SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1723
Secure Data Protection in Cloud Computing
Rahul Midha1, Simran Khajuria2, Suman Samal3, Aishwarya Mishra4
1,2,3,4Computer Science Engineering Student, Bharati Vidyapeeth’s College of Engineering, New Delhi
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud computing is way to store data in a “virtual”
cloud. Virtual means something that is not present physically
but still exists. The cloud computing allows a user to store
their data. The amount of data stored incloudisadequate. But
there is an issue which limits the use of cloud computing is
security, so cloud computing precipitatesecuritysolutions. The
simplicity and ease of use made everyone use cloud for data
storage. The cloud service provider (CSP) is responsible for
reliability, security, privacy and availability of data. But the
CSP doesn’t provide the user full security, as once the data is
uploaded in cloud, the CSP have full control over the data but
the user doesn’t. The CSP could perform any activity with the
user’s data. This lack of control over the data leads to greater
security issues. This paper presents secure storage ofdataand
securing it from unauthorized access by giving access to
garbage files. To detect the authenticity of the person,
Honeypot Technology is used. This technology detects and
counter attacks the unauthorized access by generating a
garbage file. Data security is improved by usingcryptographic
algorithm.
Key Words: Honey Pot, Cloud service, encryption,
decryption, security, Cloud computing
1. INTRODUCTION
Cloud Computing has been considered as a next generation
model in computation. Incloudcomputing,bothapplications
and resources are provided on seeing demand over the
internet services. Cloud computing is an area of the
hardware and software resources in the centers of data
where that provide service over the network which are
secure [1]. The meaning of “Cloud Computing is quite well
explained by the National Institute Of Standards And
Technology (NSIT) [2] which is cloud computingmakes one
ubiquitous, convenient, on demand network access to a
shared numberofconfigurablecomputingresourcesthatcan
be supervised and released with less management effort
.The three very well-known and mostly usedservicemodels
in a cloud platform are “ Software As A Service”(SaaS),
“Platform as a Service” (PaaS) and” Infrastructure as a
Service”(IaaS) .In SaaS , software with the related data is
controlled by cloud service provider and users can access it
through the Web Browser. In PaaS, a service provider
provides services to you and users with somesetofsoftware
programs that can resolve the problem statement. In IaaS,
the cloud service provider provides the user with virtual
machine and storage to improve their strategies. We cansay
cloud computing is mostly related to but not exactly sameas
grid computing [3]. The whole scenario of grid computing
has been changed when cloud computing was introduced.
Cloud computing is a blessing for IT application, however
there are still some shortcomings which needs to be solved
for personal users and enterprisers to store data and deploy
application in the cloud computing environment. One of the
most important barrier is to adopt data security which is
accompanied by issues such as privacy, trust and legal
matters [4]. Data Security is one of the most important
ingredients of a system in order to ensure QoS (quality of
service). Most importantly cryptography technique usedfor
the purpose of data security protection cannot be directly
adopted due to the users’ loss control of data under Cloud
Computing. Therefore, verification of correct datastorage in
the cloud must be conducted without explicit knowledge of
the whole data.
From the view of data security, which has always been an
important aspect of quality of service, Cloud Computing
inevitably poses new challenging security threats for
number of reasons.
1.1 EXISTING SYSTEM
The existing systems focus and target at providing integrity
and storing the data but the problem of confidentiality still
exists and still isn’t resolved completely. All these systems
doesn’t ensure the security and are unable to provide
security assurance to users.
Disadvantages of existing systems:
Existing systems are unable to provide complete security
assurance to users.
1.2 PROPOSED SYSTEM
The proposed system aims to provide better security aspect
to the user. The proposed system uses the concept of
Honeypot technology along with cryptographic tools to
provide better security to the saved data. Once the data is
saved over cloud, it could only be accessible by the user
using their personal credentials, if any unintended person
tries to access the data using false credentials it will send a
garbage file using honeypot technology.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1724
Fig. 1 – Implementation Framework
2. LITERATURE SURVEY
The basic aim behind private key cryptography is to provide
end to end authentication to the data of the user. The data is
stored in the form of a hierarchy with the help of secret keys
