CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Secure File Hosting in Private Cloud Services

Published on December 2013 by Nangunuri Raghu, Daithala Sreedhar, Prashanth Kumar D
Futuristic Areas in Computer Engineering and Technology 2013
Foundation of Computer Science USA
FACET - Number 1
December 2013
Authors: Nangunuri Raghu, Daithala Sreedhar, Prashanth Kumar D
06877d3d-e6e7-4d6b-9772-aa67a2e49c5f

Nangunuri Raghu, Daithala Sreedhar, Prashanth Kumar D . Secure File Hosting in Private Cloud Services. Futuristic Areas in Computer Engineering and Technology 2013. FACET, 1 (December 2013), 1-3.

@article{
author = { Nangunuri Raghu, Daithala Sreedhar, Prashanth Kumar D },
title = { Secure File Hosting in Private Cloud Services },
journal = { Futuristic Areas in Computer Engineering and Technology 2013 },
issue_date = { December 2013 },
volume = { FACET },
number = { 1 },
month = { December },
year = { 2013 },
issn = 0975-8887,
pages = { 1-3 },
numpages = 3,
url = { /proceedings/facet/number1/14686-1304/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Futuristic Areas in Computer Engineering and Technology 2013
%A Nangunuri Raghu
%A Daithala Sreedhar
%A Prashanth Kumar D
%T Secure File Hosting in Private Cloud Services
%J Futuristic Areas in Computer Engineering and Technology 2013
%@ 0975-8887
%V FACET
%N 1
%P 1-3
%D 2013
%I International Journal of Computer Applications
Abstract

Cloud computing provides services in wide range for business firms. Nowadays small and medium businesses firms are depending for their data services and computation on out sourcing of on cloud. The cloud provides a very high efficient services for the business organizations. These business organizations trust cloud service providers for their data security. Providing security is highly risk in cloud, especially in private cloud services. Existing data security methods are not so effective. They are failed in preventing theft attacks. This paper propose a new approach for securing file hosting in private cloud service. OTFP – "One Time File Password" is an Email service that protects unauthorized access of file hosting account and file downloading form the cloud.

References
  1. Cloud Security Alliance, "Top Threat to Cloud Computing V1. 0," March 2010. Available:https://cloudsecurityalliance. org/topthreats/csathreats. v1. 0. pdf
  2. M. Arrington, "In our inbox: Hundreds of con-fidential twitter documents," July 2009. [Online]. Available:http://techcrunch. com/2009/07/14/in-our-inbox-hundreds-of-confidential-twitter-documents/
  3. D. Takahashi, "French hacker who leaked Twitter documents to TechCrunch is busted," March 2010. [On-line]. Available: http://venturebeat. com/2010/03/24/french-hacker-who-leaked-twitter-documents-to-techcrunch-is-busted/
  4. D. Danchev, "ZDNET: french hacker gains access to twitter's admin panel," April 2009. [Online]. Available:http://www. zdnet. com/blog/security/french-hacker-gains-access-to-twitters-admin-panel/3292
  5. P. Allen, "Obama's Twitter password revealed after french hacker arrested for breaking into U. S. president's account," March 2010. [Online]. Available: http://www. dailymail. co. uk/news/article- 1260488/Barack-Obamas-Twitter-password-revealed-French-hacker-arrested. html
  6. F. Rocha and M. Correia, "Lucy in the sky without diamonds: Stealing confidential data in the cloud," in Proceedings of the First International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments, Hong Kong, ser. DCDV '11, June 2011.
  7. M. Van Dijk and A. Juels, "On the impossibility of cryptography alone for privacy-preserving cloud computing," in Proceedings of the 5th USENIX conference on Hot topics in security, ser. HotSec'10. Berkeley, CA, USA: USENIX Association, 2010, pp. 1–8. [Online]. Available:http://dl. acm. org/citation. cfm?id=1924931. 1924934
  8. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. [Online]. Available:http://ids. cs. columbia. edu/sites/default/files/Fog_Computing_Position_Paper_WRIT_2012. pdf
  9. J. Pepitone, "Dropbox's password nightmare highlights cloud risks," June 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security Private Cloud Second Party Security Otfp.