Attacks on Cloud Data: A Big Security Issue

Authors

  • Poonam Devi Department of Mathematics, Chaudhary Devi Lal University, Sirsa, Haryana (India)

Keywords:

Cloud Computing, Decoy, Fog computing

Abstract

Cloud computing is latest trend in Computing World. Every organization prefers cloud for their services, large amount of personal and professional information stored on cloud. Data theft is major security challenge on cloud because of that a person scared to us cloud for personal and professional information. Cloud Computing use various type of security like Data Security, Storage Security, and Network Security etc. But then after data theft/data hacking activities happening on cloud. If 3rd world war situations will raise then Cloud can be part of that because of these data hacking activities. Existing Technology like Encryption and password techniques are not able to prevent it. By this research paper, we want to introduce a new phase of security that is – D-Phase security with decoy technology to prevent inside data theft and to identify hacker. We can call it D- phase security with Fog computing.

 

References

http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6227695

http://docplayer.net/6393704-Defining-the-cloud-battlefield.html

M. Arrington, “In our inbox: Hundreds of con- fidential twitter documents,” July 2009. [Online] Available: http://techcrunch.com/2009/07/14/in-our-inbox-hundreds-ofconfidential-twitter-documents

D. Takahashi, “French hacker who leaked Twitter documents to TechCrunch is busted,” March 2010. [Online] Available: http://venturebeat.com/2010/03/24/french-hacker-wholeaked-twitter-documents-to-techcrunch-is-busted/

http://www.idtheftcenter.org/ITRC-Surveys-Studies/2015databreaches.html

D.C.Saste,P.V.Madhwai,N.B.Lokhande and V.N.Chothe FOG COMPUTING: Comprehensive Approach for Avoiding Data Theft Attack Using Decoy Technology

http://ijsae.in/ijsaeems/index.php/ijsae/article/view/697

Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,” March 2010. [Online] Available: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

Downloads

Published

2018-04-30

How to Cite

[1]
P. Devi, “Attacks on Cloud Data: A Big Security Issue”, Int. J. Sci. Res. Net. Sec. Comm., vol. 6, no. 2, pp. 15–18, Apr. 2018.

Issue

Section

Review Article

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.