which have a non-constant size. Inordertoobtaina childkey
from a parent key, hash functions are used for this purpose.
All the confidential information is stored in the hierarchy
locally on the system, withspacecomplexity beingoptimal in
nature. All the file updates are stored and handled on the
system locally. The encryption scheme used can be used for
transmitting any numberof keys[5].Thisencryptionscheme
provides partial access rights to the user, along with the
functionality of traversing the records stored in the system.
Different cryptographic primitives stores protocols and
settings with unique properties. In order to encrypt a
particular file, the associated secret keys are used, which
may or may not be suitable for manyapplications.Thepublic
key of the data is used as the identity string for uniquely
identifying a user over a system. A private key generator is
used to build a master key, which then issues a secret key to
the intended user for data access. The data can be decrypted
by the user by making use of this secret key. This method is
known as Identity Based Encryption [6].
Another method that can be used is Attribute Based
Encryption [7]. In this method, each attribute of a file is
associated with a cipher text. The master key is used to
extract the secret key for these attributes inordertoprovide
access to them, if it adheres to the prescribed policies.
But, the drawback with attribute based encryptionisthatthe
secret keys consume a lot of space, as it has multiple
attributes associated with it, thus leading to a large access
time, slowing down the overall performance of the system.
3. RESEARCH METHODOLOGY
Our aim is to provide a secure cloud access to all the users of
a system, where they can store their files in encrypted form.
For this, an encryption/decryption scheme is required in
order to perform this operation. After exploring all the
available approaches, RSA algorithm proved to be a feasible
option for this project. It’s an asymmetric cryptographic
algorithm. This implies that it has 2 different keys,onebeing
the public key, and the other is a private one. The role of
public key is to encrypt the files stored on the cloud, and its
access is provided to everyone. The files encryptedbypublic
key, and stored on the cloud, can only be decrypted by
making use of private key.
Also, in order to ensure security of data, the concept of
honey pot is also implemented on this project.Honeypotisa
concept that’s used to handle unauthorized access to files in
a system, by detecting and counteracting the attempts of a
system breach. In honey pot, the unauthorized users are
presented with an illusion of data present at a location,
which isn’t the actual data of the user. The actual data is
stored in encrypted form, in an isolated file system, which
can only be accessed by authorized users of the data.
Honeypot can be classified into 2 categories broadly –
1) Production Honeypot
2) Research Honeypot
Production honeypot is used at a small scale, which can
gather a very limited amount of information. It’s used by
small enterprise firms, and is easy to deploy privately in the
production network. The amount of information given by
production honeypot is inadequate, and doesn’t contain all
the necessary details of the attack.
Research honeypot is a large scale version of production
honeypot, and is used to gather information about the
hackers that are planning to exploit a network by intruding
in it. Research honeypot is also used to learn about what are
the possible threats to a system, by different hackers, and
how can it be avoided by safeguarding the system against
those attacks. Research honeypotisdifficulttodeploy,dueto
its complex nature, as it’s designedtocapturea largeamount
of information. Also, the modelling approach used in this
project is “RUP (Rational Unified Process)” modelling. RUP
provides a full lifecycle approach covering a series of
product lifecycle phases called inception, elaboration,
construction, and transition.
It’s incremental in nature; each iteration builds on the
functionality of the prior iteration; the software application
evolves in this fashion with the benefit of regular and
continues feedback. RUP consists of four phases which can
be altered to suit the needs. As iteration is a key feature of
the model, it’s very useful for the developmentofa project as
developer requires a repetitive check of the key features.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1725
Fig. 2 – RUP Modelling
4. IMPLEMENTATION
In this model, a local machine server or local host is used to
depict the working of a cloud. It provides user with the
resources to store data and act in accordance with the
hardware and software specifications of the cloud. Our
machine acts as a server. We stored files and application on
the server and it fulfilled the entire user’s requirements like
fast and remote processing, proper resource allocation etc.
and is therefore appropriate for demonstration.
We in this paper propose various methods for data security
