ANOMALY DETECTION OVER DISTRIBUTED DATA LOCATIONS
Journal: International Journal of Civil Engineering and Technology (IJCIET) (Vol.8, No. 9)Publication Date: 2017-09-22
Authors : K. VIJAYALAKSHMI S. ALEX DAVID; G. NIVEDHITHA;
Page : 800-806
Keywords : Cloud computing; Contextual Anomaly Detection; Collective Anomaly Detection; Data Security; Cipher X-Ray;
Abstract
Cloud computing is the delivery of hosted service over the internet for storing, managing our data rather than a local or personal computer. To handle the security of remote data cipher X-Ray technology has been used, as with most of the techniques uses end-to-end encryption for providing data security. End- to - end Encryption is simple way in where the communicating users only can read the messages. These Encryption techniques have some security issues, if the third parties try to break the encryption, and we are not being able to read their messages. It is necessary to track suspected activities of users. For that the Anomaly Detection can be used to protect the information being misused. With this it's difficult to identify the group of parties that collectively behave anomalously. To overcome this security issue, the Contextual and collective anomaly detection techniques are motivated across the different distributed data locations.
Other Latest Articles
- USER ENGAGEMENT IN ACADEMIC WEB DIGITAL LIBRARY
- IMPACT OF AGGRESSIVE ENVIRONMENT ON CONCRETE – A REVIEW
- MEASURING MACRO NUTRIENTS OF THE SOIL FOR SMART AGRICULTURE IN COCONUT CULTIVATION
- EFFECT OF PHASE CHANGE MATERIALS FOR THERMAL MANAGEMENT OF BUILDINGS
- CURRENT CHARACTERISTICS IN DEMAK WATERS BASED ON ACOUSTIC MEASUREMENT
Last modified: 2018-04-16 17:17:27