Pragmatic approach to conquer security perturbation in cloud computing using level classification

Cloud computing is an emerging technology and leads to marvelous impact on many domains such as industry and academia. It considered as one of the widely accepted technologies worldwide. During these days people to avoid the expense of IT infrastructure and maintenance they are started adopting the cloud services. When we choose cloud service security is most significant obstacle and data security is biggest hurdle in case of security. When data is store on servers it may store directly or with encryption of whole data. But we know data have different characteristics and needs so different security levels are required. So in this paper we review some classification algorithms to classify the data on basis of their different security needs. After classification which part required more security that can be encrypted by various cryptographic techniques and then store it over the cloud whereas other part can store directly without any encryption on cloud storage. For further security we can partition the cloud storage. And this will help us to overcome the security issue i.e. confidentiality and also save our efforts and time of encryption and uploading of data over data storage. It prevents the data leakage also because after classification hacker will also not able to know the starting and ending point of data and it will also difficult for him to hack multiple storage than single. This paper prevents the data leakage, hassle vogue menace to find position of data eventually difficult for attacker to hack multiple storage than single level security as used in conventional model.

[1]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[2]  Robert L. Grossman,et al.  The Case for Cloud Computing , 2009, IT Professional.

[3]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[4]  G. Karagiannis,et al.  Cloud computing services: taxonomy and comparison , 2011, Journal of Internet Services and Applications.

[5]  Low Tang Jung,et al.  K-NN classifier for data confidentiality in cloud computing , 2014, 2014 International Conference on Computer and Information Sciences (ICCOINS).

[6]  Manas Ranjan Patra,et al.  Cloud Computing: Security Issues and Research Challenges , 2011 .

[7]  Carla Merkle Westphall,et al.  Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.

[8]  Elaine Shi,et al.  Cloud Data Protection for the Masses , 2012, Computer.

[9]  Daniele Catteddu and Giles Hogben Cloud Computing. Benefits, risks and recommendations for information security , 2009 .

[10]  Liang Zhong,et al.  EnaCloud: An Energy-Saving Application Live Placement Approach for Cloud Computing Environments , 2009, 2009 IEEE International Conference on Cloud Computing.

[11]  Jörg Schwenk,et al.  On Technical Security Issues in Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.

[12]  Tim Mather,et al.  Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.

[13]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[14]  Thair Nu Phyu Survey of Classification Techniques in Data Mining , 2009 .

[15]  Daniele Catteddu,et al.  Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .

[16]  K. Scarfone,et al.  Guidelines for Managing the Security of Mobile Devices in the Enterprise , 2013 .