International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-10,Issue-8  ( Aug, 2022 )
Past issues
  1. Volume-10,Issue-7  ( Jul, 2022 )
  2. Volume-10,Issue-6  ( Jun, 2022 )
  3. Volume-10,Issue-5  ( May, 2022 )
  4. Volume-10,Issue-4  ( Apr, 2022 )
  5. Volume-10,Issue-3  ( Mar, 2022 )
  6. Volume-10,Issue-2  ( Feb, 2022 )
  7. Volume-10,Issue-1  ( Jan, 2022 )
  8. Volume-9,Issue-12  ( Dec, 2021 )
  9. Volume-9,Issue-11  ( Nov, 2021 )
  10. Volume-9,Issue-10  ( Oct, 2021 )

Statistics report
Dec. 2022
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 116
Paper Published : 1401
No. of Authors : 3560
  Journal Paper


Paper Title :
PRIVARCY PRESERVING ACCESS AUTHENTICATION AND INTRUSION DETECTION TO SECURE DATA IN CLOUD

Author :MANISHA G. VAIDYA, A.V.SAKHARE

Article Citation :MANISHA G. VAIDYA ,A.V.SAKHARE , (2013 ) " PRIVARCY PRESERVING ACCESS AUTHENTICATION AND INTRUSION DETECTION TO SECURE DATA IN CLOUD " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 22-27, Volume-1,Issue-6

Abstract : The trend of using cloud environments is growing for storage and data processing needs. Cloud computing is an Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand. The idea is to construct a new privacy preserving access control scheme for securing data in clouds. The cloud verifies the authenticity of the user but cloud does not know user's identity.User should need to authenticate before storing tha data This is also prevents replay attacks and supports creation, modification, and reading data stored in the cloud. Moreover, authentication and access control scheme is decentralized. this paper introduce the Cloud Intrusion Detection Service (CIDS), which detect the different attack and fire the alert to other cloud user .CIDS used various component to summarize the alerts and inform about the attack fired information to the cloud administrator. CIDS architecture is scalable and elastic. CIDS approached detect the masquerade and host based attack and inform to cloud administrator to take proper action. This approache also able to detect infected file in cloud and suspected user in cloud

Type : Research paper

Published : Volume-1,Issue-6


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-429   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 22
| Published on 2014-01-27
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY