To search, Click below search items.

 

All Published Papers Search Service

Title

A Model to Investigate the Security Challenges and Vulnerabilities of Cloud Computing Services in Wireless Networks

Author

Desta Dana Data

Citation

Vol. 23  No. 10  pp. 107-114

Abstract

The study provides the identification of vulnerabilities in the security issues by Wireless Network. To achieve it the research focus on packet flow analysis, end to end data communication, and the security challenges (Cybercrime, insider threat, attackers, hactivist, malware and Ransomware). To solve this I have used the systematic literature review mechanisms and demonstrative tool namely Wireshark network analyzer. The practical demonstration identifies the packet flow, packet length time, data flow statistics, end- to- end packet flow, reached and lost packets in the network and input/output packet statics graphs. Then, I have developed the proposed model that used to secure the Wireless network solution and prevention vulnerabilities of the network security challenges. And applying the model that used to investigate the security challenges and vulnerabilities of cloud computing services is used to fulfill the network security goals in Wireless network. Finally the research provides the model that investigate the security challenges and vulnerabilities of cloud computing services in wireless networks

Keywords

Cloud Computing, Cyber security, Network Security, Security challenges, Wireless Network

URL

http://paper.ijcsns.org/07_book/202310/20231014.pdf