vibrant nature of cloud computing provides massive opportunities to identify malicious request using various security algorithms in cloud environment. Proposed research work identifies the current issues and provides solutions to reduce some challenges in the cloud environment. In this paper system proposed forensic investigation of cloud security for trusted and untrusted environments. System illustrated the various machine learning algorithms for eliminate the malicious request, and investigate the malicious user also. Proposed method generate the user log base snapshot during the active session and manual investigator can verify all logs and identify the malicious user. We offer a skilled technique for forensic examination in the cloud with the help of virtual machine (VM) and generate snapshots. The experimental analysis shows illustration of proposed security of system.
Keywords: Software as Services, Snapshot generation, Cloud Computing, VM, Cloud Service Provider.
Scope of the Article: Cloud Computing