Data Storage Security in the Cloud Environment Using the Honey Pot System

Data Storage Security in the Cloud Environment Using the Honey Pot System

Benjula Anbu Malar, Prabhu J.
Copyright: © 2020 |Pages: 14
DOI: 10.4018/IJeC.2020100101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cloud computing is a framework for delivering services through a shared network. It should follow certain procedures or mechanisms to protect and make the cloud data more reliable. In secure cloud computing, the implementation and service delivery model are dealt with. Cloud security could be viewed as a provider and customer responsibility depending on their design and level. There are cases where multiple cloud users can use the same information to create service abnormalities, which is called ‘multitenancy.' In a multi-tenant model, the resources are isolated between different users and it is done by segmentation to achieve the goal of data security between many users. In the user access area, user access to common resources is also limited. The software is aware of the actions of the client and acts accordingly if unauthorized access is detected. The authors propose a clear idea of the data storage security of cloud information through honeypot in cloud monitoring applications and various cloud security scheme key models used and also identifies the audit time and invalid response time.
Article Preview
Top

Introduction

In this world, cloud computing plays a key role. This changed the way of perspective about business and helped bind the world to an exclusive marketplace. Through introducing the idea of creativity, it revolutionized all technology. Likewise, IoT is another largely cloud-driven area. It simply refers to daily Internet-connected objects that simplify the collection of data. Users from all over the world can use any IoT software for data stored in the cloud (Hepsiba and Sathiaseela, 2016). This made all around us smart and inventive every day. The data used among users often increases, as the environment progresses every day, with greater uncertainty and risk. The stresses of assurance of customer data externalized at these stages must be addressed. It protects the secrecy and accuracy of customer data from web-based insiders and enterprise customers. The data about the attacker is easily collected. Compared to other approaches, honey pot reduces the risk of assault (Puthal et al., 2015). Once a firewall intruder arrives, all the valuable data from the network are collected quickly and nothing can be rescued from them. All software and technologies used, data on the internet protocol, utilities, and related infrastructures are to be protected (Puthal et al., 2015). At least the possibility of cross-contamination between a honeypot and a production system can be minimized to almost negligible by using a cloud platform. The increased flexibility of the deployment sites and cloud would make it a great place for every company to take the first steps into the area of honeypot deployments. It is important to build an infrastructure that can solve these problems with mechanisms for prevention and detection. When every user is privacy and protection, his data in the cloud is sufficiently secure. We can encrypt the email so that only an approved person can access the data instead of sending the exact information directly into the network. Persons who are not authorized are not entitled to access the server data. In order to securely retrieve the information, the authorized user will need to carry out a decryption process to decode encrypted data from the sender of the database. The emphasis behind the protection of data is to ensure security while ensuring individual or any request. The security of a person is again the capacity to isolate and reveal data on him or her and thus in particular. Information protection or data security is the connection between data collection and information dispersal. (Kratzke and Quint, 2017). Every data is encrypted so that the email does not get alerted by two encrypted persons so that it becomes the same. Through applying protection to data storage, access and data management, we will fully protect and avoid malware and knowledge vulnerabilities in cloud information implemented in applications. The public cloud isolates you from any production network. Special hardware or special internet connections are also not needed. Once a machine has been compromised and the data are collected, the system can be replenished using a snapshot. The advantage of using a cloud honeypot implementation is that the desired geographical positions within a cloud system framework can be spread anywhere in the world.

In 1991, the honeypot concept started with the two publications, “The Cuckoos Egg” and “An Evening with Breford.” “The Cuckoos Egg” by Clifford Stoll introduces the concept of honeypot and his experience of capturing a computer hacker that was deeply classified throughout his business. The other book, Bill Chewick’s “An Evening with Breford,” is about a hacker who has trapped him and his colleagues. (Sugumaran et al., 2014). “A honeypot is a store whose interested is threatened or damaged,” says Lance Spitzner, a leading research group member in America named “Project Honeynet”. It means that a honeypot will be checked, assaulted and possibly used. Nothing is set by the honeypots but it gives useful and valuable information.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 7 Issues (2023)
Volume 18: 6 Issues (2022): 3 Released, 3 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing