{"id":3119,"date":"2019-09-17T08:57:05","date_gmt":"2019-09-17T08:57:05","guid":{"rendered":"https:\/\/www.gyanvihar.org\/journals\/?p=3119"},"modified":"2019-09-17T10:02:27","modified_gmt":"2019-09-17T10:02:27","slug":"cloud-computing-security-issue-and-its-proposed-solution","status":"publish","type":"post","link":"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/","title":{"rendered":"Cloud Computing Security Issue and Its Proposed Solution"},"content":{"rendered":"<p style=\"text-align: justify\">Cloud Computing Security Issue and Its Proposed Solution<br \/>\nRajni Kumari , M.Tech Research Scholar ,Center of Cloud Infrastructure and Security,<br \/>\nSuresh Gyan Vihar University , Jaipur , Rajasthan.<br \/>\nE-mail-: rmanushendra@gmail.com<br \/>\nDr. Manish Sharma , HOD, Center of Cloud Infrastructure and Security, Suresh Gyan<br \/>\nVihar University , Jaipur , Rajasthan.<br \/>\nE-mail-: manish.sharma@mygyanvihar.com.<br \/>\nDr. Rashid Hussian, Associate Prof., Electronic and communication, Suresh Gyan<br \/>\nVihar University, Jaipur, Rajasthan.<br \/>\nE-mail-: rashid.hussian@mygyanvihar.com.<br \/>\nAbstract<br \/>\nKeywords: Cloud Computing, cloud storage and cloud security.<br \/>\nIn Recent time, cloud computing drastically change the view of IT infrastructure such as hard-disk, RAM, Software and storage etc. and also perception of everyone. Amazon ,IBM, Google\u2019s Application, Microsoft Azure etc., are the provider of cloud service Provider that provide the developing Applications for client in cloud condition. Furthermore, to get to them from anyplace, any time. Cloud computing includes elements from parallel computing, utility computing, Fog Computing and grid computing and into an innovative deployment architecture in the virtual environment. The main purpose of this paper is identify the issue of cloud data storage and its solution.<\/p>\n<p style=\"text-align: justify\"><span style=\"font-size: 14pt\">1. Introduction<\/span><br \/>\n<span style=\"font-size: 14pt\">CLOUD COMPUTING: SECURITY ISSUES<\/span><br \/>\n<span style=\"font-size: 14pt\">1.1 CLOUD SERVICES<\/span><br \/>\nThere are different service model is offered by cloud: Programming as a Service, Infrastructure as a Service and Platform as a Service separately otherwise called SaaS, IaaS and PaaS. Every one of them have likewise various sorts of sending models, making it imperative to get that system of cloud computing is change. The main security concerns, however, keep on the same<br \/>\nIn addition to, with data storage security issues, the moving data over networks is also included by cloud service. The level of network security is required for it and file transfer encryption. The service user and the service provider have responsibility for this. The reliable and trustworthy networks is only chosen by user and use sufficiently secure password and username credentials. The service encryption must be assured by service provider and server-end security for the stored information.<\/p>\n<p style=\"text-align: justify\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3120 aligncenter\" src=\"https:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2019\/09\/Img1-1.png\" alt=\"\" width=\"487\" height=\"443\" \/><\/p>\n<p style=\"text-align: center\">Fig.1 Cloud Computing Model<\/p>\n<p style=\"text-align: justify\"><span style=\"font-size: 14pt\">1.2 KEY SECURITY ISSUES IN CLOUD COMPUTING<\/span><br \/>\nApplications, platforms and infrastructure segments are consist in cloud computing. Different products for businesses and individuals around the world have different offer by each segment. Programming as a Service (SaaS), Utility Computing, Web Services, Platform as a Service (PaaS), Service Commerce and Internet Integration are included by business application. Security issues for cloud computing is various are:<br \/>\nVirtual Machine Security<br \/>\nData Transmission<br \/>\nAccess to Servers &amp; Applications<br \/>\nNetwork Security<br \/>\nData Integrity<br \/>\nData Segregation<br \/>\nPatch management<br \/>\nData Privacy<br \/>\nData Security<br \/>\nData Availability<br \/>\nSecurity Policy and Compliance.<\/p>\n<p style=\"text-align: justify\"><span style=\"font-size: 14pt\">1.3 VIRTUAL MACHINE SECURITY:<\/span>One of the significant segments of a cloud is Virtualization. It is dynamic for example to past occasions, stopped and restarted could be slipped by, similarly effectively. Guaranteeing that on the equivalent physical machine different instances are running and remote from each other is a major task of virtualization. It can also be readily cloned and easily moved between physical servers. VM collapse makes it difficult to achieve and maintain reliable security by this dynamic nature and potential. Vulnerabilities that are found errors may be unintentionally propagated. Also, to maintain an auditable record is difficult of the security state at any given point of a virtual machine in time. There are two type of virtualization, one of them is full Virtualization and other is Para Virtualization in a cloud computing environment.