scholarly journals Data Security in Cloud Security Attacks and Preventive Measures

Author(s):  
Monica Gadre
2021 ◽  
Vol 1964 (4) ◽  
pp. 042061
Author(s):  
V Sureshkumar ◽  
B Baranidharan

2016 ◽  
Vol 74 ◽  
pp. 98-120 ◽  
Author(s):  
Salman Iqbal ◽  
Miss Laiha Mat Kiah ◽  
Babak Dhaghighi ◽  
Muzammil Hussain ◽  
Suleman Khan ◽  
...  

2020 ◽  
Vol 10 (24) ◽  
pp. 8925
Author(s):  
Joonsuu Park ◽  
KeeHyun Park

Since a smart dust Internet of Things (IoT) system includes a very large number of devices sometimes deployed in hard-access areas, it is very difficult to prevent security attacks and to alleviate bottleneck phenomena. In this paper, we propose a lightweight blockchain scheme that helps device authentication and data security in a secure smart dust IoT environment. To achieve our goals, (1) we propose the structure of the lightweight blockchain and the algorithm of processing the blockchain. In addition, (2) we reorganize the linear block structure of the conventional blockchain into the binary tree structure in such a way that the proposed blockchain is more efficient in a secure smart dust IoT environment. Experiments show that the proposed binary tree-structured lightweight blockchain scheme can greatly reduce the time required for smart dust device authentication, even taking into account the tree transformation overhead. Compared with the conventional linear-structured blockchain scheme, the proposed binary tree-structured lightweight blockchain scheme achieves performance improvement by up to 40% (10% in average) with respect to the authentication time.


2017 ◽  
Vol 8 (7) ◽  
pp. 1011-1017
Author(s):  
Mr.Ashish Sharma ◽  
Dr.Sanjay Kumar

Cloud computing enables sharing of data over internet, hence the chances of security attacks also increases. So for the security of Data Sharing or Resources Allocation various Trust Models are implemented which provides security from various attacks. One of the efficient and improved Trust Model is implemented which increases the strength of Security in Cloud Computing [1]. Here in this paper various Trust Models their advantages and limitations are analyzed and com pare on the basis of various parameters. This paper deals with the analysis and survey of all the techniques implemented for Cloud Security so that on the basis of various issues a new and efficient Trust Model is implemented in Future.


Cloud Computing is playing the significant role in the existent submissions the humans life. Cloud computing is an extravagant set of conveniently and operative virtualized assets, like as hardware, evolution platforms and utility. Cloud computing is a exclusive generation of the parallel conception. The cloud computing extensibility is a concern of the allotment of revenue on mastery demand. Cloud computing accommodate the operation of uniting. The elevation of the cloud automation also raises the security controversy twice. So, there is a need to solve the security contention in the cloud automation. Reasons for maturity of cloud security for disparate inhabitants and disparate prospect depend upon the exaction. The main trouble correlate with cloud computing is data confidentiality, preservation, data stealing, data breaches etc. In this research work, it is proposed to use a new level of data security solution using Playfair cipher and Ceasar cipher algorithm. Both the algorithms are encrypted by the full set of 256 ASCII characters. A new encryption algorithm for security is implemented in this work. The main aim of this research work is to clarify the security issues in both cloud providers and cloud consumers using cryptography encryption methods.


Sign in / Sign up

Export Citation Format

Share Document