Reveal Deceit Entrance in the Cloud Computing Environment

Authors(2) :-Dr. Firoz Kayum Kajrekar, Dr. C. D. Sonawane

Paper states a strategy for detecting doubtful access to the cloud infrastructure. Collaborative filtering algorithm methods have been implemented to detect such doubtful access. The normal behavior of the user is formed in the shape of a cloud model, and these models is compared with each other by using the cosine similarity method and by applying the collaborative filtering method we try and find the deviations are evaluated as compare the normal usual behavior. If the deviated result is above than the threshold, the user who gained access to the system can be remarked as doubtful.

Authors and Affiliations

Dr. Firoz Kayum Kajrekar
Department CS & IT, SPK, Sawantwadi, Maharashtra, India
Dr. C. D. Sonawane
Department CS & IT, YCC College, Sillod, Maharashtra, India

Cloud Computing; Masquerade Attack; Collaborative Filtering

  1. Cloud Security Alliance (2010) Top Threats to Cloud Computing. https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
  2. Salem, M.B. and Stolfo, S.J. (2011) Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned. Columbia University Computer Science Technical Reports, Columbia University, 8 p.
  3. (2010) 2010 Cybersecurity Watch Survey: Cybercrime Increasing Faster than Some Company Defenses. CERT, 17 p.
  4. Arrington, M. (2009) In Our Inbox: Hundreds of Confidential Twitter Documents. http://techcrunch.com/2009/07/14/in-our-inbox-hundreds-of-confidential-twitter-documents/
  5. Takahashi, D. (2010) French Hacker Who Leaked Twitter Documents to TechCrunch Is Busted. http://venturebeat.com/2010/03/24/french-hacker-who-leaked-twitter-documents-to-techcrunch-is-busted/
  6. Danchev, D. (2009) ZDNET: French Hacker Gains Access to Twitter’s Admin Panel. http://www.zdnet.com/blog/security/french-hacker-gains-access-totwitters-admin-panel/3292
  7. Allen, P. (2010) Obama’s Twitter Password Revealed after French Hacker Arrested for Breaking into U.S. President’s Account. http://www.dailymail.co.uk/news/article-1260488/Barack-Obamas-Twitter-password-revealed-French-hacker-arrested.html
  8. Lane, T. and Brodley, C.E. (1997) Sequence Matching and Learning in Anomaly Detection for Computer Security. Proceedings of the AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, AAAI Press, 43-49.
  9. Alguliev, R.M. and Abdullayeva, F.C. (2013) Identity Management Based Security Arch. of Cloud Computing on Multi-Agent Systems. Proceedings of the Third International Conference on Innovative Computing Technology, London, 29-31 August, 123-126. http://dx.doi.org/10.1109/INTECH.2013.6653643
  10. Eliquliyev, R.M. and Abdullayeva, F.C. (2013) Bulud texnologiyalar?n?n t?hlük?sizlik probleml?rinin t?dqiqi v? ?nformasiya Texnologiyalar? Probleml?ri, 1, 3-14.
  11. Coull, S.E., Branch, J., Szymanski, B. and Breimer, E. (2003) Intrusion Detection: A Bioinformatics Approach. Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, 8-12 December 24-33.
  12. Coull, S.E. and Szymanski, B.K. (2008) Sequence Alignment for Masquerade Detection. Computational Statistics and Data Analysis, 52, 4116-4131. http://dx.doi.org/10.1016/j.csda.2008.01.022
  13. Stolfo, S.J., Salem, M.B. and Keromytis, A.D. (2012) Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. Proceedings of the IEEE Symposium on Security and Privacy Workshops, San Francisco, 125-128.
  14. http://www.schonlau.net/intrusion.html
  15. Greenberg, S. (1988) Using Unix: Collected Traces of 168 Users. Report, University of Calgary.
  16. Lane, T. and Brodley, C.E. (1997) An Application of Machine Learning to Anomaly Detection. Proceedings of the 20th National Information Systems Security Conference, 14 February, 366-380.
  17. Salem, M.B. and Stolfo, S.J. (2011) Modeling User Search Behavior for Masquerade Detection. Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection, 181-200.

Publication Details

Published in : Volume 3 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 984-990
Manuscript Number : CSEIT1831213
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Dr. Firoz Kayum Kajrekar, Dr. C. D. Sonawane, "Reveal Deceit Entrance in the Cloud Computing Environment", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.984-990, January-February-2018.
Journal URL : http://ijsrcseit.com/CSEIT1831213

Article Preview

Follow Us

Contact Us