SURVEY AND ANALYSIS ON DATA SECURITY ISSUES FOR USERS EXERCISING CLOUD

Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 4, Issue 6

Abstract

Iaas provides access to computing resource over virtualized environment, “the Cloud”, across a public connection, usually the internet. Computing resources means the virtual server space, network connections, bandwidth, IP addresses and load balancers. Large scale services which make use of these IaaS will assert the impulse of this model. Many organizations that hold on sensitive data eschew making use of this Iaas platform, due to much security concern. In this paper a scheme of data and security for performing operations over those data were described, IaaS endures protocols for ingrained launch of virtual machine and as well protection for storage, that’s based on domain. An encompassing theoretical analysis along with the proof about the protocol resistance on subject to attacks performed over the concrete threat model is performed. Beforehand to introducing tenant virtual machine, the host platform configurations were attested remotely by the protocols and ensure the seclusion for the data stored in the third party cloud by making use of the key that is encrypted. This key is maintained outside the IaaS domain. The experimental result portrays the protocols validity and how efficiently it could be used and integrated into the existing third party cloud environment throughout the process.

Authors and Affiliations

Nagaraja Prabu R, Christina Magneta S

Keywords

Related Articles

RESOURCE PROCUREMENT MECHANISM SCHEME FOR CLOUD COMPUTING

The cloud resource the limitations auctions, dynamic pricing

Event Driven Plasticity Model for Analyzing Activities through Eye Blink and Classical Conditions

Human proficiency in dealing with alternative dynamic circumstances and accomplishment of uninterrupted different tasks in usually non-stationary atmospheres has got the neuroscientists’ attention to realize the mechanis...

STATE OF THE ART: TASK SCHEDULING ALGORITHMS IN A HETEROGENEOUS GRID COMPUTING ENVIRONMENT

Grid Computing is the distributed form of parallel computing which is used to solve large scale and complicated Problems. Grid Task scheduling is a NP complete problem. It is used to schedule a task on an appropriate gri...

AN EFFICIENT WI-FI INTERNET ACCESS FOR MOVING VEHICLES USING SWIMMING SCHEME

Accessing internet from moving vehicles is demanding and has been rapidly growing. Due to mobile detonation, the overloading issue of cellular networks is increasing. So, the Wi-Fi based accessing is co...

Detecting intruders in the network using machine learning classifier

Rapid development in technology has raised the need for an effective intrusion detection system as the traditional intrusion detection method cannot compete against newly advanced intrusions. In the proposed work uses ma...

Download PDF file
  • EP ID EP369982
  • DOI -
  • Views 88
  • Downloads 0

How To Cite

Nagaraja Prabu R, Christina Magneta S (2016). SURVEY AND ANALYSIS ON DATA SECURITY ISSUES FOR USERS EXERCISING CLOUD. Elysium Journal of Engineering Research and Management, 4(6), -. https://europub.co.uk/articles/-A-369982