Cloud Security Mechanism : Prevent Access with Location

Authors

  • Prof. Prashant D. Londhe  Department of Computer Science, Gogate-Jogalekar College, Ratnagiri, Maharashtra, India

Keywords:

Cloud Security, Honeypot, Tonido, Security, Location Tracing.

Abstract

Cloud Services are efficiently used in large organizations and educational sector. Security is major concern whenever anyone is using cloud services and operating system. Cloud Security is highly vulnerable to threats, which results in Data loss. The purpose of this research is to develop Cloud security model. In this paper, we have developed cloud security mechanism with location tracing. We have also analyzed various security mechanisms available and trying to develop a model, which will be least costly and affordable to small organization.

References

  1. Mall, S., & Saroj, S. K. (2018). A new security framework for cloud data. Procedia Computer Science, 143, 765–775. https: //doi.org/10.1016/j.procs.2018.10.397
  2. Chawki, E. B., Ahmed, A., & Zakariae, T. (2018). IaaS Cloud Model Security Issues on Behalf Cloud Provider and User Security Behaviors. Procedia Computer Science, 134, 328–333. https://doi.org/10.1016/j.procs.2018.07.180
  3. Chiba, Z., Abghour, N., Moussaid, K., El Omri, A., & Rida, M. (2016). A Cooperative and Hybrid Network Intrusion Detection Framework in Cloud Computing Based on Snort and Optimized Back Propagation Neural Network. Procedia Computer Science, 83, 1200–1206. https://doi.org/10.1016/j.procs.2016.04.249
  4. Ghosh, P., Saha, A., & Phadikar, S. (2016). Penalty- Reward Based Instance Selection Method in Cloud Environment Using the Concept of Nearest Neighbor. Procedia Computer Science, 89, 82–89. https://doi.org/10.1016/j.procs.2016.06.012
  5. Hussain, S. A., Fatima, M., Saeed, A., Raza, I., & Shahzad, R. K. (2017). Multilevel classification of security concerns in cloud computing. Applied Computing and Informatics, 13(1), 57–65. https://doi.org/10.1016/j.aci.2016.03.001
  6. Idhammad, M., Afdel, K., & Belouch, M. (2018). Distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Computer Science, 127, 35–41. https://doi.org/10.1016/j.procs.2018.01.095
  7. Kamil, S. N. S., & Thomas, N. (2018). Investigating the Cost of Transfer Delay on the Performance of Security in Cloud Computing. Electronic Notes in Theoretical Computer Science, 337, 105–117. https://doi.org/10.1016/j.entcs.2018.03.036
  8. Khan, N., & Al-Yasiri, A. (2016). Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework. Procedia Computer Science, 94, 485–490. https://doi.org/10.1016/j.procs.2016.08.075
  9. Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring Data Security Issues and Solutions in Cloud
  10. Computing. Procedia Computer Science, 125(2009), 691–697. https://doi.org/10.1016/j.procs.2017.12.089
  11. Majhi, S. K., & Dhal, S. K. (2016). Placement of Security Devices in Cloud Data Centre Network: Analysis and Implementation. Physics Procedia, 78(December 2015), 33–39. https://doi.org/10.1016/j.procs.2016.02.007
  12. Mall, S., & Saroj, S. K. (2018). A new security framework for cloud data. Procedia Computer Science, 143, 765–775. https://doi.org/10.1016/j.procs.2018.10.397
  13. Manogaran, G., Thota, C., & Kumar, M. V. (2016). MetaCloudDataStorage Architecture for Big Data Security in Cloud Computing. Procedia Computer Science, 87, 128–133. https://doi.org/10.1016/j.procs.2016.05.138
  14. Marwan, M., Kartit, A., & Ouahmane, H. (2018). Security enhancement in healthcare cloud using machine learning. Procedia Computer Science, 127, 388–397. https://doi.org/10.1016/j.procs.2018.01.136
  15. Mazini, M., Shirazi, B., & Mahdavi, I. (2018). Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. Journal of King Saud University Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2018.03.011
  16. Prasad, V. K., Shah, M., Patel, N., & Bhavsar, M. (2018). Inspection of Trust Based Cloud Using Security and Capacity Management at an IaaS Level. Procedia Computer Science, 132(Iccids), 1280–1289. https://doi.org/10.1016/j.procs.2018.05.044
  17. Saadi, C., & Chaoui, H. (2016). Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb. Procedia Computer Science, 85(Cms), 433–442. https://doi.org/10.1016/j.procs.2016.05.189
  18. Saadi, C., & Chaoui, H. (2016). Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb. Procedia Computer Science, 85(Cms), 433–442. https://doi.org/10.1016/j.procs.2016.05.189
  19. Saeed, A., Ahmadinia, A., Javed, A., & Larijani, H. (2016). Random neural network based intelligent intrusion detection for wireless sensor networks. Procedia Computer Science, 80, 2372–2376. https://doi.org/10.1016/j.procs.2016.05.453
  20. Sahmim, S., & Gharsellaoui, H. (2017). Privacy and Security in Internet-based Computing: Cloud Computing, Internet of Things, Cloud of Things: A review. Procedia Computer Science, 112, 1516–1522. https://doi.org/10.1016/j.procs.2017.08.050
  21. Sharma, D. H., Dhote, C. A., & Potey, M. M. (2016). Identity and Access Management as Security- as-a-Service from Clouds. Procedia Computer Science, 79, 170–174. https://doi.org/10.1016/j.procs.2016.03.117
  22. Wang, R. (2017). Research on Data Security Technology Based on Cloud Storage. Procedia Engineering, 174, 1340–1355. https://doi.org/10.1016/j.proeng.2017.01.286

Downloads

Published

2019-10-12

Issue

Section

Research Articles

How to Cite

[1]
Prof. Prashant D. Londhe, " Cloud Security Mechanism : Prevent Access with Location, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 7, pp.100-106, September-October-2019.