Showing posts with label Cloud data security. Show all posts
Showing posts with label Cloud data security. Show all posts

Wednesday 23 July 2014

#IJSRD Cloud data Protection

#IJSRD E-JOunral

Protection of the privacy of the cloud Data through Multiple clouds

===============================================================
The main goal of the “Protection of the privacy of the cloud data through multiple clouds” is to identify and understand the risks associated with the cloud data and propose a distributed architecture to eliminate the risks. In particular, in current cloud architecture a client entrusts a single cloud provider with his data. It gives the provider and outside attackers having unauthorized access to cloud, an opportunity of analyzing client data over a long period to extract sensitive information that causes privacy violation of clients. Hence to overcome this we propose a distributed architecture. The distributed approach to the cloud eliminates the disadvantage of storing all data of a client to the same provider. In this approach the data sent by the client is split into different number of chunks and is distributed among multiple cloud providers. Our system consists of two major components: Cloud data distributor and Cloud providers. The Cloud Data Distributor receives the data in the form of files from many clients, splits each of the files into much number of chunks and distributes these chunks among appropriate cloud providers. Another major component which is Cloud Providers, store these chunks and responds to the chunk requests by providing the chunks.


For More Details 
Click on below Links :


Main Site :

Friday 18 July 2014

IJSRD Research Paper For Security Privacy in system

Research Paper On :

PRIVACY PRESERVING AGAINST NETWORK INTRUSION DETECTION IN VIRTUAL NETWORK SYSTEM

---------------------------------------------------------------------------------
Authors :
SHRUTHI S , RNS INSTITUTE OF TECHNOLOGY

Description :
Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service(DDoS). DDoS attacks usually involve early stage actions such as multi-step exploitation, low frequency vulnerability scanning, and compromising identified vulnerable virtual machines as zombies, and finally DDoS attacks through the compromised zombies. Within the cloud system, especially the Infrastructure-as-a-Service (IaaS) clouds, the detection of zombie exploration attacks is extremely difficult. This is because cloud users may install vulnerable applications on their virtual machines. To prevent vulnerable virtual machines from being compromised in the cloud, we propose a multi-phase distributed vulnerability detection, measurement, and countermeasure selection mechanism called NICE, which is built on attack graph based analytical models and reconfigurable virtual network-based countermeasures.

For more Details About Above Blog
you can Visit on Below Links :