{"title":"An intelligent approach for data fortification in cloud computing","authors":"Supriya Mandhare, Rajkumar K. Shende","doi":"10.1109/EIC.2015.7230736","DOIUrl":null,"url":null,"abstract":"Popularity of cloud computing increasing now days. With the increasing use of cloud computing we can share information, resources, and data also we can store our personal as well as business information. Though it provides various advantages like pay-as-you-use, high flexibility, multi tenancy but with the new computing and communication paradigms arises data security challenges. Existing data protection mechanisms failed in preventing data stealing attacks performed by an insider or hacker to the cloud provider. In this work, four layers of security to data have been proposed which will provide highest security to data. Four layers will consist of user authentication, user access rights, encryption of users data and in the last layer hacker cannot access more information than the part which is stored in the cloud because system will automatically differentiates the file breaks and disjointly stores on different locations.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIC.2015.7230736","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Popularity of cloud computing increasing now days. With the increasing use of cloud computing we can share information, resources, and data also we can store our personal as well as business information. Though it provides various advantages like pay-as-you-use, high flexibility, multi tenancy but with the new computing and communication paradigms arises data security challenges. Existing data protection mechanisms failed in preventing data stealing attacks performed by an insider or hacker to the cloud provider. In this work, four layers of security to data have been proposed which will provide highest security to data. Four layers will consist of user authentication, user access rights, encryption of users data and in the last layer hacker cannot access more information than the part which is stored in the cloud because system will automatically differentiates the file breaks and disjointly stores on different locations.