Enhanced Secure User Data on Cloud using Cloud Data Centre Computing and Decoy Technique
P.S.Apirajitha1C.Gopala Krishnan2, G.Aravind Swaminathan3, E.Manohar4

1Ms.P.S. Apirajitha, Assistant Professor, Department of CSE, VEL TECH UNIVERSITY, Chennai, Tamil Nadu, India.
2Dr. C.Gopala Krishnan, Professor, Department of CSE, Francis Xavier Engineering College, Tirunelveli India.
3Dr. G.Aravind Swaminathan, Professor, Department of CSE, Francis Xavier Engineering College, Tirunelveli India.
4Dr. E.Manohar, Assistant Professor, Department of CSE, Francis Xavier Engineering College, Tirunelveli India.

Manuscript received on 30 June 2019 | Revised Manuscript received on 05 July 2019 | Manuscript published on 30 July 2019 | PP: 1436-1439 | Volume-8 Issue-9, July 2019 | Retrieval Number I7777078919/19©BEIESP | DOI: 10.35940/ijitee.I7777.078919
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In recent years the storage of cloud platform was increased a lot. Large set of personal and business data can be stored and accessed at anywhere at any time. Data’s are stored in a secured manner using various secured and optimized algorithms. Over this data theft and modifications are done in a highly manner. Therefore this creates a various security risks and data theft problems in cloud. There is need of security technique to overcome this problem. A proposed technique called cloud data centre technique is a new model for securing data from different attacks and security risks. This technique incorporate the FEBER and CUSCUM algorithms, which will monitor the user activity and then identify the legitimacy and prevent from any unauthorized user access. This data center technique can be used to detect and avoid data theft attacks by malicious insiders. The anonymous and miss use of data also prevented in a very good manner while compared to other techniques.
Keywords: Cloud data centre computing; Decoy technology; Data security, Insider theft attacks, CUSCUM technique, FEBER algorithm.

Scope of the Article: Nature Inspired Computing