SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 520
Cloud-based Optimisation approach to Joint Cyber Security and
Insurance Management System
Sujatha E1, Vignesh D2, Gokula Krishnan P3, Siva M4
1,2,3,4 Department of Computer Science and Engineering,
Velammal Institute of Technology, “Velammal Knowledge Park”, Panchetti, Thiruvallur, Tamilnadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract— The main aim of this paper is to combine the
approach to security and cyber insurance provisioning in the
cloud-based resources. In cloud computing, the paper deals
with binding the security and Insurance Management System
(IMS). When a hacker attacks the application deployed in a
cloud and tries to inject any malicious code into the
application, the proposed system detects the attack and
analyze the amount of data lost during that attack.Duringthe
estimation process, the quantity of breacheddataiscalculated
and sent directly to both the cloud user and Insurance
Management System. So that the Insurance Management
System can repay the compensation amount immediately to
the cloud user with respect to the insurance package
subscribed by the user, this activity is done after theattackhas
been detected and resulted in data breach. If suppose the
amount of data breached is huge, then the system ask the
cloud user to upgrade their insurance package.
Keywords— SECaaS, Intrusion Detection System,
Subscription Management Process (SMP), Insurance
Management Process (IMP).
I. Introduction
In this paper, a joint approach to security and cyber
insurance planning in the cloud is proposed. Using a
probability optimization, a method of arranging both
services in the surface of unpredictabilityconcerningsuchas
future pricing, incoming traffic, and cyber attacks. Thus, an
operation may protect against strikes by provisioning
security services from providerslikeAvast andTrendMicro.
These services may take various forms, such as secure data
storage, identity management, and intrusion detection
services to screen incoming traffic. And thencyberinsurance
is used to provide explicit cover in the event that malicious
activity leads to financial loss. Insurance coverage may be
first-party or third-party with such asthieveryofmoneyand
digital assets, business interruption, and cyber extortion,
privacy breaches.
II. Existing System
In the previous systems have been maintaining the security
services only. So service should be protecting the user
system and information. Sometimes may hacker attack the
user assets and data likeincidents and disasters suchasdata
breach, data corruption, and business interruption?
However, one lucrative attack can bring about the data loss
and credit millions of dollars.
In the case of successive malware attack, the data breached
iscalculated and sent to the insurance system by theuser.So
loss will be uncertain. We cannot assume that damages can
be accurately determined. This may be in various forms,
such as a 'ransom' paid. It is important to stabilize
provisioning of security and insurance, even when future
costs and risks are undetermined.
One of the vital challengesin cyber insuranceistheauthentic
evaluation of ruins generated by cyber attacks.
III. Proposed System
In this paper, SECaaS in firewall-style isproposed to provide
security strategy imposition and supervising the network
traffic infrastructure. This focuses on network traffic
analysis like IDS (Intrusion Detection System)
implementations to identify attack behaviors. And the
relationship between cyber insurance and SECaaS
provisioning, containing a customer who uses applications,
which receive Internet traffic in the form of packets. These
packets are scanned by services from SECaaS providers,
provisioned by a Subscription Management Process (SMP).
In the event that harmful packets elude security,
cyber insurers, subscribed to by an insurance management
process(IMP), provide compensation for damagesincurred.
In this application run on customer machine that weassume
to be Internet-accessible, either on a cloud service such as
Amazon. Applications receive data packets in accordance
with their operating purpose, e.g. email data or financial
transactions.
Legitimate packets are called safe packets, while
packets used in cyber attacks are called unsafe packets.
Unsafe packets are deemed handled if they are correctly
detected by security services, or unhandled if they are not
successfully processed (for example if they are undetected).
These unhandled packets will cause damage, which incurs
costs to the customer will refund the amount to the
insurance company. And then IMP will refund the particular
data cost to the customer.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 521
Fig.1: Architecture Diagram
A. Purchase the Security services
In this module user first register the cloud site and provides
user details (Name, password, email, mobile,DOB).And then
login using the user credentials. Once username and
password are valid, then screen of the user’s profile will be
