Full Paper View Go Back

Attacks on Cloud Data: A Big Security Issue

Poonam Devi1

1 Department of Mathematics, Chaudhary Devi Lal University, Sirsa, Haryana (India).

Section:Review Paper, Product Type: Journal
Vol.6 , Issue.2 , pp.15-18, Apr-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrnsc/v6i2.1518


Online published on Apr 30, 2018


Copyright © Poonam Devi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Poonam Devi , “Attacks on Cloud Data: A Big Security Issue,” International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.15-18, 2018.

MLA Style Citation: Poonam Devi "Attacks on Cloud Data: A Big Security Issue." International Journal of Scientific Research in Network Security and Communication 6.2 (2018): 15-18.

APA Style Citation: Poonam Devi , (2018). Attacks on Cloud Data: A Big Security Issue. International Journal of Scientific Research in Network Security and Communication, 6(2), 15-18.

BibTex Style Citation:
@article{Devi_2018,
author = {Poonam Devi },
title = {Attacks on Cloud Data: A Big Security Issue},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {4 2018},
volume = {6},
Issue = {2},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {15-18},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=320},
doi = {https://doi.org/10.26438/ijcse/v6i2.1518}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i2.1518}
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=320
TI - Attacks on Cloud Data: A Big Security Issue
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Poonam Devi
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 15-18
IS - 2
VL - 6
SN - 2347-2693
ER -

691 Views    525 Downloads    310 Downloads
  
  

Abstract :
Cloud computing is latest trend in Computing World. Every organization prefers cloud for their services, large amount of personal and professional information stored on cloud. Data theft is major security challenge on cloud because of that a person scared to us cloud for personal and professional information. Cloud Computing use various type of security like Data Security, Storage Security, and Network Security etc. But then after data theft/data hacking activities happening on cloud. If 3rd world war situations will raise then Cloud can be part of that because of these data hacking activities. Existing Technology like Encryption and password techniques are not able to prevent it. By this research paper, we want to introduce a new phase of security that is – D-Phase security with decoy technology to prevent inside data theft and to identify hacker. We can call it D- phase security with Fog computing.

Key-Words / Index Term :
Cloud Computing, Decoy, Fog computing, Security, Data theft, Identification

References :
[1]. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6227695
[2]. http://docplayer.net/6393704-Defining-the-cloud-battlefield.html
[3]. M. Arrington, “In our inbox: Hundreds of con- fidential twitter documents,” July 2009. [Online]. Available: http://techcrunch.com/2009/07/14/in-our-inbox-hundreds-ofconfidential-twitter-documents
[4]. D. Takahashi, “French hacker who leaked Twitter documents to TechCrunch is busted,” March 2010. [Online]. Available: http://venturebeat.com/2010/03/24/french-hacker-wholeaked-twitter-documents-to-techcrunch-is-busted/
[5]. http://www.idtheftcenter.org/ITRC-Surveys-Studies/2015databreaches.html
[6]. D.C.Saste,P.V.Madhwai,N.B.Lokhande and V.N.Chothe FOG COMPUTING: Comprehensive Approach for Avoiding Data Theft Attack Using Decoy Technology
[7]. http://ijsae.in/ijsaeems/index.php/ijsae/article/view/697
[8] .Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,” March 2010. [Online]. Available: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation