CONCLUSION illegal access to a user’s data on

CONCLUSIONIn this paper, we examined the problem for security associated issues while storing the information on cloud. To prevent and implement illegal access to a user’s data on cloud we devised an efficient system architecture which supports efficient operations on data like modification of data, deleting or appending the data. We implemented ip triggering which triggers a mail to the user’s registered email address on unauthorized access of data.

On the second level, we have used a password login system with a key to prevent access of files other than the sole owner. Even if the key is exposed the system detects illegal access by comparing the ip against its database and if they don’t match successfully redirecting it to the dummy file thus preventing the users’ data from being corrupted or modified.The area of cloud computing is still in bloom so still many vulnerabilities are not discovered and has decent amount of challenges. The most hopeful development which we can expect from cloud computing is to provide the user with decent amount of control of their own data. Automating the system to check for any modifications in data by using hashing algorithms and calculating checksum for checking with any modifications attack like SHA-checksum.Future Enhancements:1. We shall implement hashing algorithm which will ensure the integrity of file over period of time.

Don't waste your time
on finding examples

We can write the essay sample you need

2. The mobile alerts functionality will make the users’ updated about any modification attacks performed on the file.3.

We will implement additional layer of security by using the owner’s mac address which will be unique to each user.


I'm Owen!

Would you like to get a custom essay? How about receiving a customized one?

Check it out