High level browser security in cloud computing services from cross site scripting attacks

M. Malik, Mohit Kumar, Vinay Kumar, A. Gautam, Shikha Verma, Sarvesh Kumar, Dinesh Goyal
{"title":"High level browser security in cloud computing services from cross site scripting attacks","authors":"M. Malik, Mohit Kumar, Vinay Kumar, A. Gautam, Shikha Verma, Sarvesh Kumar, Dinesh Goyal","doi":"10.1080/09720529.2022.2072434","DOIUrl":null,"url":null,"abstract":"Abstract Getting the public cloud is truly hard for associations. Therefore, IT divisions are searching for a cloud-passed on a security plan that gives satisfactory end-customer security. An attacker can send malicious script to web browser in form of JavaScript, Script, Flash or any other type of code. When such type code executes in the browser, cookies redirects it to attacker location. These types of attacks are known as XSS (Cross Site Script) attacks. Cloud security is a discipline of organization wellbeing focused on getting appropriate processing structures. This consolidates securing data private and across the online-based establishments, applications, and stages. Further requests of client with encrypted cookies are sent to web proxy where web proxy decrypts these requests and forward to the web server. Browser information base store the encoded treat which won’t be valuable for the assailant in the event that it takes to utilizing cross-site prearranging assault.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.2000,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/09720529.2022.2072434","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MATHEMATICS, APPLIED","Score":null,"Total":0}
引用次数: 0

Abstract

Abstract Getting the public cloud is truly hard for associations. Therefore, IT divisions are searching for a cloud-passed on a security plan that gives satisfactory end-customer security. An attacker can send malicious script to web browser in form of JavaScript, Script, Flash or any other type of code. When such type code executes in the browser, cookies redirects it to attacker location. These types of attacks are known as XSS (Cross Site Script) attacks. Cloud security is a discipline of organization wellbeing focused on getting appropriate processing structures. This consolidates securing data private and across the online-based establishments, applications, and stages. Further requests of client with encrypted cookies are sent to web proxy where web proxy decrypts these requests and forward to the web server. Browser information base store the encoded treat which won’t be valuable for the assailant in the event that it takes to utilizing cross-site prearranging assault.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
云计算服务中的高级浏览器安全性免受跨站点脚本攻击
摘要获得公共云对于协会来说确实很难。因此,IT部门正在寻找一个通过安全计划的云,以提供令人满意的最终客户安全。攻击者可以通过JavaScript、script、Flash或任何其他类型的代码向web浏览器发送恶意脚本。当此类代码在浏览器中执行时,cookie会将其重定向到攻击者位置。这些类型的攻击被称为XSS(跨站点脚本)攻击。云安全是组织健康的一个学科,专注于获得适当的处理结构。这整合了私有和跨基于在线的机构、应用程序和阶段的数据安全。具有加密cookie的客户端的进一步请求被发送到web代理,web代理在其中解密这些请求并转发到web服务器。浏览器信息库存储编码处理,在利用跨站点预先安排攻击的情况下,该处理对攻击者没有价值。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
3.10
自引率
21.40%
发文量
126
期刊最新文献
A4-graph for the twisted group 3D4 (3) Modern Metrics (MM): Software size estimation using function points for artificial intelligence and data analytics applications and finding the effort modifiers of the functional units using indian software industry Optimized deep learning methodology for intruder behavior detection and classification in cloud I-prime fuzzy submodules Information security based on sub-system keys generator by utilizing polynomials method and logic gate
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1