Research on security architecture for cloud based Voice-Over Internet Protocol by securing infrastructures using hadoop clusters to Prevent Adaptive Anomaly Attacks in Cloud computing
S MP Qubeb1, Ilango Paramasivam2
1S MP Qubeb, School of CSE, Research Scholar Bharatiyar University, (Tamil Nadu), India.
2Dr. Ilango Paramasivam, Professor, Dept. of CSE, PSG Institute of Technology and Applied Research, Coimbatore, India. 

Manuscript received on February 05, 2019. | Revised Manuscript received on February 14, 2019. | Manuscript published on August 30, 2019. | PP: 3707-3711 | Volume-8 Issue-6, August 2019. | Retrieval Number: F9378088619/19©BEIESP | DOI: 10.35940/ijeat.F9378.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Cloud based Voice over Internet protocol (VoIP), is a new type of communication that uses Internet protocol to transfer the data packets which contains the audio data. For the past 20 years there has been an intensive research going on this field since this makes the calling system much cheaper than those taking place over PSTN (Public Switched Telephone Network). VoIP has been mainly taking place through cloud computing and this feature has its own issues but even has its own pros. This feature over cloud is facing many challenges in the terms of quality of services and security. This paper also describes the research or the development taking place in field of secured discussions. The network components and architecture have been discussed; the components described are call processors, gateways and many more. Different attacks possible on the VoIP have been discussed which include spoofing and SPIT. There are different VoIP solutions and they are based on either peer-to-peer (P2P) protocol or Session Initiation Protocol (SIP). In this paper, we have analysed about some of the essential security issues on cloud based VoIP for preventing the adaptive anomaly attacks and some other security issues of cloud computing by applying the algorithmic simulation in hadoop clusters.
Keywords: Voice over Internet protocol (VoIP), Cloud computing, PSTN (Public Switched Telephone Network), Throughput, Security, Adaptive anomaly attacks.