in cloud. Since security in a cloud environment is at stake
and the traditional cryptographic methods don’t work,
therefore we had to implement an efficient cryptosystem to
deal with this issue. We tried encrypting with block cipher
methods, stream cipher methods, and erasure code but
finally used a type of public-key cryptosystem called RSA
which is a simple but robust encryption technique [8]. The
user stored his file on our machine. The file was encrypted
using a public key and stored on the local host, such that a
private key was generated and given to the user for
decryption. This implies that the message could be
encrypted by anyone but decrypted only by the authentic
user (this gives it a first degree of security).
To further improve the security wehaveusedtheconcepton
honeypot here. Honeypot is a technique used in computer
security to detect and deter malicious attempts at data
breaching and unauthorized access of data. The main files
and applications were emulated and kept at a separate
location and resembled the original programs or
applications [9]. The honeypot had all the relevant
information needed by the hacker and as the hacker would
try to access the honeypot, his activities would be recorded
and he would be presented with cipher text which would
make no sense to him. Thus, we isolatedtheoriginal filefrom
the cipher file of honeypot.
Another important aspect we present in this paper is
dynamically updating the data in the cloud model while
maintain data integrity and security [10]. While updating
information: append, delete or modify the data is vulnerable
as the user interacts with the server and some intermediate
host could perform the act of sniffing and breach the
security. We in this model have used homomorphic
tokenization to operate on the sensitive data such that we
are able to operate on the encrypted data itself [11].
Finally bypassing all the malicious acts the integrity of file
was maintained and the user was finally able to decrypt and
access his file using the private key that was allotted to him.
5. RESULT
The proposed system encrypts the data using RSA and
uploads it to the cloud securely. The system verifiesthekeys
if the keys matches, it decrypts the data and provides access
to the user whenever prompted. If the entered key doesn’t
matches it sends a garbage file using honeypot technology.
6. CONCLUSION AND FUTURE SCOPE
When a user stores its data in cloud, its always a matter of
concern if the CSP is providing proper security and privacy
to the user, and if the data is not mishandled and misused.
Security and privacy are always the main concern of cloud
computing. In the proposed system a secure mechanism is
provided to store data securely over cloud. This system
provides integrity, authenticity and confidentiality to the
data stored in cloud. Authentication is achieved by giving
access of the stored data only to registered client. Only
registered client could upload and download files on the
cloud. The system is intended to secure data using the
combination of RSA and honeypot technology. This ensures
that no leakage of data is possible. The data is always
encrypted first and then uploaded, the keysarematchedand
then only it gives the access.
Further, this model could be improvised with better
upcoming technologies to ensure the data security.
REFERENCES
[1] N. Lavitt , “Is the cloud computing reallyreadyfor prime
time?” computer vol. 42, no. 1, pp. 15 -25, 2009.
[2] P.Mell and T.Grance “the nist definition of cloud
computing”, National Institute Of Standards And
Technology, vol.53, no. 6, article 50 , 2009.
[3] F.B er man , G.Fox and A.J.G. Hey, Grid Computing :
Making the Global Infrastructure a Reality, Volume 2, Jhon
Wiley and Sons , 2003.
[4] M.A. Shah , R. Swaminath and M. Baker, “Privacy
preserving audit and extraction of digital content,” IACR
Cryptology EPrint archive, volume 186, 2008
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1726
[5] M. J. Atallah et.al, “Dynamic and Efficient Key
Management for Access Hierarchies,” ACM Transactions on
Information and System Security (TISSEC), vol. 12, no. 3,
2015.
[6] J. Benaloh et.al, “Patient Controlled Encryption:Ensuring
Privacy of Electronic Medical Records,” in Proceedings of
ACM Workshop on Cloud Computing Security (CCSW ’09).
ACM, 2014, pp. 103–114.
[7] M. Chase and S. S. M. Chow, “Improving Privacy and
Security in Multi-Authority Attribute-Based Encryption,” in
ACM ConferenceonComputerandCommunicationsSecurity,
2017, pp. 121–130.
[8] Smart, Nigel (February 19, 2008). "Dr Clifford Cocks
CB". Bristol University. Retrieved August 14, 2011.
[9] Cole, Eric; Northcutt, Stephen. "Honeypots: A Security
Manager's Guide to Honeypots"
[10] B. Anjani Kumar, K. Hari Prasad, C. Subhash Chandra ,
”Homomorphic Token and Distributed Erasure-Code for
cloud”, International Journal of Research in Computer and
Communication Technology, Vol 2, Issue 10, October-2013
[11] Gentry, Craig. "Fully Homomorphic Encryption using
Ideal Lattices". ACM Symposium on Theory of Computing,
STOC 2009. pp. 169–178.

