Data Storage Security in the Cloud Environment Using the Honey Pot System

Author:

Malar Benjula Anbu1,Prabhu J. 1

Affiliation:

1. Vellore Institute of Technology, India

Abstract

Cloud computing is a framework for delivering services through a shared network. It should follow certain procedures or mechanisms to protect and make the cloud data more reliable. In secure cloud computing, the implementation and service delivery model are dealt with. Cloud security could be viewed as a provider and customer responsibility depending on their design and level. There are cases where multiple cloud users can use the same information to create service abnormalities, which is called ‘multitenancy.' In a multi-tenant model, the resources are isolated between different users and it is done by segmentation to achieve the goal of data security between many users. In the user access area, user access to common resources is also limited. The software is aware of the actions of the client and acts accordingly if unauthorized access is detected. The authors propose a clear idea of the data storage security of cloud information through honeypot in cloud monitoring applications and various cloud security scheme key models used and also identifies the audit time and invalid response time.

Publisher

IGI Global

Subject

Computer Networks and Communications,Computer Science Applications

Reference26 articles.

1. An Enhanced Intrusion Detection System Using Honeypot and Captcha Techniques;M. A.Abdullahi;Fudma Journal of Sciences,2019

2. Akhtar, J., Tahzib-Ul-Islam, M., Belali, M. H., & Islam, S. (2019). Big Data Security with Access Control Model and Honeypot in Cloud Computing. International Journal of Computer Applications, 173(88).

3. Reviews on Security Issues and Challenges in Cloud Computing

4. Information security management system challenges within a cloud computing environment

5. Use of honeypots to increase awareness regarding network security.;L.Bhumika;International Journal of Recent Technology and Engineering,2012

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Detection of Cyber-attacks using Deep Convolution in Honeyed Framework;2023 International Conference on Disruptive Technologies (ICDT);2023-05-11

2. Integration of University Digital Resources Based on Cloud Computing and Electronics Systems;Proceedings of Third International Conference on Communication, Computing and Electronics Systems;2022

3. Research on secure storage of network information resources based on data sensitivity;2021 6th International Conference on Smart Grid and Electrical Automation (ICSGEA);2021-05

4. The Geo-Spatial Distribution of Targeted Attacks sources using Honeypot Networks;2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence);2021-01-28

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3