Affiliation:
1. Vellore Institute of Technology, India
Abstract
Cloud computing is a framework for delivering services through a shared network. It should follow certain procedures or mechanisms to protect and make the cloud data more reliable. In secure cloud computing, the implementation and service delivery model are dealt with. Cloud security could be viewed as a provider and customer responsibility depending on their design and level. There are cases where multiple cloud users can use the same information to create service abnormalities, which is called ‘multitenancy.' In a multi-tenant model, the resources are isolated between different users and it is done by segmentation to achieve the goal of data security between many users. In the user access area, user access to common resources is also limited. The software is aware of the actions of the client and acts accordingly if unauthorized access is detected. The authors propose a clear idea of the data storage security of cloud information through honeypot in cloud monitoring applications and various cloud security scheme key models used and also identifies the audit time and invalid response time.
Subject
Computer Networks and Communications,Computer Science Applications
Reference26 articles.
1. An Enhanced Intrusion Detection System Using Honeypot and Captcha Techniques;M. A.Abdullahi;Fudma Journal of Sciences,2019
2. Akhtar, J., Tahzib-Ul-Islam, M., Belali, M. H., & Islam, S. (2019). Big Data Security with Access Control Model and Honeypot in Cloud Computing. International Journal of Computer Applications, 173(88).
3. Reviews on Security Issues and Challenges in Cloud Computing
4. Information security management system challenges within a cloud computing environment
5. Use of honeypots to increase awareness regarding network security.;L.Bhumika;International Journal of Recent Technology and Engineering,2012
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Detection of Cyber-attacks using Deep Convolution in Honeyed Framework;2023 International Conference on Disruptive Technologies (ICDT);2023-05-11
2. Integration of University Digital Resources Based on Cloud Computing and Electronics Systems;Proceedings of Third International Conference on Communication, Computing and Electronics Systems;2022
3. Research on secure storage of network information resources based on data sensitivity;2021 6th International Conference on Smart Grid and Electrical Automation (ICSGEA);2021-05
4. The Geo-Spatial Distribution of Targeted Attacks sources using Honeypot Networks;2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence);2021-01-28