More Related Content

What's hot

IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET Journal
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecurityYogeshIJTSRD
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudIRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET Journal
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through TokenIRJET Journal
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerIRJET Journal
 
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET Journal
 

What's hot (20)

IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in CloudIRJET- Security Enhancement for Sharing Data within Group Members in Cloud
IRJET- Security Enhancement for Sharing Data within Group Members in Cloud
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
50120140502015
5012014050201550120140502015
50120140502015
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
 
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security Mechanism
 

Similar to Secure Data Protection in Cloud Computing Using Honeypot Technology

IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyIRJET Journal
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 

Similar to Secure Data Protection in Cloud Computing Using Honeypot Technology (20)

IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
publishable paper
publishable paperpublishable paper
publishable paper
 
1784 1788
1784 17881784 1788
1784 1788
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 

Secure Data Protection in Cloud Computing Using Honeypot Technology

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1723 Secure Data Protection in Cloud Computing Rahul Midha1, Simran Khajuria2, Suman Samal3, Aishwarya Mishra4 1,2,3,4Computer Science Engineering Student, Bharati Vidyapeeth’s College of Engineering, New Delhi ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing is way to store data in a “virtual” cloud. Virtual means something that is not present physically but still exists. The cloud computing allows a user to store their data. The amount of data stored incloudisadequate. But there is an issue which limits the use of cloud computing is security, so cloud computing precipitatesecuritysolutions. The simplicity and ease of use made everyone use cloud for data storage. The cloud service provider (CSP) is responsible for reliability, security, privacy and availability of data. But the CSP doesn’t provide the user full security, as once the data is uploaded in cloud, the CSP have full control over the data but the user doesn’t. The CSP could perform any activity with the user’s data. This lack of control over the data leads to greater security issues. This paper presents secure storage ofdataand securing it from unauthorized access by giving access to garbage files. To detect the authenticity of the person, Honeypot Technology is used. This technology detects and counter attacks the unauthorized access by generating a garbage file. Data security is improved by usingcryptographic algorithm. Key Words: Honey Pot, Cloud service, encryption, decryption, security, Cloud computing 1. INTRODUCTION Cloud Computing has been considered as a next generation model in computation. Incloudcomputing,bothapplications and resources are provided on seeing demand over the internet services. Cloud computing is an area of the hardware and software resources in the centers of data where that provide service over the network which are secure [1]. The meaning of “Cloud Computing is quite well explained by the National Institute Of Standards And Technology (NSIT) [2] which is cloud computingmakes one ubiquitous, convenient, on demand network access to a shared numberofconfigurablecomputingresourcesthatcan be supervised and released with less management effort .The three very well-known and mostly usedservicemodels in a cloud platform are “ Software As A Service”(SaaS), “Platform as a Service” (PaaS) and” Infrastructure as a Service”(IaaS) .In SaaS , software with the related data is controlled by cloud service provider and users can access it through the Web Browser. In PaaS, a service provider provides services to you and users with somesetofsoftware programs that can resolve the problem statement. In IaaS, the cloud service provider provides the user with virtual machine and storage to improve their strategies. We cansay cloud computing is mostly related to but not exactly sameas grid computing [3]. The whole scenario of grid computing has been changed when cloud computing was introduced. Cloud computing is a blessing for IT application, however there are still some shortcomings which needs to be solved for personal users and enterprisers to store data and deploy application in the cloud computing environment. One of the most important barrier is to adopt data security which is accompanied by issues such as privacy, trust and legal matters [4]. Data Security is one of the most important ingredients of a system in order to ensure QoS (quality of service). Most importantly cryptography technique usedfor the purpose of data security protection cannot be directly adopted due to the users’ loss control of data under Cloud Computing. Therefore, verification of correct datastorage in the cloud must be conducted without explicit knowledge of the whole data. From the view of data security, which has always been an important aspect of quality of service, Cloud Computing inevitably poses new challenging security threats for number of reasons. 