{"title":"Encryption-based Malware Detection for Cloud Computing","authors":"Shylaja N S, B. Pandey","doi":"10.1109/ICERECT56837.2022.10060207","DOIUrl":null,"url":null,"abstract":"In today's scenario Artificial Intelligence (AI), Machine learning, Deep learning, Cloud Computing and the Internet of Things (IoT) are considered to be new methodologies to resolve variations in real-life issues. These methods are significantly used in different industries such as transportation schemes, smart cities, healthcare systems, and agriculture to offer fertile outcomes for lots of problems in today's situation. Cloud computing is an authoritative device to optimize the price in terms of utility, manageability, and hardware for distributing the information, because of the aforementioned features most association convert their services and applications to the cloud. However, some malware ransom ware is difficult to detect without running them. The security information groups endure improving advanced procedures for encryption augmented to cloud facilities. This research focused on malware detection and resolving the security problems in cloud computing by using encryption techniques. The countermeasures for separate susceptibility are based on the investigation outcomes discussed. This comprehensive research supports the researchers in accomplishing a better solution for malware detection on cloud computing)","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICERECT56837.2022.10060207","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In today's scenario Artificial Intelligence (AI), Machine learning, Deep learning, Cloud Computing and the Internet of Things (IoT) are considered to be new methodologies to resolve variations in real-life issues. These methods are significantly used in different industries such as transportation schemes, smart cities, healthcare systems, and agriculture to offer fertile outcomes for lots of problems in today's situation. Cloud computing is an authoritative device to optimize the price in terms of utility, manageability, and hardware for distributing the information, because of the aforementioned features most association convert their services and applications to the cloud. However, some malware ransom ware is difficult to detect without running them. The security information groups endure improving advanced procedures for encryption augmented to cloud facilities. This research focused on malware detection and resolving the security problems in cloud computing by using encryption techniques. The countermeasures for separate susceptibility are based on the investigation outcomes discussed. This comprehensive research supports the researchers in accomplishing a better solution for malware detection on cloud computing)