Karpagam JCS ISSN: 2582 – 8525 (Print), 2583 – 3669 (Online)

A Survey on Security Breaches of Data Availability And Data Integrity in Cloud Computing

Abstract
The new concepts of the distributed system, the user requires a large storage space for their data. So, cloud computing is the place of interest of the age and due to its exciting possibilities and disastrous affect the performance, protection and ethics, it is the brand new acute region of situation to groups. Clients relieve their data storage and maintenance pressure locally by transmitting it over the web. While the client doesn't have permission to the data directly from the server physically, without the awareness of the client, the cloud provider can change or erase data that is either not needed for a long time by the client or that consumes large space. Thus, for correction purposes there is a need to review the data periodically; reviewing data for error is called data honesty. Alternatively, cloud computing idea, provide a latest safety and protective mechanism, which is being constructed towards all threats type of problems or a community of malicious attacks which affect cloud computing's excellent of provider. Unlike standard DoS. attacks, LRDOS attacker periodically injects fast continuous traffic. It causes rather poor latency TCP connections for the sender to timeout. These attacks are hard to detect and eliminated since high-rate traffic triggers most DoS threat detection systems. This paper introduces the survey of accessible strategies to identify LRDoS attacks and also examined numerous existing systems for auditing data integrity along with their risks.

View Full Article

Download or view the complete article PDF published by the author.

📥 Download PDF 👁️ View in Browser