Honey pot based new algorithm for data security

Abstract

Cloud computing an emerging technology provides various services to the users like infrastructure, hardware, software, storage etc. So, it is necessary that cloud computing network should always free from attack. Various strict security checking systems are used for making network bugs free and honey pot is among one of the tool that is used to provide security. Various models are proposed for honey pot to solve the problem of industries and that is used to captures the activities of attackers and maintains a log for providing better security to the cloud network. Here in this paper we proposed an algorithm to resolve some of the issues of network security.

Authors and Affiliations

Apurva Saxena, Dr. Pratima Gautam, Dr. Anubha Dubey

Keywords

Related Articles

Handwriting Identification By Using Neuro Fuzzy Methods Based On Features Extraction

Handwriting recognition system is a system to recognize one's writing through paper. This technology identifies a unique and fixed piece of writing like human handwriting. The character pattern recognition on human handw...

Wireless Sensor Network and Its Security Threats – A Study

A data network is a digital telecommunications network that allows nodes to share resources. Two types of networks are available, wired and wireless networks. Wireless networks become popular because of its wireless setu...

Design Of A Sand Casting Method Using Patterns Made Of Sublime Materials For Casting Intricate Shapes.

In today’s world every product ranging from a safety pin to huge complex aircraft engines are all manufactured by various manufacturing techniques. It involves various processes like casting, forming, machining, welding...

Reduction and Management of Waste in Hotel Industries

The present review article is trying to compile the available information from literature on reduction and management of waste in the hotel industries. As per the available literature, 5 Rs Transition Strategy is good fo...

Interpolation of Stock market Data with Fuzzy Conception Using Weka Tool

Progressing growth of IT has brought rapid technological advancement. Technologies are getting advance at an exponential rate and hence massive amount of data is emerging at very enormous rate in different sector. So the...

Download PDF file
  • EP ID EP431536
  • DOI 10.9790/9622-0812023641.
  • Views 119
  • Downloads 0

How To Cite

Apurva Saxena, Dr. Pratima Gautam, Dr. Anubha Dubey (2018). Honey pot based new algorithm for data security. International Journal of engineering Research and Applications, 8(12), 36-41. https://europub.co.uk/articles/-A-431536