Open Access Open Access  Restricted Access Subscription or Fee Access

Security in Cloud Computing and Social Network

B. Rajdeepa, M. Premavathi

Abstract


A Cloud Computing is the recent trend in IT, where computing and data storage is done in data centers rather than portable Personal Computers. Cloud security is the current discussion in the IT world. In cloud the data is transferred among the server and the client. The cloud moves the application software and database to large data centers, where the management of data and services may not be fully trustworthy. This paper contains the secured data storage and retrieval in cloud using a Triple DES algorithm. Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management.

Social Networks on other hand is the important aspect of IT industry. There are many social network sites which allow the users to post comments on other users’ profiles and pages. However, a number of social networking sites allow users to include multimedia content like photo/image, video etc, as part of these comments. The study encloses the attacking vector of two popular social networking Web sites, Flicker and LinkedIn. Specifically, it demonstrates three attacks in social network—the Social-DDoS attack, the Man-in-Middle attack, and Password-Based attack. The research defines the above attacks and accommodates the prevention techniques to mentioned flaws in social network.

The paper ‘Security in Cloud Computing and Social Networks’ explores the problems in cloud computing and attacks in social network with solutions for secured data storage in cloud and attack free networking sites.

eg$�ad C 9specific plans tailored for each domain and exposure area in a holistic manner. Key focus areas should include governance, risk and compliance, users (identity assurance regardless of location or device type), data (sensitive data protection no matter where it resides), applications (application security modernization), infrastructure (securing the “borderless” enterprise including cloud computing) and assets (cyber supply chain). The challenge is far broader than simply addressing one issue such as securing mobile devices or securing cloud computing environments, so by ensuring the Cyber Security strategy addresses all of these inter-related trends, business leaders can be confident of a defense-in-depth approach.

 

For businesses and governments alike, getting the Cyber Security posture right across all its elements will be vital for future growth, innovation and competitive advantage in order to truly exploit the business and economic opportunities provided by technologies such as cloud, mobile and social computing as well as smart computing and IT appliances. A Cyber Security-related mis-step in any of these rapidly emerging areas can lead to lost productivity and potentially serious damage to brand reputation. There is no single answer for success, but by working across public- and private sector partnerships and by advancing security measures particularly with regard to mission-critical systems, processes and applications that are connected into cyberspace, businesses will be able to work towards a future environment that is both open and secure and prosperous.

Keywords


Cloud Computing, Cloud Storage Architecture, Triple DES Algorithm, Social Network, Attacks in Social Network, Prevention Techniques.

Full Text:

PDF

References


Anurag Porwal, Rohit Maheshwari, B.L.Pal, Gaurav Kakhani “An Approach for Secure Data Transmission in Private Cloud” International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012.

Balachander R.K, Ramakrishna P, A. Rakshit, “Cloud Security Issues, IEEE International Conference on Services Computing (2010)”, pp. 517-520.

Cloud Security Alliance, “Security Guidance for Criti¬cal Areas of Focus in Cloud Computing V2.1”.

E. Giles Hogben, Position Paper No.1 “Security Issues and Recommendations for Online Social Networks”.

E. Levy and I. Arce. New threats and attacks on the World Wide Web. IEEE Security & Privacy, 2006.

J. Jung, B. Krishnamurty, and M. Rabinovich “Flash crowds and denial of service attacks: Characterization and implications for web sites”. In International Conference on the World Wide Web, May 2002.

Mahima Joshi, Yudhveer Singh Moudgil, “Security in cloude storage” International Journal of Computer Science & Communication Networks, ISSN: 2249-5789, Vol 1(2), 171-175.

Qingzhang CHEN, Zhongzhe TANG, Yidong LI, Yibo NIU, Jianhua MO, “Research on Encryption Algorithm of Data Security for Wireless Sensor Network”, Journal of Computational Information Systems 7:2 (2011) 369-376.

Sudha.M, Bandaru Rama Krishna Rao, M.Monica, “A Comprehensive approach to ensure secure data communication in cloud environment” International Journal of computer Applications, vol. 12. Issue 8, pp. 19-23.

Thomas Zink, “Network Security Algorithms” Konstanzer Online-Publikations-System (KOPS).

Vaibhav Khadilkar, Anuj Gupta, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham, “Secure data storage and retrieval”, In national conference on information security, October 2009.

Varghese, G., Network Algorithms, Elsevier Books, Oxford, 2005 2, 3.3.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.