1.1 EXISTING SYSTEM The existing systems focus and target at providing integrity and storing the data but the problem of confidentiality still exists and still isn’t resolved completely. All these systems doesn’t ensure the security and are unable to provide security assurance to users. Disadvantages of existing systems: Existing systems are unable to provide complete security assurance to users. 1.2 PROPOSED SYSTEM The proposed system aims to provide better security aspect to the user. The proposed system uses the concept of Honeypot technology along with cryptographic tools to provide better security to the saved data. Once the data is saved over cloud, it could only be accessible by the user using their personal credentials, if any unintended person tries to access the data using false credentials it will send a garbage file using honeypot technology.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1724 Fig. 1 – Implementation Framework 2. LITERATURE SURVEY The basic aim behind private key cryptography is to provide end to end authentication to the data of the user. The data is stored in the form of a hierarchy with the help of secret keys which have a non-constant size. Inordertoobtaina childkey from a parent key, hash functions are used for this purpose. All the confidential information is stored in the hierarchy locally on the system, withspacecomplexity beingoptimal in nature. All the file updates are stored and handled on the system locally. The encryption scheme used can be used for transmitting any numberof keys[5].Thisencryptionscheme provides partial access rights to the user, along with the functionality of traversing the records stored in the system. Different cryptographic primitives stores protocols and settings with unique properties. In order to encrypt a particular file, the associated secret keys are used, which may or may not be suitable for manyapplications.Thepublic key of the data is used as the identity string for uniquely identifying a user over a system. A private key generator is used to build a master key, which then issues a secret key to the intended user for data access. The data can be decrypted by the user by making use of this secret key. This method is known as Identity Based Encryption [6]. Another method that can be used is Attribute Based Encryption [7]. In this method, each attribute of a file is associated with a cipher text. The master key is used to extract the secret key for these attributes inordertoprovide access to them, if it adheres to the prescribed policies. But, the drawback with attribute based encryptionisthatthe secret keys consume a lot of space, as it has multiple attributes associated with it, thus leading to a large access time, slowing down the overall performance of the system. 3. RESEARCH METHODOLOGY Our aim is to provide a secure cloud access to all the users of a system, where they can store their files in encrypted form. For this, an encryption/decryption scheme is required in order to perform this operation. After exploring all the available approaches, RSA algorithm proved to be a feasible option for this project. It’s an asymmetric cryptographic algorithm. This implies that it has 2 different keys,onebeing the public key, and the other is a private one. The role of public key is to encrypt the files stored on the cloud, and its access is provided to everyone. The files encryptedbypublic key, and stored on the cloud, can only be decrypted by making use of private key. Also, in order to ensure security of data, the concept of honey pot is also implemented on this project.Honeypotisa concept that’s used to handle unauthorized access to files in a system, by detecting and counteracting the attempts of a system breach. In honey pot, the unauthorized users are presented with an illusion of data present at a location, which isn’t the actual data of the user. The actual data is stored in encrypted form, in an isolated file system, which can only be accessed by authorized users of the data. Honeypot can be classified into 2 categories broadly – 1) Production Honeypot 2) Research Honeypot Production honeypot is used at a small scale, which can gather a very limited amount of information. It’s used by small enterprise firms, and is easy to deploy privately in the production network. The amount of information given by production honeypot is inadequate, and doesn’t contain all the necessary details of the attack. Research honeypot is a large scale version of production honeypot, and is used to gather information about the hackers that are planning to exploit a network by intruding in it. Research honeypot is also used to learn about what are the possible threats to a system, by different hackers, and how can it be avoided by safeguarding the system against those attacks. Research honeypotisdifficulttodeploy,dueto its complex nature, as it’s designedtocapturea largeamount of information. Also, the modelling approach used in this project is “RUP (Rational Unified Process)” modelling. RUP provides a full lifecycle approach covering a series of product lifecycle phases called inception, elaboration, construction, and transition. It’s incremental in nature; each iteration builds on the functionality of the prior iteration; the software application evolves in this fashion with the benefit of regular and continues feedback. RUP consists of four phases which can be altered to suit the needs. As iteration is a key feature of the model, it’s very useful for the developmentofa project as developer requires a repetitive check of the key features.