DocumentCode :
144559
Title :
Comparative Study of CIA and Revised-CIA Algorithm
Author :
Thakare, S.V. ; Gore, Deipali V.
Author_Institution :
Dept. of Comput. Eng., P.E.S. Modern Coll. of Eng., Pune, India
fYear :
2014
fDate :
7-9 April 2014
Firstpage :
713
Lastpage :
718
Abstract :
Cloud computing is an emerging, on-demand and Internet based popular technology. It provides lots of services over Internet such as, software, hardware, network, data storage, and computing and memory management. Besides this companies are binding their business from cloud computing because the fear of data leakage. Due to lack of security control mechanism and weakness in safeguard which lead to many security issues in cloud computing. In Internet world, Confidentiality, Integrity and availability is a model designed to guide policies for information security within business organization. CIA (Confidentiality, Integrity, Availability)[1] factors are used for data classification which is done by client before storing the data on server. The CIA factors are the measure part of CIA Algorithm. The client who wants to upload the data for storage needs to give the value of the factors C (confidentiality), I (integrity), and A (Availability). The value of C is depends on level of secrecy at each level of data accessing and prevents unauthorized access of files, value of I based on how much accuracy is provided, unauthorized modification is required and reliability of information, and value of A is depends on accessibility of file. With the help of proposed method, the priority rating is calculated. Accordingly if data having the higher priority rating is considered to be critical and 3D security is recommended on that data or file. After completion of this phase the data which is received by cloud user for storage, uses 3 Dimentional system for accessibility.
Keywords :
cloud computing; pattern classification; security of data; 3D security; Internet based popular technology; cloud computing; confidentiality-integrity-availability algorithm; data classification; data leakage; information reliability; information security; revised-CIA algorithm; security control mechanism; three-dimentional system; Communication systems; 3D System Security; 3D password; Authentication; Protection Rings; Revised-CIA Algorithm;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
Conference_Location :
Bhopal
Print_ISBN :
978-1-4799-3069-2
Type :
conf
DOI :
10.1109/CSNT.2014.150
Filename :
6821492
Link To Document :
بازگشت