Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Secure File Hosting in Private Cloud Services

Print
PDF
IJCA Proceedings on Futuristic Areas in Computer Engineering and Technology 2013
© 2013 by IJCA Journal
FACET
Year of Publication: 2013
Authors:
Nangunuri Raghu
Daithala Sreedhar
Prashanth Kumar D

Nangunuri Raghu, Daithala Sreedhar and Prashanth Kumar D. Article: Secure File Hosting in Private Cloud Services. IJCA Proceedings on Futuristic Areas in Computer Engineering and Technology 2013 FACET:1-3, December 2013. Full text available. BibTeX

@article{key:article,
	author = {Nangunuri Raghu and Daithala Sreedhar and Prashanth Kumar D},
	title = {Article: Secure File Hosting in Private Cloud Services},
	journal = {IJCA Proceedings on Futuristic Areas in Computer Engineering and Technology 2013},
	year = {2013},
	volume = {FACET},
	pages = {1-3},
	month = {December},
	note = {Full text available}
}

Abstract

Cloud computing provides services in wide range for business firms. Nowadays small and medium businesses firms are depending for their data services and computation on out sourcing of on cloud. The cloud provides a very high efficient services for the business organizations. These business organizations trust cloud service providers for their data security. Providing security is highly risk in cloud, especially in private cloud services. Existing data security methods are not so effective. They are failed in preventing theft attacks. This paper propose a new approach for securing file hosting in private cloud service. OTFP – "One Time File Password" is an Email service that protects unauthorized access of file hosting account and file downloading form the cloud.

References

  • Cloud Security Alliance, "Top Threat to Cloud Computing V1. 0," March 2010. Available:https://cloudsecurityalliance. org/topthreats/csathreats. v1. 0. pdf
  • M. Arrington, "In our inbox: Hundreds of con-fidential twitter documents," July 2009. [Online]. Available:http://techcrunch. com/2009/07/14/in-our-inbox-hundreds-of-confidential-twitter-documents/
  • D. Takahashi, "French hacker who leaked Twitter documents to TechCrunch is busted," March 2010. [On-line]. Available: http://venturebeat. com/2010/03/24/french-hacker-who-leaked-twitter-documents-to-techcrunch-is-busted/
  • D. Danchev, "ZDNET: french hacker gains access to twitter's admin panel," April 2009. [Online]. Available:http://www. zdnet. com/blog/security/french-hacker-gains-access-to-twitters-admin-panel/3292
  • P. Allen, "Obama's Twitter password revealed after french hacker arrested for breaking into U. S. president's account," March 2010. [Online]. Available: http://www. dailymail. co. uk/news/article- 1260488/Barack-Obamas-Twitter-password-revealed-French-hacker-arrested. html
  • F. Rocha and M. Correia, "Lucy in the sky without diamonds: Stealing confidential data in the cloud," in Proceedings of the First International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments, Hong Kong, ser. DCDV '11, June 2011.
  • M. Van Dijk and A. Juels, "On the impossibility of cryptography alone for privacy-preserving cloud computing," in Proceedings of the 5th USENIX conference on Hot topics in security, ser. HotSec'10. Berkeley, CA, USA: USENIX Association, 2010, pp. 1–8. [Online]. Available:http://dl. acm. org/citation. cfm?id=1924931. 1924934
  • Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. [Online]. Available:http://ids. cs. columbia. edu/sites/default/files/Fog_Computing_Position_Paper_WRIT_2012. pdf
  • J. Pepitone, "Dropbox's password nightmare highlights cloud risks," June 2011.