<br \/>\nComplete hardware architecture of computer is replicated virtually in the full virtualization. However, it is modified so that it can be run parallel in para-virtualization with other operating systems. Abstracts the physical resources is abstracted by VMM (Virtual Machine Monitor) that is a product layer utilized by the various virtual machines. A virtual processor and other virtualized renditions of framework gadgets like I\/O gadgets, stockpiling, memory, and so forth are provided by VMM. In all popular VMMs many vulnerability are found that allow avoidance from Virtual machine. It could permit a visitor working framework client to execute code on the host or another visitor working framework by Vulnerability in Microsoft Virtual PC and Microsoft Virtual Server. It is find that vulnerability in VMware&#8217;s shared organizers component that awards clients of a visitor framework read and composes access to any piece of the host&#8217;s document framework including the framework envelope and other security-touchy records. Weakness in Metasploitable can be broken by clients of a visitor area to execute subjective directions. On host and visitor working frameworks is the other issue is the run of administrator. Current perfect isolation is not offered by VMM. We have taken virtual box of oracle and create A virtual machine of metasploitable and it is easily accessible by root user.<\/p>\n<p style=\"text-align: justify\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3123 aligncenter\" src=\"https:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2019\/09\/Img2-4.png\" alt=\"\" width=\"457\" height=\"346\" \/><\/p>\n<p style=\"text-align: center\">Fig 2: Virtual Box<\/p>\n<p style=\"text-align: justify\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-3124 aligncenter\" src=\"https:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2019\/09\/Img3-2.png\" alt=\"\" width=\"420\" height=\"282\" \/><\/p>\n<p style=\"text-align: center\">Fig 3: Virtual Machine<\/p>\n<p style=\"text-align: justify\"><span style=\"font-size: 14pt\">1.4 DATA SECURITY:<\/span><br \/>\nThe service ofcloud computing that offer for user is easy to find possible storage. Hypertext Transfer Protocol (HTTP) is communication protocol that is used to achieve the service of cloud computing. Data integrity and information security are assured by it, the most common adoption are Hypertext Transfer Protocol<br \/>\nSecure (HTTPS) and Secure Shell (SSH). In a Customaryon proof application organization model, the delicate information of every endeavor keeps on living inside the venture limit and is liable to its physical, legitimate and staff security and access control approaches. Notwithstanding, the undertaking information is put away outside the endeavor limit, at the Service supplier end in distributed computing. In this way, the specialist co-op must embrace extra security checks to guarantee information security and avoid gaps because of security vulnerabilities in the application or through malignant representatives. This includes the utilization of solid encryption procedures for information security and fine-grained approval to control access to information. Cloud specialist organizations, for example, Amazon, the Elastic Compute Cloud (EC2) overseers don&#8217;t approach client cases and can&#8217;t sign into the Guest OS. EC2 Administrators with a business need are required to utilize their individual cryptographically solid Secure Shell (SSH) keys to access a host. Every single such access are logged and routinely examined. While the information very still in Simple Storage Service (S3) isn&#8217;t scrambled of course, clients can encode their information before it is transferred to Amazon S3, so it isn&#8217;t gotten to or messed with by any unapproved party.