Loading…

A NEW IDENTIFYING POTENTIALLY UNUSUSAL FILE TRANSFERS OR DUPLICATION'S IN CLOUD ENVIRONMENTS

There has been a prolific rise in the popularity of cloud storage in recent years. While cloud storage offers many advantages such as flexibility and convenience, users are typically unable to tell or control the actual locations of their data. This limitation may affect users confidence and trust i...

Full description

Saved in:
Bibliographic Details
Published in:Turkish journal of computer and mathematics education 2023-01, Vol.14 (3), p.780-786
Main Authors: Nanjappan, Baskar, Chandrika, N, Sridevi, M, Sree, P Thanmay, Divya, P
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:There has been a prolific rise in the popularity of cloud storage in recent years. While cloud storage offers many advantages such as flexibility and convenience, users are typically unable to tell or control the actual locations of their data. This limitation may affect users confidence and trust in the storage provider, or even render cloud unsuitable for storing data with strict location requirements. To address this issue,We equip each cloud node with a socket monitor that is capable of monitoring the real-time communication among cloud nodes. Based on the realtime data transfer information captured by the socket monitors, our system calculates the probability of a given transfer to be illegal. We have implemented our proposed framework and carried out an extensive experimental evaluation in a large-scale real cloud environment to demonstrate the effectiveness and efficiency of our proposed system.
ISSN:1309-4653