Enhancing Cloud Data Security Through User Behavior Tracking and Multi-Layered Authentication Mechanisms

Authors

  • Velpuri Venkata Naveen Data Security Consultant, USA Author

Keywords:

Cloud Data Security, User Behavior Tracking, Pattern Detection, Multi-layered Security, Security Questions, Aadhar Card Verification, OTP Authentication, Decoy Information, Unauthorized Access Prevention, Data Protection Mechanisms

Abstract

Cloud computing is a platform that offers a range of utilities and services via the Internet, serving as a promising technology for developing large-scale, on-demand computing infrastructure. A private cloud provides the same comprehensive services as public cloud but is dedicated to a single organization, making it ideal for businesses with dynamic or unpredictable computing needs. It offers similar benefits to the public cloud, including self-service, multi-tenancy, and the ability to create multiple virtual machines for complex tasks like big data processing. However, these computing paradigms introduce new security challenges that existing protection mechanisms cannot address. To safeguard sensitive data, we propose the creation of decoy files containing irrelevant and unrelated information. These decoy files are presented to unauthorized users, while the system monitors user behavior to detect unauthorized access to the cloud.

References

Ali Ahmad Milad, Hjh Zaiton Muda, Zul Azri Bin Muhamad Noh, Mustafa Almahdi Algaet, “Comparative Study of Performance in Cryptography Algorithms,” Journal of Computer Science 8 (7): 1191-1197, 2012 ISSN 1549-3636, Malaysia, 2012.

Chadwick, D. W., & Fatema, K. “A privacy preserving authorisation system for the cloud,” Journal of Computer and System Sciences, 78(5), (2012), 1359-1373.

Mandlekar, Viraj G., Mahale, VireshKumar, Sancheti, Sanket S., Rais, Maaz S. "Survey on Fog Computing Mitigating Data Theft Attacks in Cloud", IJIRCST, ISSN: 2347-5552, Volume-2, Issue-6, November-2014.

Pepitone, J. “Dropbox’s password nightmare highlights cloud risks,” June 2011.

Rittinghouse, John W., & Ransome, James F. "Cloud Computing Implementation, Management and Security", 2010 by Taylor and Francis Group, LLC, CRC Press.

Stallings, William. Cryptography and Network Security: Principles and Practice. 7th edition, Pearson, 2016.

Rathod, C., & Gonsai, A. (2022). "A Detailed Comparative Study and Performance Analysis of Standard Cryptographic Algorithms."

Nabeel, M., & Bertino, E. (2022). "Privacy-Preserving Policy-Based Content Sharing in Public Clouds." IEEE Transactions on Knowledge and Data Engineering, 34(7), 3105-3117.

Kumar, P., & Lee, J. (2023). "A Study on the Risk Management Framework for Cloud Computing." Journal of Cloud Computing: Advances, Systems and Applications, 12(1), 23.

Downloads

Published

2024-04-21

How to Cite

Enhancing Cloud Data Security Through User Behavior Tracking and Multi-Layered Authentication Mechanisms. (2024). JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), 12(1), 6-9. https://jrtcse.com/index.php/home/article/view/JRTCSE.2024.1.2