Open Access Open Access  Restricted Access Subscription Access

An Approach for Data Security from Malicious Attacker in Cloud Computing


Affiliations
1 Department of Computer Science, Himachal Pradesh University, Shimla, Himachal Pradesh, 171005, India
 

Objectives: Cloud computing allows clients to access various IT resources online without much expenditure and investment. Although there are various advantages of cloud computing, but still various security threats exist in the cloud environment, e.g. data security, account hijacking, privacy and users’ authenticity. Methods/Statistical Analysis: In this research paper, an empirical approach has been applied which is based upon the program implementation of the proposed model for data security in the cloud environment. The applied approach shows that the proposed model for data security will prevent the cloud data from the fraudulent activities that can be performed at both ends (i.e. cloud provider and cloud user). Findings/Conclusion: In this research paper, a model for data security has been presented which will protect cloud data from malicious insider attacks as well as fraud cloud user simultaneously. It is concluded that a single combined approach is enough to tackle the fraud at both ends i.e. at cloud user end and at cloud provider end. Implementation for above model is also done under compiler “Turbo C” and results are also shown in the form of screenshot for each case. It is also concluded that the cloud provider will have always a proof that he is not responsible for the corruption of cloud user’s data unless he has cloud user’s decryption key. Application/Improvements: The proposed model is applicable as a remedy for repudiation problems and providing better data security in cloud environment. The implemented program can be enhanced using high bit encryption method to improve and provide more data security to the cloud.

Keywords

Cloud Data, Cloud Security, Data Security, Encryption, Malicious Attacker, Repudiation.
User

Abstract Views: 213

PDF Views: 0




  • An Approach for Data Security from Malicious Attacker in Cloud Computing

Abstract Views: 213  |  PDF Views: 0

Authors

Satish Kumar
Department of Computer Science, Himachal Pradesh University, Shimla, Himachal Pradesh, 171005, India
Anita Ganpati
Department of Computer Science, Himachal Pradesh University, Shimla, Himachal Pradesh, 171005, India

Abstract


Objectives: Cloud computing allows clients to access various IT resources online without much expenditure and investment. Although there are various advantages of cloud computing, but still various security threats exist in the cloud environment, e.g. data security, account hijacking, privacy and users’ authenticity. Methods/Statistical Analysis: In this research paper, an empirical approach has been applied which is based upon the program implementation of the proposed model for data security in the cloud environment. The applied approach shows that the proposed model for data security will prevent the cloud data from the fraudulent activities that can be performed at both ends (i.e. cloud provider and cloud user). Findings/Conclusion: In this research paper, a model for data security has been presented which will protect cloud data from malicious insider attacks as well as fraud cloud user simultaneously. It is concluded that a single combined approach is enough to tackle the fraud at both ends i.e. at cloud user end and at cloud provider end. Implementation for above model is also done under compiler “Turbo C” and results are also shown in the form of screenshot for each case. It is also concluded that the cloud provider will have always a proof that he is not responsible for the corruption of cloud user’s data unless he has cloud user’s decryption key. Application/Improvements: The proposed model is applicable as a remedy for repudiation problems and providing better data security in cloud environment. The implemented program can be enhanced using high bit encryption method to improve and provide more data security to the cloud.

Keywords


Cloud Data, Cloud Security, Data Security, Encryption, Malicious Attacker, Repudiation.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i32%2F128834