Cloud Security Mechanism : Prevent Access with Location
Keywords:
Cloud Security, Honeypot, Tonido, Security, Location Tracing.Abstract
Cloud Services are efficiently used in large organizations and educational sector. Security is major concern whenever anyone is using cloud services and operating system. Cloud Security is highly vulnerable to threats, which results in Data loss. The purpose of this research is to develop Cloud security model. In this paper, we have developed cloud security mechanism with location tracing. We have also analyzed various security mechanisms available and trying to develop a model, which will be least costly and affordable to small organization.
References
- Mall, S., & Saroj, S. K. (2018). A new security framework for cloud data. Procedia Computer Science, 143, 765–775. https: //doi.org/10.1016/j.procs.2018.10.397
- Chawki, E. B., Ahmed, A., & Zakariae, T. (2018). IaaS Cloud Model Security Issues on Behalf Cloud Provider and User Security Behaviors. Procedia Computer Science, 134, 328–333. https://doi.org/10.1016/j.procs.2018.07.180
- Chiba, Z., Abghour, N., Moussaid, K., El Omri, A., & Rida, M. (2016). A Cooperative and Hybrid Network Intrusion Detection Framework in Cloud Computing Based on Snort and Optimized Back Propagation Neural Network. Procedia Computer Science, 83, 1200–1206. https://doi.org/10.1016/j.procs.2016.04.249
- Ghosh, P., Saha, A., & Phadikar, S. (2016). Penalty- Reward Based Instance Selection Method in Cloud Environment Using the Concept of Nearest Neighbor. Procedia Computer Science, 89, 82–89. https://doi.org/10.1016/j.procs.2016.06.012
- Hussain, S. A., Fatima, M., Saeed, A., Raza, I., & Shahzad, R. K. (2017). Multilevel classification of security concerns in cloud computing. Applied Computing and Informatics, 13(1), 57–65. https://doi.org/10.1016/j.aci.2016.03.001
- Idhammad, M., Afdel, K., & Belouch, M. (2018). Distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Computer Science, 127, 35–41. https://doi.org/10.1016/j.procs.2018.01.095
- Kamil, S. N. S., & Thomas, N. (2018). Investigating the Cost of Transfer Delay on the Performance of Security in Cloud Computing. Electronic Notes in Theoretical Computer Science, 337, 105–117. https://doi.org/10.1016/j.entcs.2018.03.036
- Khan, N., & Al-Yasiri, A. (2016). Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework. Procedia Computer Science, 94, 485–490. https://doi.org/10.1016/j.procs.2016.08.075
- Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring Data Security Issues and Solutions in Cloud
- Computing. Procedia Computer Science, 125(2009), 691–697. https://doi.org/10.1016/j.procs.2017.12.089
- Majhi, S. K., & Dhal, S. K. (2016). Placement of Security Devices in Cloud Data Centre Network: Analysis and Implementation. Physics Procedia, 78(December 2015), 33–39. https://doi.org/10.1016/j.procs.2016.02.007
- Mall, S., & Saroj, S. K. (2018). A new security framework for cloud data. Procedia Computer Science, 143, 765–775. https://doi.org/10.1016/j.procs.2018.10.397
- Manogaran, G., Thota, C., & Kumar, M. V. (2016). MetaCloudDataStorage Architecture for Big Data Security in Cloud Computing. Procedia Computer Science, 87, 128–133. https://doi.org/10.1016/j.procs.2016.05.138
- Marwan, M., Kartit, A., & Ouahmane, H. (2018). Security enhancement in healthcare cloud using machine learning. Procedia Computer Science, 127, 388–397. https://doi.org/10.1016/j.procs.2018.01.136
- Mazini, M., Shirazi, B., & Mahdavi, I. (2018). Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms. Journal of King Saud University Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2018.03.011
- Prasad, V. K., Shah, M., Patel, N., & Bhavsar, M. (2018). Inspection of Trust Based Cloud Using Security and Capacity Management at an IaaS Level. Procedia Computer Science, 132(Iccids), 1280–1289. https://doi.org/10.1016/j.procs.2018.05.044
- Saadi, C., & Chaoui, H. (2016). Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb. Procedia Computer Science, 85(Cms), 433–442. https://doi.org/10.1016/j.procs.2016.05.189
- Saadi, C., & Chaoui, H. (2016). Cloud Computing Security Using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb. Procedia Computer Science, 85(Cms), 433–442. https://doi.org/10.1016/j.procs.2016.05.189
- Saeed, A., Ahmadinia, A., Javed, A., & Larijani, H. (2016). Random neural network based intelligent intrusion detection for wireless sensor networks. Procedia Computer Science, 80, 2372–2376. https://doi.org/10.1016/j.procs.2016.05.453
- Sahmim, S., & Gharsellaoui, H. (2017). Privacy and Security in Internet-based Computing: Cloud Computing, Internet of Things, Cloud of Things: A review. Procedia Computer Science, 112, 1516–1522. https://doi.org/10.1016/j.procs.2017.08.050
- Sharma, D. H., Dhote, C. A., & Potey, M. M. (2016). Identity and Access Management as Security- as-a-Service from Clouds. Procedia Computer Science, 79, 170–174. https://doi.org/10.1016/j.procs.2016.03.117
- Wang, R. (2017). Research on Data Security Technology Based on Cloud Storage. Procedia Engineering, 174, 1340–1355. https://doi.org/10.1016/j.proeng.2017.01.286
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.