Downloads

Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture

Authors

Komal Jeet Kaur1

Abstract

The cloud computing is the architecture in which virtual machine, cloudlets, and data centers are involved in communication. In the network, malicious nodes are responsible to trigger various types of active and passive attacks which reduce network performance in terms of various parameters. In this work, technique will be proposed for the detection and isolation of malicious nodes from the network. the malicious nodes are responsible to trigger virtual side channel attack in the network.

Article Details

Published

2017-07-13

Section

Articles

How to Cite

Technique for Isolation of Malicious Nodes from the Cloud Computing Architecture. (2017). International Journal of Engineering and Computer Science, 6(7). http://www.ijecs.in/index.php/ijecs/article/view/2823