displayed. After login, user will purchase the outsource
security service in the cloud. In the security services have a
various control and price, validity.
Fig.2:
The user will choose their system performance based
services and then immediately transfer amount to security
management. Once got the service, the security service will
protect the customer application and system to particular
time periods.
Fig 3:
B. Cloud service
In this module, the user registers the cloud service based on
given user credential details and then log in the cloud
resource. Once the user enters the cloud site or application,
Say suppose, if their application may be a social network to
chat with their friends. The user can upload theirpicturesto
the social networking site.
Fig.4:
While uploading, the user provides tags for the
picture. Meanwhile the cloud security systemwilldefendthe
application to each and every demand to cloud as a process
of securing the cloud-based data.
Fig.5:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 522
Fig.6:
C. Screening Data traffic
In our security model, services are managedbythecustomer
applications and then monitor the traffic flow and screening
incoming data packets in accordance with their operating
purpose, e.g. email data or financial transactions, webpages.
Legitimate packets are called safe packets, while packets
used in cyber attacks are called unsafe packets.
Unsafe packets are managed only if those unsafe packetsare
rightly identified by security services, or unhandled if they
are not successfully processed (for example if they are
undetected). These unhandled packets will cause damage,
which incurs costs to the customer. So SECaaS will note on
user packet size, and the service will redirect to Insurance
Management Process (IMP).
D. Claim Insurance
In this module, IMP will check the user if customer or not.
And then check the customer current premium data and
evaluate the current unhandled data size to calculate the
particular per-packet, price, duration, and a maximum
number of packets affected.
A partial Lagrange multiplier algorithm is proposed to find
the optimal solution in parameter change for calculating the
amount of data. And then refund the amount to the
particular customer. After the claim, the customer current
premium is low to change the new future premium basedon
incoming unsafe packets.
The price for insurance purchased in advance is chargedata
rate known as a 'future premium'. The IMP purchases
insurance policies, which include the premium,typesofrisks
covered indemnity value, and policy duration.
IV. Conclusion
This paper express the trust between the user andinsurance
management system and the compensation amount in
accordance with the insurance subscribed by the user is
provided to the user equivalent to the exact data that have
been breached in very quick time. Though modern
technology has improved so much, security is still a concern
for cloud. Even though the security threats by cloud
administration are feasible and critical, cloud service
providersare concerned about security threat fromexternal
attacks rather than internal attacks. This project has
presented cloud system architecture in such a way that the
current security issues are removed and the cloudsecurityis
enhanced.
REFERENCE
[1] McAfee, “Net Losses: Estimating the Global Cost of
Cybercrime,”Centre for Strategic and International
Studies,Economic Impact of Cybercrime II, Jun. 2017.
[2] L. Zeng, B. Veeravalli, and X. Li, “Saba: A security-aware
and budget-aware workflow scheduling strategy in
clouds,”Journal of Parallel and Distributed Computing,
vol. 75,2016.
[3] A. A. Waskita, H. Suhartanto, P. D. Persadha, and L. T.
Handoko,“A simple statistical analysis approach for
intrusion detection system,” CoRR, vol. abs/1405.7268,
2016.
[4] S. Chaisiri, R. K. L. Ko, and D. Niyato, “A joint
optimization approach to security-as-a-service
allocation and cyber insurance management,” in
Trustcom/BigDataSE/ISPA, 2015 IEEE, Aug 2016,pp.
426–433.
[5] C. P. Ram and G. Sreenivaasan, “Security as a service
(sass):Securing user data by coprocessor and
distributing the data,” in Trendz in InformationSciences
Computing(TISC2010), Dec 2015.
[6] “Information technology – security techniques –
information security management systems –
requirements,” ISO/IEC 27001,Standard, Jan. 2015.
[7] Y. Sun, S. Nanda, and T. Jaeger, “Security-as-a-servicefor
microservices-based cloud applications,” in 2015 IEEE
7th International Conference on Cloud Computing
Technology and Science (CloudCom), Nov 2015,pp. 50–
57.
[8] A survey on security issuesin service delivery modelsof
cloud computing.S Subashini, V Kavitha - Journal of
network and computer applications, 2011.
[9] A survey of Cloud Computing Security challenges and
solutions. Nidal Hassan Hussein, Ahmed Khalid.
International Journal of Computer Science and
Information Security (IJCSIS), 2016.
[10] Software as a Service (SaaS): Security issues and
Solutions. Navneet Singh Patell, Prof. Rekha B.S.2014.

