In the modern era of the computing world, the data producing and using it is becoming large and instant at various places. For availing the data at different locations for processing we need to store it in the global platform. Cloud environment provides a best and easy way for this. Cloud computing is becoming as the essential thing for high-quality data services. However there are some potential problems with respect to data security. Here encryption techniques can be used for providing security, but with restricted efficiency. In this paper we propose a new encryption mechanism for providing data security in cloud environment. We propose a two round searchable encryption which supports multi keyword retrieval. Here we adapted a vector space model for improving search accuracy; the elgamal encryption technique allows users to involve in the ranking, while the essential key part of encryption will be done at the source itself. The proposed improves the data security and reduces data leakage.
In today's world there is huge amount use of workstation particularly for web submission. Most of the people do their transaction through web use. So there are chances of personal figures gets hacked then need to be provide more refuge for both web server and database server. For that purpose double guard system is used. The double guard system is used to indentify & prevent attacks using Intrusion detection system. Double Guard prevents attacks and prevents user account from intruder from hacking his/her account. By using IDS, system can supply security for both database server and web server using map of demand and query. An IDS system that model the network actions of user sessions across together the front-end web server and the back-end database.Keywords: Session, Session Id, Query String, Ids. I. INTRODUTIONInternet military and application have become an inextricable part of daily life, enable message and the management of personal in sequence from somewhere. To house this increase in application and data difficulty web services have moved to a multi-tiered intend wherein the web server runs the application front-end logic and data is outsourced to a database or file server. In this paper presents DoubleGuard, an IDS method that models the network behavior of user sessions across both the frontend web server and the back-end database. By monitor both web and succeeding database necessities, we are able to ferret out attacks that an independent ID would not be able to identify. additionally, we enumerate the boundaries of any multi-tier IDS in terms of training sessions and functionality coverage.In this paper present DoubleGuard, a system used to detect attacks in multitiered web services. Our come up to can generate normality models of cut off user session that include both the web front-end (HTTP) and back-end (File or SQL) group transactions. To get this, we employ a lightweight virtualization system to go away all user's web session to a enthusiastic container, an isolated virtual computing setting. We use the container ID to exactly associate the web demand with the subsequent DB queries. consequently, DoubleGuard can construct a causal mapping profile by nice-looking both the web server and DB traffic into description. The container-based web architecture not only fosters the profiling of underlying mapping, but it also provides an segregation that prevents future sessionhijacking attacks. to the compromise session; other user sessions remain unaffected by it. Using our prototype, we illustrate that, for websites to do not allow satisfied modify from users there is a direct causal association stuck between the requirements reputable by the front-end web server and those cause for the folder back-end.In addition to this static website case, there are web services that permit constant back-end data modification. II. RELATED WORK / LITURATURE SURVEYA network imposition detection system (Intrusion Detection System) is mainly categorized into the two types: incongruity detection and abuse detec...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.