Data security in cloud
Autor: | S. Sharanappa, V. P. Lalitha, M. Y. Sagar, Shredar Hanji, R Swarup |
---|---|
Rok vydání: | 2017 |
Předmět: |
business.industry
Computer science Big data Data security 020206 networking & telecommunications Cloud computing 02 engineering and technology Computer security computer.software_genre Encryption Software Backup 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing The Internet business computer Hacker |
Zdroj: | 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). |
DOI: | 10.1109/icecds.2017.8390134 |
Popis: | Cloud computing is moving increasingly to a destination with no return: the consolidation is an essential tool for the future existence of the internet world. Cloud computing is used as private, hybrid cloud, big data analytics and backup. Today the trend followed is to store the databases and software's in cloud environment. The services are taken whenever required. Without installing software's in systems users can go to cloud where already software is available and make use of it similarly for storing data also. Security is the main aspect now for the confidential data what we store in cloud. The methodology followed is, to collect resource/data, store data in the cloud, data processing by giving access to fetch the resource to user IP, checking hacker's information and admin responding by restricting respective IP. The restricted IP user can never access the resources anymore. Big data security in cloud, results in tracking unauthorized users (hackers) who try to access the resources. Admin have the special privilege to block the hackers machine by disabling IP address of respective machine. In this current work the data is stored in the server in encrypted fashion and only the admin is given the writes to decrypt the data. If an unauthorized user is trying to access any file or data from the cloud the admin can block the users IP address from accessing the data so that the security for data will be given. |
Databáze: | OpenAIRE |
Externí odkaz: |