International Journal of Applied Engineering Research
ISSN 0973-4562 Volume 9, Number 20 (2014) pp. 7755-7768
© Research India Publications
http://www.ripublication.com
Data and Information Storage Security from Advanced
Persistent Attack in Cloud Computing
J.Vijaya Chandra
1*
Dr. Narasimham Challa
2
and Dr. Mohammed Ali Hussain
3
1*
Research Scholar, Department of Computer Science and Engineering,
KL University, Guntur Dist., A.P., India. E-mail: vij a y a c handra. phd@gmail.com
2
Professor & HOD, Department of Computer Science and Engineering,
S.R College of Engineering, Ananthasagar, Hasanparthy, Warangal, Telangana, India.
E-mail:narasimham_c@yahoo.com
3
Professor, Department of Electronics and Computer Engineering,
KL University, Guntur Dist., A.P., India. E-mail:alihussain.phd@gmail.com
Abstract
Cloud Security relates to Data and Information Storage Security which
includes Network Security. An attack is an action performed to exploit
vulnerability. Cloud Computing deals with protocols, policies, services,
technologies, architecture and infrastructure. This paper clarifies the nature of
Advanced Persistent Attack and Security Measures and Controls were
discussed, an outline of different security procedures and techniques
explained. This paper involves the Security Reference Architecture and
secured model of cloud computing with technical security measures. This
paper immense the need of securing the cloud as shares resources.
Keywords: Advanced Persistent Attack, Cloud Security, vulnerability.
Introduction
Security is a major Issue, It is required to address operational and control point of
view under a Particular Domain, where we can focus on traditional as well as
application security. Data center operations are monitored and maintained where
different techniques are used for recover data at disasters, vulnerabilities in cloud
services should be identified and a great attention should be given for the protection
of Cloud. The data security is the foundation of information security, the security of
data storage is managed with the existing techniques such as cryptography,
Authentication and isolation of virtual environments and so on where more