Procuring the Dropbox Using Honey Encryption Technique

Article Preview

Abstract:

Cloud Computing is the important aspect in Information Technology, which is believed to be suitable for Small business purposes for accessing the resources .Cloud Community portals are used for storing, accessing, synchronizing and for backup the files .The main concern in cloud portal is the security issues in public cloud like Drop box. Drop box are used to access the data whenever needed. In this paper, the attack of Drop box by means of Spam mails is taken into consideration and encryption techniques such as Honey Encryption is used for avoidance of attacks caused by Spam mails such as data stealing, guessing of passwords etc.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

523-528

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] N.S. Sudharsan, Dr.K. Latha, Improving Seeker Satisfaction in Cloud Community Portal: Drop box, in April 3-5, 2013, International Conference on Communication and Signal Processing.

DOI: 10.1109/iccsp.2013.6577067

Google Scholar

[2] S. Subashini, V. Kavitha, A Survey on Security Issues in Service delivery models of Cloud Computing, in Journal of Network and Computer Applications 34(2011)1-11.

DOI: 10.1016/j.jnca.2010.07.006

Google Scholar

[3] Rashmi, Dr, G. Sahoo, Dr.S. Mehfuz, Securing Software as a Service Model of Cloud Computing: Issues and solutions, in International Journal on Cloud Computing, 4th August (2013).

Google Scholar

[4] Mr. P. R Ubhale, Proff. A. M. Sahu, Securing cloud environment by means of Intrusion Detection and Prevention system, in International Journal of Computer Science and Management Research, May 5 (2013).

Google Scholar

[5] Ashish G. Revar, Madhuri D. Bhavsar, "Securing User Authentication using single Sign-On in Cloud Computing, 08-10 December, (2011).

DOI: 10.1109/nuicone.2011.6153227

Google Scholar

[6] Veerraju Gampala, Srilakshmi Inuganti, Satish Muppidi, "Data Security in Cloud Computing with Elliptic Curve Cryptography, July 3, (2012).

Google Scholar

[7] Pratap Chandra Mandal, Department of Computer Application, Evaluation of performance of Symmetric Key algorithms: DES, 3DES, AES and Blowfish, in August 8, (2012).

Google Scholar

[8] Parsi Kalpana, Sudha Singaraju, Data Security in Cloud Computing using RSA Algorithm, at International Journal of Research in Computer and Communication Technology, September 4, (2012).

Google Scholar

[9] Hanqian Wu, Yi Ding, Chuck Winner, Network Security for Virtual Machine in Cloud Computing.

Google Scholar

[10] IdilioDrago, MarcoMellia Maurizio M. Munafo, Inside Drop box: Understanding Personal Cloud Storage Services.

Google Scholar

[11] Junbeom Hur, Imporving Security and Efficency in Attribute Based Data Sharing, in IEEE Transaction on Knowledge and Data Engineering, Vol 25, 10, Oct (2013).

Google Scholar

[12] Xian Wu, Peidi quain, Towards the Scheduling of Access Request in Cloud Storage, in 8th International Conference on Computer Science , April (2013).

Google Scholar

[13] Awada Uchechukwu, Keqiu Li, Improving Cloud Computing energy Efficiency, 2012 IEEE Asia Pacific Cloud Computing congress.

DOI: 10.1109/apcloudcc.2012.6486511

Google Scholar