SURVEY AND ANALYSIS ON DATA SECURITY ISSUES FOR USERS EXERCISING CLOUD
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 4, Issue 6
Abstract
Iaas provides access to computing resource over virtualized environment, “the Cloud”, across a public connection, usually the internet. Computing resources means the virtual server space, network connections, bandwidth, IP addresses and load balancers. Large scale services which make use of these IaaS will assert the impulse of this model. Many organizations that hold on sensitive data eschew making use of this Iaas platform, due to much security concern. In this paper a scheme of data and security for performing operations over those data were described, IaaS endures protocols for ingrained launch of virtual machine and as well protection for storage, that’s based on domain. An encompassing theoretical analysis along with the proof about the protocol resistance on subject to attacks performed over the concrete threat model is performed. Beforehand to introducing tenant virtual machine, the host platform configurations were attested remotely by the protocols and ensure the seclusion for the data stored in the third party cloud by making use of the key that is encrypted. This key is maintained outside the IaaS domain. The experimental result portrays the protocols validity and how efficiently it could be used and integrated into the existing third party cloud environment throughout the process.
Authors and Affiliations
Nagaraja Prabu R, Christina Magneta S
FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE
Efficient monitoring and preventing process requires allocation and policies to network administrator implies network security. The main communication link for individual and organizational convers...
DETECTION AND PREVENTION OF MALICIOUS FEEDBACK RATING IN WEB SERVICE RECOMMENDATION SYSTEMS
To facilitate a recommendation to users for selecting an appropriate or reputed web service from mass of services by avoiding dishonest recommendation. To prevent, avoid and de...
Survey on Data Mining Classification Techniques to Predict Diabetes
This paper surveys on Data mining classification methods on CPCSSN dataset to etect diabetes. Data mining serves as the main application area to derive meaningful information from the humongous data that is accessible ev...
INTERFACING OF LARGE SCALE SPECIMEN TESTING MACHINES IN BIG HOSPITALS TO HMS SOFTWARE USING RS 232
This paper provides an overview of importance of automation in the field of providing specimen test results to doctors in an efficient and real time manner for ensuring effective treatment i...
Monitoring Aggression In Adolescents: Chandra Namaskara As A Panacea
Aggression in adolescence is a key point of focus for psychologists, educationists, parents, and teachers. On the other hand, interdisciplinary researches with special reference to yoga and psychology are growing rapidly...