CS2M: Cloud Security and SLA Management
Main Article Content
Abstract
With the support of a vast amount of virtual storage, cloud computing (CC) delivers on-demand services over the Internet. The key characteristics of cloud computing are that no costly computing infrastructure is established by the customer and the cost of its services is lower. Cloud data protection is important to make sure that your data is secure. So the cloud service provider must be aware of the latest malware cases that allegedly occurred in the Cloud ecosystem. This paper addressed the fundamental characteristics of cloud computing, security challenges, threats, and their solutions. The study also highlights many key cloud-related subjects, namely the structure for cloud infrastructure, operation, cloud security principles, threats, and attacks. The techniques that we have used here are SLA management using RALLY for open stack private Cloud and the malware analysis has been identified using open source virus total repository. The results identified during the experiments reflect that our proposed scheme, “CS2M: Cloud Security and SLA management” performs faster as compared to the conventional techniques. Keywords: Cloud Computing, Security, Protection, SLA Management, Malware detection