More Related Content

PDF
Cybersecurity in the Age of Mobility
PDF
ThreatMetrix Profile in March 2014 CIO Review
PDF
Strategic Information Management Through Data Classification
PDF
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
PDF
MIST Effective Masquerade Attack Detection in the Cloud
PDF
IBM Insight 2015 - Security Sessions Roadmap
PDF
br-security-connected-top-5-trends
PDF
6 Ways to Fight the Data Loss Gremlins
Cybersecurity in the Age of Mobility
ThreatMetrix Profile in March 2014 CIO Review
Strategic Information Management Through Data Classification
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
MIST Effective Masquerade Attack Detection in the Cloud
IBM Insight 2015 - Security Sessions Roadmap
br-security-connected-top-5-trends
6 Ways to Fight the Data Loss Gremlins

What's hot (20)

PDF
Getting ahead of compromise
PDF
IRJET- A Survey on Cloud Data Security Methods and Future Directions
PDF
Safeguarding the Enterprise
PPTX
What i learned at issa international summit 2019
PDF
Safeguarding the Internet of Things
PDF
Cyber Training: Developing the Next Generation of Cyber Analysts
PDF
IRJET- A Survey on SaaS-Attacks and Digital Forensic
PDF
The 10 most trusted companies in enterprise security for dec 2017
PDF
The Top 20 Cyberattacks on Industrial Control Systems
PDF
Cloud Insecurity and True Accountability - Guardtime Whitepaper
PDF
Cloud Computing Security
PDF
Top 10 IT Security Issues 2011
PPTX
Understanding Zero Day Recovery - Your last defence against ransomware attacks
PDF
Review on Security Aspects for Cloud Architecture
PDF
2 21677 splunk_big_data_futureofsecurity
PDF
Prevention is futile in 2020 - Gartner Report in Retrospect
PDF
Big Data Dectives
PDF
IT Security Trends in 2012
PDF
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
PDF
Looking into the future of security
Getting ahead of compromise
IRJET- A Survey on Cloud Data Security Methods and Future Directions
Safeguarding the Enterprise
What i learned at issa international summit 2019
Safeguarding the Internet of Things
Cyber Training: Developing the Next Generation of Cyber Analysts
IRJET- A Survey on SaaS-Attacks and Digital Forensic
The 10 most trusted companies in enterprise security for dec 2017
The Top 20 Cyberattacks on Industrial Control Systems
Cloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Computing Security
Top 10 IT Security Issues 2011
Understanding Zero Day Recovery - Your last defence against ransomware attacks
Review on Security Aspects for Cloud Architecture
2 21677 splunk_big_data_futureofsecurity
Prevention is futile in 2020 - Gartner Report in Retrospect
Big Data Dectives
IT Security Trends in 2012
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
Looking into the future of security
Ad

Similar to IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insurance Management System (20)

PDF
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
PPTX
Cloud security From Infrastructure to People-ware
PDF
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
PDF
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
PPTX
I am sharing 'Unit-2' with youuuuuu.PPTX
PDF
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
PDF
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
PDF
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
PPTX
Cybersecurity Risks for Businesses
PPTX
What every executive needs to know about information technology security
PPTX
Cyber Security Case Studies
PPTX
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
DOCX
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
DOCX
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
PDF
Cloud security law cyber insurance issues phx 2015 06 19 v1
PDF
Insights into cyber security and risk
 
PDF
Cyber Security
PPTX
Extending security in the cloud network box - v4
PPTX
3-UnitV_security.pptx
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
Cloud security From Infrastructure to People-ware
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
I am sharing 'Unit-2' with youuuuuu.PPTX
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
Cybersecurity Risks for Businesses
What every executive needs to know about information technology security
Cyber Security Case Studies
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
Cloud security law cyber insurance issues phx 2015 06 19 v1
Insights into cyber security and risk
 
Cyber Security
Extending security in the cloud network box - v4
3-UnitV_security.pptx
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
Categorization of Factors Affecting Classification Algorithms Selection
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PPTX
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
PDF
Abrasive, erosive and cavitation wear.pdf
PPTX
Management Information system : MIS-e-Business Systems.pptx
PDF
737-MAX_SRG.pdf student reference guides
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
August -2025_Top10 Read_Articles_ijait.pdf
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PPTX
introduction to high performance computing
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
CyberSecurity Mobile and Wireless Devices
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Categorization of Factors Affecting Classification Algorithms Selection
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
tack Data Structure with Array and Linked List Implementation, Push and Pop O...
Abrasive, erosive and cavitation wear.pdf
Management Information system : MIS-e-Business Systems.pptx
737-MAX_SRG.pdf student reference guides
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
August -2025_Top10 Read_Articles_ijait.pdf
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
introduction to high performance computing
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
distributed database system" (DDBS) is often used to refer to both the distri...
CyberSecurity Mobile and Wireless Devices
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...

IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insurance Management System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 520 Cloud-based Optimisation approach to Joint Cyber Security and Insurance Management System Sujatha E1, Vignesh D2, Gokula Krishnan P3, Siva M4 1,2,3,4 Department of Computer Science and Engineering, Velammal Institute of Technology, “Velammal Knowledge Park”, Panchetti, Thiruvallur, Tamilnadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract— The main aim of this paper is to combine the approach to security and cyber insurance provisioning in the cloud-based resources. In cloud computing, the paper deals with binding the security and Insurance Management System (IMS). When a hacker attacks the application deployed in a cloud and tries to inject any malicious code into the application, the proposed system detects the attack and analyze the amount of data lost during that attack.Duringthe estimation process, the quantity of breacheddataiscalculated and sent directly to both the cloud user and Insurance Management System. So that the Insurance Management System can repay the compensation amount immediately to the cloud user with respect to the insurance package subscribed by the user, this activity is done after theattackhas been detected and resulted in data breach. If suppose the amount of data breached is huge, then the system ask the cloud user to upgrade their insurance package. Keywords— SECaaS, Intrusion Detection System, Subscription Management Process (SMP), Insurance Management Process (IMP). I. Introduction In this paper, a joint approach to security and cyber insurance planning in the cloud is proposed. Using a probability optimization, a method of arranging both services in the surface of unpredictabilityconcerningsuchas future pricing, incoming traffic, and cyber attacks. Thus, an operation may protect against strikes by provisioning security services from providerslikeAvast andTrendMicro. These services may take various forms, such as secure data storage, identity management, and intrusion detection services to screen incoming traffic. And thencyberinsurance is used to provide explicit cover in the event that malicious activity leads to financial loss. Insurance coverage may be first-party or third-party with such asthieveryofmoneyand digital assets, business interruption, and cyber extortion, privacy breaches. II. Existing System In the previous systems have been maintaining the security services only. So service should be protecting the user system and information. Sometimes may hacker attack the user assets and data likeincidents and disasters suchasdata breach, data corruption, and business interruption? However, one lucrative attack can bring about the data loss and credit millions of dollars. In the case of successive malware attack, the data breached iscalculated and sent to the insurance system by theuser.So loss will be uncertain. We cannot assume that damages can be accurately determined. This may be in various forms, such as a 'ransom' paid. It is important to stabilize provisioning of security and insurance, even when future costs and risks are undetermined. One of the vital challengesin cyber insuranceistheauthentic evaluation of ruins generated by cyber attacks. III. Proposed System In this paper, SECaaS in firewall-style isproposed to provide security strategy imposition and supervising the network traffic infrastructure. This focuses on network traffic analysis like IDS (Intrusion Detection System) implementations to identify attack behaviors. And the relationship between cyber insurance and SECaaS provisioning, containing a customer who uses applications, which receive Internet traffic in the form of packets. These packets are scanned by services from SECaaS providers, provisioned by a Subscription Management Process (SMP). In the event that harmful packets elude security, cyber insurers, subscribed to by an insurance management process(IMP), provide compensation for damagesincurred. In this application run on customer machine that weassume to be Internet-accessible, either on a cloud service such as Amazon. Applications receive data packets in accordance with their operating purpose, e.g. email data or financial transactions. Legitimate packets are called safe packets, while packets used in cyber attacks are called unsafe packets. Unsafe packets are deemed handled if they are correctly detected by security services, or unhandled if they are not successfully processed (for example if they are undetected). These unhandled packets will cause damage, which incurs costs to the customer will refund the amount to the insurance company. And then IMP will refund the particular data cost to the customer.