Full Paper View

Attacks on Cloud Data: A Big Security Issue

Poonam Devi1

1 Department of Mathematics, Chaudhary Devi Lal University, Sirsa, Haryana (India).

Section:Review Paper, Product Type: Journal
Vol.6 , Issue.2 , pp.15-18, Apr-2018

CrossRef-DOI:   https://doi.org/10.26438/ijsrnsc/v6i2.1518

Online published on Apr 30, 2018

Copyright © Poonam Devi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

XML View     PDF Download

Citation :
IEEE Style Citation: Poonam Devi , “Attacks on Cloud Data: A Big Security Issue”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.15-18, 2018.

MLA Style Citation: Poonam Devi "Attacks on Cloud Data: A Big Security Issue." International Journal of Scientific Research in Network Security and Communication 6.2 (2018): 15-18.

APA Style Citation: Poonam Devi , (2018). Attacks on Cloud Data: A Big Security Issue. International Journal of Scientific Research in Network Security and Communication, 6(2), 15-18.

143 Views    77 Downloads    38 Downloads

Abstract :
Cloud computing is latest trend in Computing World. Every organization prefers cloud for their services, large amount of personal and professional information stored on cloud. Data theft is major security challenge on cloud because of that a person scared to us cloud for personal and professional information. Cloud Computing use various type of security like Data Security, Storage Security, and Network Security etc. But then after data theft/data hacking activities happening on cloud. If 3rd world war situations will raise then Cloud can be part of that because of these data hacking activities. Existing Technology like Encryption and password techniques are not able to prevent it. By this research paper, we want to introduce a new phase of security that is – D-Phase security with decoy technology to prevent inside data theft and to identify hacker. We can call it D- phase security with Fog computing.

Key-Words / Index Term :
Cloud Computing, Decoy, Fog computing, Security, Data theft, Identification

References :
[1]. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6227695
[2]. http://docplayer.net/6393704-Defining-the-cloud-battlefield.html
[3]. M. Arrington, “In our inbox: Hundreds of con- fidential twitter documents,” July 2009. [Online]. Available: http://techcrunch.com/2009/07/14/in-our-inbox-hundreds-ofconfidential-twitter-documents
[4]. D. Takahashi, “French hacker who leaked Twitter documents to TechCrunch is busted,” March 2010. [Online]. Available: http://venturebeat.com/2010/03/24/french-hacker-wholeaked-twitter-documents-to-techcrunch-is-busted/
[5]. http://www.idtheftcenter.org/ITRC-Surveys-Studies/2015databreaches.html
[6]. D.C.Saste,P.V.Madhwai,N.B.Lokhande and V.N.Chothe FOG COMPUTING: Comprehensive Approach for Avoiding Data Theft Attack Using Decoy Technology
[7]. http://ijsae.in/ijsaeems/index.php/ijsae/article/view/697
[8] .Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,” March 2010. [Online]. Available: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

Authorization Required


You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  editor@isroset.org or view contact page for more details.

Impact Factor

Journals Contents

Author & Reviewer


Digital Certificate

Go to Navigation