ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

ANOMALY DETECTION OVER DISTRIBUTED DATA LOCATIONS

Journal: International Journal of Civil Engineering and Technology (IJCIET) (Vol.8, No. 9)

Publication Date:

Authors : ; ;

Page : 800-806

Keywords : Cloud computing; Contextual Anomaly Detection; Collective Anomaly Detection; Data Security; Cipher X-Ray;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing is the delivery of hosted service over the internet for storing, managing our data rather than a local or personal computer. To handle the security of remote data cipher X-Ray technology has been used, as with most of the techniques uses end-to-end encryption for providing data security. End- to - end Encryption is simple way in where the communicating users only can read the messages. These Encryption techniques have some security issues, if the third parties try to break the encryption, and we are not being able to read their messages. It is necessary to track suspected activities of users. For that the Anomaly Detection can be used to protect the information being misused. With this it's difficult to identify the group of parties that collectively behave anomalously. To overcome this security issue, the Contextual and collective anomaly detection techniques are motivated across the different distributed data locations.

Last modified: 2018-04-16 17:17:27