Reference Hub4
Data Storage Security in the Cloud Environment Using the Honey Pot System

Data Storage Security in the Cloud Environment Using the Honey Pot System

Benjula Anbu Malar, Prabhu J.
Copyright: © 2020 |Volume: 16 |Issue: 4 |Pages: 14
ISSN: 1548-3673|EISSN: 1548-3681|EISBN13: 9781799805182|DOI: 10.4018/IJeC.2020100101
Cite Article Cite Article

MLA

Malar, Benjula Anbu, and Prabhu J. "Data Storage Security in the Cloud Environment Using the Honey Pot System." IJEC vol.16, no.4 2020: pp.1-14. http://doi.org/10.4018/IJeC.2020100101

APA

Malar, B. A. & Prabhu J. (2020). Data Storage Security in the Cloud Environment Using the Honey Pot System. International Journal of e-Collaboration (IJeC), 16(4), 1-14. http://doi.org/10.4018/IJeC.2020100101

Chicago

Malar, Benjula Anbu, and Prabhu J. "Data Storage Security in the Cloud Environment Using the Honey Pot System," International Journal of e-Collaboration (IJeC) 16, no.4: 1-14. http://doi.org/10.4018/IJeC.2020100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cloud computing is a framework for delivering services through a shared network. It should follow certain procedures or mechanisms to protect and make the cloud data more reliable. In secure cloud computing, the implementation and service delivery model are dealt with. Cloud security could be viewed as a provider and customer responsibility depending on their design and level. There are cases where multiple cloud users can use the same information to create service abnormalities, which is called ‘multitenancy.' In a multi-tenant model, the resources are isolated between different users and it is done by segmentation to achieve the goal of data security between many users. In the user access area, user access to common resources is also limited. The software is aware of the actions of the client and acts accordingly if unauthorized access is detected. The authors propose a clear idea of the data storage security of cloud information through honeypot in cloud monitoring applications and various cloud security scheme key models used and also identifies the audit time and invalid response time.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.