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1725 Fig. 2 – RUP Modelling 4. IMPLEMENTATION In this model, a local machine server or local host is used to depict the working of a cloud. It provides user with the resources to store data and act in accordance with the hardware and software specifications of the cloud. Our machine acts as a server. We stored files and application on the server and it fulfilled the entire user’s requirements like fast and remote processing, proper resource allocation etc. and is therefore appropriate for demonstration. We in this paper propose various methods for data security in cloud. Since security in a cloud environment is at stake and the traditional cryptographic methods don’t work, therefore we had to implement an efficient cryptosystem to deal with this issue. We tried encrypting with block cipher methods, stream cipher methods, and erasure code but finally used a type of public-key cryptosystem called RSA which is a simple but robust encryption technique [8]. The user stored his file on our machine. The file was encrypted using a public key and stored on the local host, such that a private key was generated and given to the user for decryption. This implies that the message could be encrypted by anyone but decrypted only by the authentic user (this gives it a first degree of security). To further improve the security wehaveusedtheconcepton honeypot here. Honeypot is a technique used in computer security to detect and deter malicious attempts at data breaching and unauthorized access of data. The main files and applications were emulated and kept at a separate location and resembled the original programs or applications [9]. The honeypot had all the relevant information needed by the hacker and as the hacker would try to access the honeypot, his activities would be recorded and he would be presented with cipher text which would make no sense to him. Thus, we isolatedtheoriginal filefrom the cipher file of honeypot. Another important aspect we present in this paper is dynamically updating the data in the cloud model while maintain data integrity and security [10]. While updating information: append, delete or modify the data is vulnerable as the user interacts with the server and some intermediate host could perform the act of sniffing and breach the security. We in this model have used homomorphic tokenization to operate on the sensitive data such that we are able to operate on the encrypted data itself [11]. Finally bypassing all the malicious acts the integrity of file was maintained and the user was finally able to decrypt and access his file using the private key that was allotted to him. 5. RESULT The proposed system encrypts the data using RSA and uploads it to the cloud securely. The system verifiesthekeys if the keys matches, it decrypts the data and provides access to the user whenever prompted. If the entered key doesn’t matches it sends a garbage file using honeypot technology. 6. CONCLUSION AND FUTURE SCOPE When a user stores its data in cloud, its always a matter of concern if the CSP is providing proper security and privacy to the user, and if the data is not mishandled and misused. Security and privacy are always the main concern of cloud computing. In the proposed system a secure mechanism is provided to store data securely over cloud. This system provides integrity, authenticity and confidentiality to the data stored in cloud. Authentication is achieved by giving access of the stored data only to registered client. Only registered client could upload and download files on the cloud. The system is intended to secure data using the combination of RSA and honeypot technology. This ensures that no leakage of data is possible. The data is always encrypted first and then uploaded, the keysarematchedand then only it gives the access. Further, this model could be improvised with better upcoming technologies to ensure the data security. REFERENCES [1] N. Lavitt , “Is the cloud computing reallyreadyfor prime time?” computer vol. 42, no. 1, pp. 15 -25, 2009. [2] P.Mell and T.Grance “the nist definition of cloud computing”, National Institute Of Standards And Technology, vol.53, no. 6, article 50 , 2009. [3] F.B er man , G.Fox and A.J.G. Hey, Grid Computing : Making the Global Infrastructure a Reality, Volume 2, Jhon Wiley and Sons , 2003. [4] M.A. Shah , R. Swaminath and M. Baker, “Privacy preserving audit and extraction of digital content,” IACR Cryptology EPrint archive, volume 186, 2008
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1726 [5] M. J. Atallah et.al, “Dynamic and Efficient Key Management for Access Hierarchies,” ACM Transactions on Information and System Security (TISSEC), vol. 12, no. 3, 2015. [6] J. Benaloh et.al, “Patient Controlled Encryption:Ensuring Privacy of Electronic Medical Records,” in Proceedings of ACM Workshop on Cloud Computing Security (CCSW ’09). ACM, 2014, pp. 103–114. [7] M. Chase and S. S. M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” in ACM ConferenceonComputerandCommunicationsSecurity, 2017, pp. 121–130. [8] Smart, Nigel (February 19, 2008). "Dr Clifford Cocks CB". Bristol University. Retrieved August 14, 2011. [9] Cole, Eric; Northcutt, Stephen. "Honeypots: A Security Manager's Guide to Honeypots" [10] B. Anjani Kumar, K. Hari Prasad, C. Subhash Chandra , ”Homomorphic Token and Distributed Erasure-Code for cloud”, International Journal of Research in Computer and Communication Technology, Vol 2, Issue 10, October-2013 [11] Gentry, Craig. "Fully Homomorphic Encryption using Ideal Lattices". ACM Symposium on Theory of Computing, STOC 2009. pp. 169–178.