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 521 Fig.1: Architecture Diagram A. Purchase the Security services In this module user first register the cloud site and provides user details (Name, password, email, mobile,DOB).And then login using the user credentials. Once username and password are valid, then screen of the user’s profile will be displayed. After login, user will purchase the outsource security service in the cloud. In the security services have a various control and price, validity. Fig.2: The user will choose their system performance based services and then immediately transfer amount to security management. Once got the service, the security service will protect the customer application and system to particular time periods. Fig 3: B. Cloud service In this module, the user registers the cloud service based on given user credential details and then log in the cloud resource. Once the user enters the cloud site or application, Say suppose, if their application may be a social network to chat with their friends. The user can upload theirpicturesto the social networking site. Fig.4: While uploading, the user provides tags for the picture. Meanwhile the cloud security systemwilldefendthe application to each and every demand to cloud as a process of securing the cloud-based data. Fig.5:
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 522 Fig.6: C. Screening Data traffic In our security model, services are managedbythecustomer applications and then monitor the traffic flow and screening incoming data packets in accordance with their operating purpose, e.g. email data or financial transactions, webpages. Legitimate packets are called safe packets, while packets used in cyber attacks are called unsafe packets. Unsafe packets are managed only if those unsafe packetsare rightly identified by security services, or unhandled if they are not successfully processed (for example if they are undetected). These unhandled packets will cause damage, which incurs costs to the customer. So SECaaS will note on user packet size, and the service will redirect to Insurance Management Process (IMP). D. Claim Insurance In this module, IMP will check the user if customer or not. And then check the customer current premium data and evaluate the current unhandled data size to calculate the particular per-packet, price, duration, and a maximum number of packets affected. A partial Lagrange multiplier algorithm is proposed to find the optimal solution in parameter change for calculating the amount of data. And then refund the amount to the particular customer. After the claim, the customer current premium is low to change the new future premium basedon incoming unsafe packets. The price for insurance purchased in advance is chargedata rate known as a 'future premium'. The IMP purchases insurance policies, which include the premium,typesofrisks covered indemnity value, and policy duration. IV. Conclusion This paper express the trust between the user andinsurance management system and the compensation amount in accordance with the insurance subscribed by the user is provided to the user equivalent to the exact data that have been breached in very quick time. Though modern technology has improved so much, security is still a concern for cloud. Even though the security threats by cloud administration are feasible and critical, cloud service providersare concerned about security threat fromexternal attacks rather than internal attacks. This project has presented cloud system architecture in such a way that the current security issues are removed and the cloudsecurityis enhanced. REFERENCE [1] McAfee, “Net Losses: Estimating the Global Cost of Cybercrime,”Centre for Strategic and International Studies,Economic Impact of Cybercrime II, Jun. 2017. [2] L. Zeng, B. Veeravalli, and X. Li, “Saba: A security-aware and budget-aware workflow scheduling strategy in clouds,”Journal of Parallel and Distributed Computing, vol. 75,2016. [3] A. A. Waskita, H. Suhartanto, P. D. Persadha, and L. T. Handoko,“A simple statistical analysis approach for intrusion detection system,” CoRR, vol. abs/1405.7268, 2016. [4] S. Chaisiri, R. K. L. Ko, and D. Niyato, “A joint optimization approach to security-as-a-service allocation and cyber insurance management,” in Trustcom/BigDataSE/ISPA, 2015 IEEE, Aug 2016,pp. 426–433. [5] C. P. Ram and G. Sreenivaasan, “Security as a service (sass):Securing user data by coprocessor and distributing the data,” in Trendz in InformationSciences Computing(TISC2010), Dec 2015. [6] “Information technology – security techniques – information security management systems – requirements,” ISO/IEC 27001,Standard, Jan. 2015. [7] Y. Sun, S. Nanda, and T. Jaeger, “Security-as-a-servicefor microservices-based cloud applications,” in 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), Nov 2015,pp. 50– 57. [8] A survey on security issuesin service delivery modelsof cloud computing.S Subashini, V Kavitha - Journal of network and computer applications, 2011. [9] A survey of Cloud Computing Security challenges and solutions. Nidal Hassan Hussein, Ahmed Khalid. International Journal of Computer Science and Information Security (IJCSIS), 2016. [10] Software as a Service (SaaS): Security issues and Solutions. Navneet Singh Patell, Prof. Rekha B.S.2014.