{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T12:57:58Z","timestamp":1771851478018,"version":"3.50.1"},"reference-count":26,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,1]]},"abstract":"<p>Cloud computing is a framework for delivering services through a shared network. It should follow certain procedures or mechanisms to protect and make the cloud data more reliable. In secure cloud computing, the implementation and service delivery model are dealt with. Cloud security could be viewed as a provider and customer responsibility depending on their design and level. There are cases where multiple cloud users can use the same information to create service abnormalities, which is called \u2018multitenancy.' In a multi-tenant model, the resources are isolated between different users and it is done by segmentation to achieve the goal of data security between many users. In the user access area, user access to common resources is also limited. The software is aware of the actions of the client and acts accordingly if unauthorized access is detected. The authors propose a clear idea of the data storage security of cloud information through honeypot in cloud monitoring applications and various cloud security scheme key models used and also identifies the audit time and invalid response time.<\/p>","DOI":"10.4018\/ijec.2020100101","type":"journal-article","created":{"date-parts":[[2020,8,26]],"date-time":"2020-08-26T13:50:13Z","timestamp":1598449813000},"page":"1-14","source":"Crossref","is-referenced-by-count":6,"title":["Data Storage Security in the Cloud Environment Using the Honey Pot System"],"prefix":"10.4018","volume":"16","author":[{"given":"Benjula Anbu","family":"Malar","sequence":"first","affiliation":[{"name":"Vellore Institute of Technology, India"}]},{"family":"Prabhu J.","sequence":"additional","affiliation":[{"name":"Vellore Institute of Technology, India"}]}],"member":"2432","reference":[{"issue":"3","key":"IJeC.2020100101-0","first-page":"202","article-title":"An Enhanced Intrusion Detection System Using Honeypot and Captcha Techniques","volume":"3","author":"M. A.Abdullahi","year":"2019","journal-title":"Fudma Journal of Sciences"},{"key":"IJeC.2020100101-1","doi-asserted-by":"crossref","unstructured":"Akhtar, J., Tahzib-Ul-Islam, M., Belali, M. H., & Islam, S. (2019). Big Data Security with Access Control Model and Honeypot in Cloud Computing. International Journal of Computer Applications, 173(88).","DOI":"10.5120\/ijca2019919207"},{"key":"IJeC.2020100101-2","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/160\/1\/012106"},{"key":"IJeC.2020100101-3","doi-asserted-by":"publisher","DOI":"10.1145\/3231053.3231127"},{"issue":"2","key":"IJeC.2020100101-4","first-page":"171","article-title":"Use of honeypots to increase awareness regarding network security.","volume":"1","author":"L.Bhumika","year":"2012","journal-title":"International Journal of Recent Technology and Engineering"},{"key":"IJeC.2020100101-5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29852-3_6"},{"key":"IJeC.2020100101-6","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2012.10.07"},{"key":"IJeC.2020100101-7","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.06.248"},{"key":"IJeC.2020100101-8","doi-asserted-by":"crossref","unstructured":"Dongxia, L., & Yongbo, Z. (2012). An intrusion detection system based on honeypot technology. In Proceedings of the International conference on computer science and electronics engineering (pp. 451-454). IEEE Press.","DOI":"10.1109\/ICCSEE.2012.158"},{"key":"IJeC.2020100101-9","unstructured":"Hepsiba, C. L., & Sathiaseelan, J. G. R. (2016). Security issues in service models of Cloud computing. International Journal of computer science and Mobile Computing, 5(3), 610-615."},{"issue":"1","key":"IJeC.2020100101-10","first-page":"52","article-title":"A survey of cloud computing security challenges and solutions","volume":"14","author":"N. H.Hussein","year":"2016","journal-title":"International Journal of Computer Science and Information Security"},{"key":"IJeC.2020100101-11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITechn.2012.6509712"},{"key":"IJeC.2020100101-12","unstructured":"Kaur, T., Malhotra, V., & Singh, D. (2014). Comparison of network security tools-firewall, intrusion detection system and Honeypot. International Journal of Enhanced Research in Science Technology & Engineering, 200-204."},{"key":"IJeC.2020100101-13","unstructured":"Khurana, S., & Verma, A. G. (2013). Comparison of cloud computing service models: SaaS, PaaS, IaaS. International Journal of Electronics & Communication Technology, 4."},{"key":"IJeC.2020100101-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.01.001"},{"key":"IJeC.2020100101-15","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-012-0831-5"},{"key":"IJeC.2020100101-16","doi-asserted-by":"publisher","DOI":"10.1109\/ICIRCA.2018.8597359"},{"key":"IJeC.2020100101-17","doi-asserted-by":"publisher","DOI":"10.1109\/CINE.2015.31"},{"key":"IJeC.2020100101-18","doi-asserted-by":"crossref","unstructured":"Ravji, S., & Ali, M. (2018). Integrated Intrusion Detection and Prevention System with Honeypot in Cloud Computing. In Proceedings of the International Conference on Computing, Electronics & Communications Engineering (iCCECE) (pp. 95-100). IEEE.","DOI":"10.1109\/iCCECOME.2018.8658593"},{"key":"IJeC.2020100101-19","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2523-2_7"},{"issue":"15","key":"IJeC.2020100101-20","article-title":"A case of multilevel security application for ensuring data integrity (prevention and detection) in cloud environment","volume":"96","author":"R.Sharma","year":"2014","journal-title":"International Journal of Computers and Applications"},{"key":"IJeC.2020100101-21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"IJeC.2020100101-22","doi-asserted-by":"publisher","DOI":"10.1109\/WCCCT.2014.53"},{"key":"IJeC.2020100101-23","doi-asserted-by":"crossref","unstructured":"Vishwakarma, R., & Jain, A. K. (2019). A Honeypot with Machine Learning based Detection Framework for defending IoT based Botnet DDoS Attacks. In Proceedings of the 3rd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 1019-1024). IEEE.","DOI":"10.1109\/ICOEI.2019.8862720"},{"key":"IJeC.2020100101-24","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.060912.00182"},{"key":"IJeC.2020100101-25","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"}],"container-title":["International Journal of e-Collaboration"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=261235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T23:50:06Z","timestamp":1651881006000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJeC.2020100101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,10,1]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijec.2020100101","relation":{},"ISSN":["1548-3673","1548-3681"],"issn-type":[{"value":"1548-3673","type":"print"},{"value":"1548-3681","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,1]]}}}