0% found this document useful (0 votes)
14 views

3 Dimensional Security in Cloud Computing

The document discusses 3 dimensional security in cloud computing. It proposes a framework with two phases - data classification by the client before storage, and 3D security techniques for sensitive data storage in the cloud. The framework aims to address data leakage issues by authenticating and authorizing users before data access.

Uploaded by

Taj S
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

3 Dimensional Security in Cloud Computing

The document discusses 3 dimensional security in cloud computing. It proposes a framework with two phases - data classification by the client before storage, and 3D security techniques for sensitive data storage in the cloud. The framework aims to address data leakage issues by authenticating and authorizing users before data access.

Uploaded by

Taj S
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

3 Dimensional Security in Cloud Computing

Abstract
Cloud computing is emerging field because of its performance, high availability, least
cost and many others. Besides this companies are binding there business from cloud computing
because the fear of data leakage. Due lack of proper security control policy and weakness in
safeguard which lead to many vulnerability in cloud computing. This project has been written to
focus on the problem of data leakage and proposes a framework works in two phases. First phase
which is known as Data classification is done by client before storing the data. During this phase
the data is to be categorized on the basis of CIA (Confidentiality, Integrity, and Availability).
The client who wants to send the data for storage needs to give the value of C (confidentiality), I
(integrity), A (Availability). The value of C is based on level of secrecy at each junction of data
processing and prevents unauthorized disclosure, value of I based on how much assurance of
accuracy is provided, reliability of information and unauthorized modification is required, and
value of A is based on how frequently it is accessible. With the help of proposed formula, the
priority rating is calculated. Accordingly data having the higher rating is considered to be critical
and 3D security is recommended on that data. After completion of first phase the data which is
received by cloud provider for storage, uses 3Dimentional technique for accessibility. The
sensitive proved data will send for storage to cloud provider. According to the concept of 3D
user who wants to access the data need to be authenticated, to avoid impersonation and data
leakage. Now there is third entity who is either company’s (whose data is stored) employee or
customer who want to access, they need to register first and then before every access to data,
his/her identity is authenticated for authorization.

Software Specification

Front End : PHP

Back End : MySQL

Operating System : Windows XP

You might also like