Open Access   Article Go Back

Implementation of Multiple layer security of Cloud server

Neetu Rani1 , Sandeep Dalal2

  1. DCSA, Maharshi Dayanand university, India.
  2. DCSA, Maharshi Dayanand university, India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-4 , Page no. 236-241, Apr-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i4.236241

Online published on Apr 30, 2018

Copyright © Neetu Rani, Sandeep Dalal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Neetu Rani, Sandeep Dalal, “Implementation of Multiple layer security of Cloud server,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.236-241, 2018.

MLA Style Citation: Neetu Rani, Sandeep Dalal "Implementation of Multiple layer security of Cloud server." International Journal of Computer Sciences and Engineering 6.4 (2018): 236-241.

APA Style Citation: Neetu Rani, Sandeep Dalal, (2018). Implementation of Multiple layer security of Cloud server. International Journal of Computer Sciences and Engineering, 6(4), 236-241.

BibTex Style Citation:
@article{Rani_2018,
author = {Neetu Rani, Sandeep Dalal},
title = {Implementation of Multiple layer security of Cloud server},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2018},
volume = {6},
Issue = {4},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {236-241},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1876},
doi = {https://doi.org/10.26438/ijcse/v6i4.236241}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i4.236241}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1876
TI - Implementation of Multiple layer security of Cloud server
T2 - International Journal of Computer Sciences and Engineering
AU - Neetu Rani, Sandeep Dalal
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 236-241
IS - 4
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
942 334 downloads 228 downloads
  
  
           

Abstract

Cloud computing is allowing business to focus on core businesses in spite of pay additional amount. Cloud environment has been considered as a model that is enabling access to a shared pool of configurable remote resources on demand. In this research the multi layer security for the cloud servers have been provided. It has been found that cloud services are offering flexible & scalable services. But there is always issue of security during information transmission from centrally located server storage to another location. Thus there is need to enhance the security of traditional cloud systems. Here in this paper need of cloud computing has been discussed along with its limitations. Focus of research is to provide security to cloud server, Security issue with existing system, cloud Server Model and programming module to perform encryption decryption and IP verification has been discussed.

