A. S. Anakath1,*, R. Kannadasan2, Niju P. Joseph3, P. Boominathan4, G. R. Sreekanth5
Computer Systems Science and Engineering, Vol.41, No.2, pp. 479-492, 2022, DOI:10.32604/csse.2022.019940
- 25 October 2021
Abstract Cloud computing is a high network infrastructure where users, owners, third users, authorized users, and customers can access and store their information quickly. The use of cloud computing has realized the rapid increase of information in every field and the need for a centralized location for processing efficiently. This cloud is nowadays highly affected by internal threats of the user. Sensitive applications such as banking, hospital, and business are more likely affected by real user threats. An intruder is presented as a user and set as a member of the network. After becoming an insider… More >