Identifying Misuse of Data In Cloud

Abstract

Cloud Storage Enables Users To Store Their Data Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance. Proposing a different approach for securing data in the cloud using offensive decoy technology.

Authors and Affiliations

K. S. R. Chaitanya, T. Rajendra Prasad

Keywords

Related Articles

Sprinkling Data Prevents From Intruders

The habitual communication of delay-tolerantnetwork (DTN) model is having partial infrastructural model for prevailing mobile patronsfor instance Bluetooth and Wi-Fi Direct. Mobile ad hoc network is an anthology of mo...

Novel Mechanisms for Secure Data Forwarding In CWSN

Efficient data transmission is one of the generally imperative issues for wireless sensor networks (WSNs). In the intervening time, many WSNs are position in harsh, disused and often adversarial physical environments...

A System To Minimize The Storing And Managing Secret Keys Expense Using Kac In Cloud

Information outsourcing which helps in the arrangement need organization of corporate information. It is likewise utilized as a core innovation at the back of various online services for individual applications. Comm...

LACK OF TRAINING DATA IN SENTIMENT CLASSIFICATION: CURRENT SOLUTIONS

In recent years, sentiment classification has attracted much attention from natural language processing researchers. Most of researchers in this field consider sentiment classification as a supervised classification p...

http://www.ijrcct.org/index.php/ojs/article/download/1245/pdf

It is pleasing to offer differentiated access services such thatdata access policies are distinct over user attributes or roles,which are direct by the key authorities. We propose a securedata recovery scheme using C...

Download PDF file
  • EP ID EP27681
  • DOI -
  • Views 230
  • Downloads 5

How To Cite

K. S. R. Chaitanya, T. Rajendra Prasad (2013). Identifying Misuse of Data In Cloud. International Journal of Research in Computer and Communication Technology, 2(10), -. https://europub.co.uk/articles/-A-27681