Key-Words / Index Term

References

[1]. Peter mill & Tim grance, “The NIST Definition of Cloud Computing”, 2011, National Institute of Standards & Technology ,Gaitherbsburg,MD 20899-8930, NIST Special Publication 800-145.
[2]. Ellen Messmer, “New security demands arising for virtualization, cloud computing”, 2011, security-demands-arising-for-virtualization—cloud computing.html
[3]. .Sumedha Kaushik & Ankur Singhal, “Network Security Using Cryptographic Techniques” 2012, volume 2, Issue 12.
[4]. Charles Miers, Fernando Redigolo & Marcos Simplicio, A quantitative analysis of current security concerns & solutions for cloud computing , 2012, Journal of Cloud Computing: Advances, Systems & Applications electronic version of this article is
[5]. Rabi Prasad Padhay, “An Enterprise Cloud Model for Optimizing IT Infrastructure”, 2012, International Journal of Cloud Computing & Services Science (IJ-CLOSER) Vol.1,
[6]. Nelson Gonzalez, et. al. , “A quantitative analysis of current security concerns & solutions for cloud computing ”, 2012, Journal of Cloud Computing: Advances, Systems & Applications doi:10.1186/2192-113X-1-11The electronic version of this article is complete one & could be found online
[7]. .CSA “Security Guidance for Critical Areas of Focus in Cloud Computing”, (2009), Tech. rep., Cloud Security Alliance..
[8]. Yet-Chun Hu, Ahmed M. Al Naamany, “Attacks within Wireless Networks” International Journal of Engineering Science & Technology (IJEST) ISSN : 0975-5462 Vol. 3 No. 4 April 2006, pp. 268-279
[9]. C. Sanchez-Avila, “analyzed structure & design” International Journal of Engineering Science & Technology Vol. 8 No 2007, , pp. 350–355,
[10]. Soufiene Djahel, “Defending Against Packet Dropping Attack In Vehicular Ad Hoc Networks Security & Communication Networks Security Comm.” Networks 00: 1–13 (2008), pp. 510-520
[11]. Susan, Darshan Lal, “Destruction Security field is a new & fast moving career” International Journal of Advance Research in Computer Science & Management Studies on 2008, , pp. 345–355,
[12]. Michigan dear born, “security & privacy in emerging wireless networks” International Journal of Production Economics, Vol.112, pp. 510-520 (2010)
[13]. Shari Mohammadi, Reza Ibrahim Atani, Hussein Jadidoleslamy (2011) “A Comparison of Link Layer Attacks on Wireless Sensor Networks”, Journal of Information Security, 2011, PP. 448-460,
[14]. Mahendra Kumar Mishra , “A Trustful Routing Protocol for Ad-hoc Network Global Journal of Computer Science & Technology” Volume 11 Issue 8 Version 1.0 might 2011, PP. 520-545
[15]. B.Maheshwari, Assistant Professor, Dept. of Informatics,(2012) “Secure Key Agreement And Authentication Protocols” International Journal of Computer Science & Engineering Survey (IJCSES) Vol.3, No.1, February 2012, PP. 437-444
[16]. Sumedha Kaushik, “Network Security Using Cryptographic Techniques” Journal of Civil Engineering & Management, Vol.17, No.3, pp. 437-444, 2012.
[17]. Wajeb Gharibi & Maha Shaabi (2012) Cyber threats in social networking websites, International Journal of Distributed & Parallel Systems (IJDPS) Vol.3, No.1, January 2012, PP 489-513
[18]. Jason V. Chang,” computer hacking making”, 2012 Journal of Zhejiang University-SCIENCE C (Computers & Electronics), pp. 530-540
[19]. Tongguang Ni, Xiaoqing Gu, Hongyuan Wang, & Yu Li (2013) Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis, Journal of Control Science & Engineering Volume 2013, pp. 2287–3229
[20]. Dr. Mazin Sameer Al-Hakeem, " Development of Fast Reliable Secure File Transfer Protocol ", Journal of Zhejiang University-SCIENCE C (Computers & Electronics), 2013 15(7):pp 489-513
[21]. Hong-Ning Dai, QiuWang, Dong Li, & Raymond Chi-Wing Wong (2013) On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas, International Journal of Distributed Sensor Networks Volume 2013
[22]. P. Narendra Reddy, “Routing Attacks In Mobile Ad Hoc Networks International Journal of Computer Science & Mobile Computing” Vol. 2, Issue. 5, might 2013, PP. 612-625
[23]. Mukesh Barapatre, Prof. Vikrant Chole, Prof. L. Patil (2013) A Review on Spoofing Attack Detection in Wireless Adhoc Network, International Journal of Emerging Trends & Technology in Computer Science, Volume 2, Issue 6, November – December 2013, PP. 877-886
[24]. Sharad Pratap Singh, " security configuration & performance analysis of ftp server", intelligent Computing, Networking, & Informatics Advances in Intelligent Systems & Computing Vol. 243, 2014, pp 45-56
[25]. Sangeeta Yadav (2014) “Hybrid TCP/IP & UDP: A Review Article” International Journal of Advanced Research in Computer Science & Software Engineering, Volume 4, Issue 5, May 2014, PP. 56-68
[26]. Zainab Hassan.: “Performance Analysis of Dynamic Wireless Sensor Networks using Linguistic Fuzzy” Advanced Engineering Informatics, sVol.27, No.1, pp. 108-119, 2014
[27]. Amandeep Kaur, Dr. Amardeep Singh (2014) A Review on Security Attacks in Mobile Ad-hoc Networks, International Journal of Science & Research, Volume 3 Issue 5, May 2014, PP. 112-125