Open Access Open Access  Restricted Access Subscription or Fee Access

A Cloud Based Protection for Social Networks Using Advanced Security Tool

D. Saravanan, R. Aktharunisa Begum


Now-a-days there are lots of security issues in cloud computing based social networks. The main focus on security issues in cloud computing that are associated with Social networks. for  protecting a website there are using advanced security tool of eye scanner.  This system process of capture user eyes verified cloud database of authenticate person or not for example the scanner used for identification purpose of Aathar card. This system is a process of capture a person eyes inner color and layer size to be stored the cloud database.[1][19] In our project is based on this system methodologies process identified the person eye color and layer mismatched verification of cloud database is true or false. When the person login even every time our website in this process executed concurrently,[19] This system is an efficient than the traditional methodologies followed earlier.


Cloud Computing, Big Data, Security Issues, Security, Security Tools, Advanced Security Tool,

Full Text:



Ellen Messmer (2012). Garther: Growth in Cloud Computing to shape 2013 security trends, Network World [online]. Available:

Kalyani Kadam, Rahul Paikrao, Ambika Pawar, “Survey on Cloud Computing Security”, IJETAE, Volume 3, Issue 12, December 2013.

Apurva Shitoot, Sanjay Sahu, Rahul Chawda, “Security Aspects in Cloud Computing”, IJETT, Volume 6 number 3 - Dec 2013.

Kazi Zunnurhain and Susan V. Vrbsky, “Security Attacks and Solutions in Clouds”.

Dr.Nedhal A. Al-Saiyd, Nada Sail, “Data Integrity in Cloud Computing Security”, Journal of Theoretical and Applied Information Technology, 31st December 2013. Vol. 58 No.3

Rushikesh Vilas Belamkar, “Challenges and Security Issues in Cloud Computing”, ISRJ, ISSN 2230-7850, Volume-4, Issue-2, March-2014.

Dinesha H A Agrawal V K, "Multi-level Authentication Technique for Accessing Cloud Services", Computing, Communication and Applications (ICCCA), 2012 International Conference on Feb 2012.

Surabhi Anand, Priya Jain, Nitin and Ravi Rastogi, “Security Analysis and Implementation of 3-Level Security System Using Image Based Authentication” the 14th IEEE International Conference on Modeling and Simulation, Oregon, USA, 2012.

Prof. Sonkar S. K. and Dr. Ghungard S. B.,“Minimum space and huge security in 3D Password Scheme. ”International Journal of Computer Application (0975-8887) Volume-29 No. 4, September 2011.

F. A. Alsulaiman and A. El Saddik, “A novel 3D graphical password schema,” in Proc. IEEE Int. Conf. Virtual Environ., Human-Comput. Interfaces, Meas. Syst., Jul. 2006, pp. 125 – 128.

Kuyoro S. O., Ibikunle F. and Awodele O. ”Cloud Computing Security Issues and Challenges”, International Journal of Computer Networks (IJCN), Volume (3): Issue (5):2011.

F. A. Alsulaiman and A. El Saddik, “A novel 3D graphical password schema,” in Proc. IEEE Int. Conf. Virtual Environ., Human-Comput. Interfaces, Meas. Syst., Jul. 2006, pp. 125 – 128.

Fawaz A Alsulaiman and Abdulmotaleb EI Saddik , ” A Novel 3D Graphical Password Schema “VECIMS 2006-IEEE International Conference on Virtual Environment, Human-Computer Interfaces and Measurement Systems. La-Coruna-Spain 10-12 July 2006.

AkhilBehl, KanikaBehl, ―Security Paradigms for Cloud Computing”, Fourth International Conference on Computational Intelligence, Communication Systems and Networks, IEEE, 2012.

MeikoJensen ,JorgSehwenk et al., ―On Technical Security,Issues in cloud Computing ‖IEEE International conference on cloud Computing, 2009

HuagloryTianfield, ―Security Issues In Cloud Computing‖, International Conference on Systems, Man, and Cybernetics, IEEE, OCT 14-17,2012, [5] Zhang Yandong,

Ni Zhang Di Liu Yun-Yong Zhang, ―Research on cloud computing security‖, International Conference on Information Technology and Applications‖, IEEE, 2013.

Zhang Yandong, Zhang Yongsheng, ―Cloud Computing and Cloud Security Challenges‖, International symposium on information technology in medicine and education, 2012.

Luis Vaquero, Luis Rodero-Merino, Juan Caceres, et al, "A break in the clouds: towards a cloud definition," ACM SIGCOMM Computer Communication Review, vol. 39, pp. 50-55, 2009.

Chippy.T and R.Nagendran, “Defenses against large scale online password guessing attacks by using persuasive click points ”International Journal of Communications and Engineering Volume 03 – No.3, Issue: 01 March 2012.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.