ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) (Vol.11, No. 11)

Publication Date:

Authors : ;

Page : 761-776

Keywords : Data Security; Cloud Computing; User Registration; User Validation; Data Accessing; Data Storage; Unauthorized Users; Data Restrictions;

Source : Downloadexternal Find it from : Google Scholarexternal


Cloud computing (CC) is a emerging area as the data levels are increasing day by day and the maintenance of the storage and its storage is becoming a complex task. The primary point of CC is to lessen the requirement for clients' interest in new equipment or programming by offering adaptable cloud administrations, with a client receiving the rewards of the compensation per use approach. CC requests tending to numerous security and protection issues: the two issues vulnerabilities, dangers, attacks and arrangements for controlling. Cloud computing has been generally received in a huge assortment of uses. Check and approval of dispersed frameworks has been broadly considered, be that as it may, it has not been examined whether confirmation or authentication approaches in distributed frameworks can be straightforwardly applied to Cloud computing or not. There are chances of obstructing the security of the information because of untrustworthiness of some service providers or because of malicious cloud users. Avoiding malicious users in cloud and providing security to the users sensitive information and giving accessing to only validated users is a challenging task. Along these lines, to verify the information which is re-appropriated and accessed to outsider is an incredible test. The perspective on current security arrangements is basically on confirmation to catch that the information of an individual that can't be drawn closer wrongfully to unauthorized users, however there emerged a protection issue when a client demand for information sharing to different clients through cloud server. The data which is stored in the cloud needs to be validated before giving accessing permissions to the requested users. In the proposed work a strong Two Level Multi User Validation Method (TLMUVM) is introduced for validating the users of the cloud who request the data and then verifying whether only required data is accessible by maintaining security to the data. The proposed method also concentrates on identification of malicious activities in cloud for securing users sensitive information. An efficient Malicious User Detection Mode (MUDM) is introduced which will continuously monitor the validated users using cloud resources for avoiding malicious tasks in the cloud platform. The proposed work is compared with the traditional data security and user validation methods and the results exhibit that the proposed method is performing better in terms of accuracy and confidentiality.

Last modified: 2021-02-22 18:38:50