The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Objectives: Cloud computing allows clients to access various IT resources online without much expenditure and investment. Although there are various advantages of cloud computing, but still various security threats exist in the cloud environment, e.g. data security, account hijacking, privacy and users’ authenticity. Methods/Statistical Analysis: In this research paper, an empirical approach has been applied which is based upon the program implementation of the proposed model for data security in the cloud environment. The applied approach shows that the proposed model for data security will prevent the cloud data from the fraudulent activities that can be performed at both ends (i.e. cloud provider and cloud user). Findings/Conclusion: In this research paper, a model for data security has been presented which will protect cloud data from malicious insider attacks as well as fraud cloud user simultaneously. It is concluded that a single combined approach is enough to tackle the fraud at both ends i.e. at cloud user end and at cloud provider end. Implementation for above model is also done under compiler “Turbo C” and results are also shown in the form of screenshot for each case. It is also concluded that the cloud provider will have always a proof that he is not responsible for the corruption of cloud user’s data unless he has cloud user’s decryption key. Application/Improvements: The proposed model is applicable as a remedy for repudiation problems and providing better data security in cloud environment. The implemented program can be enhanced using high bit encryption method to improve and provide more data security to the cloud.

Keywords

Cloud Data, Cloud Security, Data Security, Encryption, Malicious Attacker, Repudiation.
User