Cloudnymous Network and Data Security Model f or Cloud

Journal Title: International Journal of Scientific Research and Management - Year 2017, Vol 5, Issue 1

Abstract

The world is having a tremendous need and hence is moving towards anywhere data and any - time computing. After intensive res earches in the distributed computing arena, combined with the advancement in the internet, cloud computing has emerged as a highly successful concept. But this success is limited to, and to an extent, even threatened by security concerns which not only add s to the vulnerability of the cloud network but also questions the data integrity for the tenants who adopt cloud technology. To address this information security concern, this paper proposes cloudnymous network with IP validation during login and secured data model using Advanced Encryption Standard (AES) algorithm. Information theoretic anomaly detection implemented in this model helps in identification, detection and filtrations of anomalous data in a dataset, using pre - defined conditions and rules that will define the boundaries of correct data. This enhanced architecture improves the effectiveness of cloud usage by gaining the trust of the tenants due to secured network and data

Authors and Affiliations

Roopa. V

Keywords

Related Articles

Application of Theory of Planned Behavior to counterfeit garment brands purchase: a qualitative research

Theory of Planned Behavior has been used in a number of studies to understand the consumer behavior. Almost all such researches have utilized quantitative methods for research. In this resear...

Real - time Misbehavior Detection Approach By Prof Relay Node Formu l ation

Wireless sensor networks (WSNs) often consist of tiny devices and offer a variety of potential means to monitor the environme nt. WSNs are easily moved to several types of attack because of their use in cri...

Resident, Department of Pathology,S.P.Medical college,Bikaner,Rajasthan

In a highly integrated ubiquitous heterogeneous wireless environment, the selection of a network that can fulfill end - users’ service requests while keeping their overall satisfaction at a very high level is vital; a wr...

Versatility o f Bi - Paddle PMMC Flap i n Reconstruction o f Oral Facial Defects

Pectoralis major myocutaneous (PMMC) flap continues to be the workhorse in head and neck reconstruction. Although free tissue transfer has revolutionized the reconstruction in cancers of the oral region. The objective of...

The Relationship between School Cultures and the Principal’s Leadership Style and the Effectiveness of the Principal’s Leadership

eadership which is believed to accelerate the attainment of school objectives is the effective leadership , i.e. the type of leadership which manages to persuade , encourag e, influence , and lead foll...

Download PDF file
  • EP ID EP312344
  • DOI -
  • Views 58
  • Downloads 0

How To Cite

Roopa. V (2017). Cloudnymous Network and Data Security Model f or Cloud. International Journal of Scientific Research and Management, 5(1), -. https://europub.co.uk/articles/-A-312344