SaaS Security Solutions Through Soft Computing Techniques

dc.contributor.guideGopal K Shyam
dc.coverage.spatial
dc.creator.researcherReddy Saisindhutheja
dc.date.accessioned2021-12-30T07:09:02Z
dc.date.available2021-12-30T07:09:02Z
dc.date.awarded2021
dc.date.completed2021
dc.date.registered2017
dc.description.abstractThe Cloud prototype is growing extremely fast owing to its on-demand services. newlineSoftware-as-a Service (SaaS) is surrounded by the excellent and best ever rising field newlinein the epoch of Cloud computing. Companies are considering SaaS solutions which newlineprovide various advantages predominantly with decrease in cost and time. The major newlinefactor in the achievement of SaaS is based upon client s fulfilment. Security is found newlineas the major critical issue for SaaS in Cloud computing. SaaS in Cloud computing newlineprovides following benefits: efficient use of software licenses, modest tools, centralized newlinemanagement of data, multi-tenant solutions, minimal maintenance, easy upgrades and newlinescalability. newlineThe existing works on security in Cloud focuses on multi factor authentication, newlineverifying the access control, monitoring the data access, verifying the data deletion, newlinecontrolling the consumer access devices, security check events etc. However, these newlineservices are delayed and sometimes totally disrupted because of the Internet s newlineunavailability that provides opportunities for a lot of attacks. The range of intimidation newlinethat possibly attacks a network is considered as a hazardous. Worms, DoS or botnet newlineattacks are the subsets of threats that frequently occur in the networks. Further, there is newlinea need to implement a holistic solution for the model that allows malware prevention, newlinerisk assessment, malicious behaviour identification, data loss prevention and data newlineclassification. newlineImportant reasons for this gap could be due to the misconfigurations of Cloud services, newlinenot having an exit strategy; difficult to maintain noisy, voluminous and high newlinedimensionality data, increase in false positive percentage, lower attack detection rate, newlinepoor testing and training accuracy, less throughput which incurs in high delay. newlineInsufficient research exists; however, this research work is envisioned to fully newlineunderstand how attack detection, mitigation and risk assessment can be combined with newlinehybridised and enhanced soft computing techniques. newlineThis thesis has four contributio
dc.description.note
dc.format.accompanyingmaterialDVD
dc.format.dimensions
dc.format.extent
dc.identifier.urihttp://hdl.handle.net/10603/353364
dc.languageEnglish
dc.publisher.institutionSchool of Computing and Information Technology
dc.publisher.placeBengaluru
dc.publisher.universityREVA University
dc.relation
dc.rightsuniversity
dc.source.universityUniversity
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Information Systems
dc.subject.keywordEngineering and Technology
dc.titleSaaS Security Solutions Through Soft Computing Techniques
dc.title.alternative
dc.type.degreePh.D.

Files

Original bundle

Now showing 1 - 5 of 16
Loading...
Thumbnail Image
Name:
01_title.pdf
Size:
91.05 KB
Format:
Adobe Portable Document Format
Description:
Attached File
Loading...
Thumbnail Image
Name:
02_declaration.pdf
Size:
121.88 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
03_acknoweledgements.pdf
Size:
111.97 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
04_abstarct.pdf
Size:
113.6 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
05_table of contents.pdf
Size:
110.21 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Plain Text
Description: