ISSN 2321-3256 (Electronic Version)  
Journal Contents
Current Issue
Archive Issues
Special Issues
Best Paper Award
IJSRNSC Guidelines
Author Guidelines
Editors Guidelines
Reviewer Guidelines
Research Areas
Process & Policies
Peer-Review Process
Plagiarism Policy
Correction Policy
Ethics and Malpractice
 Digital Certificate
    Regular Issues Certificate
    Special Issue Certificate
    IJSRNSC Template
    Copyright Transfer Form
    Originality Certificate
Full Paper View
Open Access   Article

Attacks on Cloud Data: A Big Security Issue
Poonam Devi1
1 Department of Mathematics, Chaudhary Devi Lal University, Sirsa, Haryana (India).
Section:Review Paper, Product Type: Journal
Vol.6 , Issue.2 , pp.15-18, Apr-2018


Online published on Apr 30, 2018
Copyright © Poonam Devi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at   Google Scholar | DPI Digital Library
  XML View PDF Download  
Citation :
IEEE Style Citation: Poonam Devi , “Attacks on Cloud Data: A Big Security Issue”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.15-18, 2018.

MLA Style Citation: Poonam Devi "Attacks on Cloud Data: A Big Security Issue." International Journal of Scientific Research in Network Security and Communication 6.2 (2018): 15-18.

APA Style Citation: Poonam Devi , (2018). Attacks on Cloud Data: A Big Security Issue. International Journal of Scientific Research in Network Security and Communication, 6(2), 15-18.
1 Views    1 Downloads    1 Downloads
Abstract :
Cloud computing is latest trend in Computing World. Every organization prefers cloud for their services, large amount of personal and professional information stored on cloud. Data theft is major security challenge on cloud because of that a person scared to us cloud for personal and professional information. Cloud Computing use various type of security like Data Security, Storage Security, and Network Security etc. But then after data theft/data hacking activities happening on cloud. If 3rd world war situations will raise then Cloud can be part of that because of these data hacking activities. Existing Technology like Encryption and password techniques are not able to prevent it. By this research paper, we want to introduce a new phase of security that is – D-Phase security with decoy technology to prevent inside data theft and to identify hacker. We can call it D- phase security with Fog computing.
Key-Words / Index Term :
Cloud Computing, Decoy, Fog computing, Security, Data theft, Identification
References :
[3]. M. Arrington, “In our inbox: Hundreds of con- fidential twitter documents,” July 2009. [Online]. Available:
[4]. D. Takahashi, “French hacker who leaked Twitter documents to TechCrunch is busted,” March 2010. [Online]. Available:
[6]. D.C.Saste,P.V.Madhwai,N.B.Lokhande and V.N.Chothe FOG COMPUTING: Comprehensive Approach for Avoiding Data Theft Attack Using Decoy Technology
[8] .Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,” March 2010. [Online]. Available:
User Section

If you do not have an account Click here for registration.
Email Id :   *
Password :   *
New User?   Forgot Password
Authorization Required

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at or view contact page for more details.

 Journal Statistics
UGC J. No. 46614
Citations 070
h-index 004
i10-index 001
IF Valune 2.422
Call for Reviewer
     Home l Terms & Conditions l Privacy Policy l
    © E-ISSN: 2321-3256 Copyright © IJSRNSC
This work is licensed under: CC-BY-NC-ND 4.0