Data Leakage Detection in Cloud Computing Network

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2017 by IJETT Journal
Volume-46 Number-1
Year of Publication : 2017
Authors : Utkarsh, Vaibhav Gupta, Yashwant Kumar Singh, Dr. Shashi Kant Singh
DOI :  10.14445/22315381/IJETT-V46P202

Citation 

Utkarsh, Vaibhav Gupta, Yashwant Kumar Singh, Dr. Shashi Kant Singh "Data Leakage Detection in Cloud Computing Network", International Journal of Engineering Trends and Technology (IJETT), V46(1),6-11 April 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Giving security in a conveyed framework requires more than client verification with passwords or advanced testaments and classification in information transmission. Dispersed model of cloud makes it defenseless and inclined to modern disseminated interruption assaults like Distributed Denial of Service (DDOS) and Cross Site Scripting (XSS). To deal with extensive scale arrange get to movement and regulatory control of information and application in cloud, another multi-strung disseminated cloud IDS demonstrate has been proposed. Our proposed cloud IDS handles huge stream of information bundles, break down them and create reports effectively by incorporating learning and conduct investigation to recognize interruptions.

 References

[1] SEBASTIAN ROSCHKE, FENG CHENG, CHRISTOPH MEINEL,“ INTRUSION DETECTION IN THE CLOUD", EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 2009.
[2] CHI-CHUN LO, CHUN-CHIEH HUANG, JOY KU, “A COOPERATIVE INTRUSION DETECTION SYSTEM FRAMEWORK FOR CLOUD COMPUTING NETWORKS", 39TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, 2010.
[3] ANDREAS HAEBERLEN,“ AN EFFICIENT INTRUSION DETECTION MODEL BASED ON FAST INDUCTIVE LEARNING”, SIXTH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, HONG KONG, 19-22 AUGUST 2007.
[4] RICHARD CHOW, PHILIPPE GOLLE, MARKUS JAKOBSSON, “CONTROLLING DATA IN THE CLOUD: OUTSOURCING COMPUTATION WITHOUT OUTSOURCING CONTROL”, ACM COMPUTER AND COMMUNICATIONS SECURITY WORKSHOP, CCSW 09, NOVEMBER 13, 2009.
[5] KLEBER, SCHULTER, “INTRUSION DETECTION FOR GRID AND CLOUD COMPUTING”, IEEE JOURNAL: IT PROFESSIONAL, 19 JULY 2010.
[6] IRFAN GUL, M. HUSSAIN, “DISTRIBUTED CLOUD INTRUSION DETECTION MODEL”, INTERNATIONAL JOURNAL OF ADVANCED SCIENCE AND TECHNOLOGY VOL. 34, SEPTEMBER, 2011.

Keywords
Cross Site Scripting, Cloud, DDOS, IDS.