📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 6, ISSUE 6, JUNE 2017

Efficient Cloud Security Method for Preventing Insider Attacks in Cloud Computing Platforms

Bhushan Rathod, Prashant Yelmar

DOI: 10.17148/IJARCCE.2017.66101

Abstract: Different types of organizations based on requirements commonly and widely used cloud-computing frameworks. Many companies are sharing very important data on daily basis over the different cloud server. Hence it is required to have efficient data confidentiality and security method to protect against different security threats like insider attacks. The recent works proposed on cloud computing security has mainly worked either on cloud computing platform protection from malicious users or cloud client�s protection from each other�s unwanted activities. However, the issues of cloud client�s protection from the other malicious cloud client�s attacks (this attack is called insider attacks are still remaining research problem. In this project, a novel approach is presenting in order to ensure the client data confidentiality and integrity during computation over the cloud platform. The goal of proposed approach is to ensure that cloud user private data not be exposed to other internal cloud users like other cloud clients and administrator. The proposed designed method makes use of remote attestation and late launch based method called Flicker in order to verify the integrity of the cloud platform. This is a practical approach designing for securing the confidentiality and integrity of client data and computation from cloud clients and from the Infrastructure-as-a-Service (IaaS) based cloud system administrator himself. For data security, we are using newly designed hybrid cryptography method to deliver the best efficiency performance.



Keywords: Cloud Computing, Cloud Security, Security threats, Risk analysis, Data Protection, Privacy.

How to Cite:

[1] Bhushan Rathod, Prashant Yelmar, “Efficient Cloud Security Method for Preventing Insider Attacks in Cloud Computing Platforms,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2017.66101