<\/p>\n<p style=\"text-align: justify\">SOLUTIONS TO DATA SECURITY ISSUE<\/p>\n<p style=\"text-align: justify\">To secure information it is better solution to encryption. It is smarter to encode information before putting away information in cloud server. Authorization can be given by information proprietor to specific gathering part with the end goal that information can be effectively gotten to. Data access control is provided by data centric security. To improve the data security over cloud is design data security model that include data encryption, data integrity and authentication. Data protection can be used as a service for ensuring privacy. Applying encryption on data to avoid access of data from other users. Before uploading data into the cloud the users are recommended to verify whether the data is stored on backup drives and the keywords in files remain unchanged. The hash of the file is calculated before uploading to cloud servers will ensure that the data is not changed. It can be used for data integrity but it is very difficult to maintain it. To combining identity based cryptography and RSA Signature can be provided to check by RSA based data integrity. Both at the physical level and application level to keep apart data from different users and must be clear boundaries that ensure by SaaS. In cloud computing, Dispersed access control design can be utilized for access management.<\/p>\n<p style=\"text-align: justify\"><span style=\"font-size: 14pt\"><strong>Reference<\/strong><\/span><br \/>\n[1]. Data Security Challenges and Its Solutions in Cloud Computing R. Velumadhava Raoa,*, K. Selvamanib,* a Department of Computer Science &amp; Engineering, RIT, Chennai,indiab Department of Computer Science &amp;<br \/>\nEngineering, Anna University, Chennai, India<br \/>\n[2]. Future Generation Computer Systems Addressing cloud computing security issues, Dimitrios Zissis \u2217, Dimitrios<br \/>\nLekkas Department of Product and Systems Design Engineering, University of the Aegean, Syros 84100, Greece<br \/>\n[3]. State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions Farrukh Shahzada a King Fahd University of Petroleum and Minerals, Dhahran, KSA<br \/>\n[4]. A Study on Data Storage Security Issues in Cloud Computing Naresh vurukonda1, B.Thirumala Rao2 1,2Department of CSE, KLUniversity, Vijayawada, A.P, INDIA 1 naresh.vurukonda@gamil.com, 2 drbtrao@kluniversity.in<br \/>\n[5]. \u201cSecurity Guidance for Critical Areas of Focus in Cloud computing\u201d, April 2009, presented by Cloud Security Alliance (CSA).<br \/>\n[6]. Arijit Ukil, Debasish Jana and Ajanta De Sarkar\u201d A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE \u201cInternational Journal of Network Security &amp; Its Applications (IJNSA), Vol.5, No.5, September 20l3 l0.5l2l\/ijnsa.20l3.5502 ll.<br \/>\n[7]. Rabi Prasad Padhy, Manas Ranjan Patra and Suresh Chandra Satapathy ,\u201d Cloud Computing: Security Issues and<br \/>\nResearch Challenges\u201d, IRACST &#8211; International Journal of Computer Science and Information Technology &amp; Security<br \/>\n(IJCSITS) Vol. l, No.2, December 20l1.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud Computing Security Issue and Its Proposed Solution Rajni Kumari , M.Tech Research Scholar ,Center of Cloud Infrastructure and Security, Suresh Gyan Vihar University , Jaipur , Rajasthan. E-mail-: rmanushendra@gmail.com Dr. Manish Sharma , HOD, Center of Cloud Infrastructure and Security, Suresh Gyan Vihar University , Jaipur , Rajasthan. E-mail-: manish.sharma@mygyanvihar.com. Dr. Rashid Hussian, Associate [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[81],"tags":[],"class_list":["post-3119","post","type-post","status-publish","format-standard","hentry","category-volume-5-issue-1-2019-international-journal-of-converging-technologies-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>research journal - Research Journal<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Computing Security Issue and Its Proposed Solution - research journal\" \/>\n<meta property=\"og:description\" content=\"Cloud Computing Security Issue and Its Proposed Solution Rajni Kumari , M.Tech Research Scholar ,Center of Cloud Infrastructure and Security, Suresh Gyan Vihar University , Jaipur , Rajasthan. E-mail-: rmanushendra@gmail.com Dr. Manish Sharma , HOD, Center of Cloud Infrastructure and Security, Suresh Gyan Vihar University , Jaipur , Rajasthan. E-mail-: manish.sharma@mygyanvihar.com. Dr. Rashid Hussian, Associate [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/\" \/>\n<meta property=\"og:site_name\" content=\"research journal\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-17T08:57:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-17T10:02:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2019\/09\/Img1-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"487\" \/>\n\t<meta property=\"og:image:height\" content=\"443\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"gyanvihar3\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"gyanvihar3\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/\",\"name\":\"Cloud Computing Security Issue and Its Proposed Solution - research journal\",\"isPartOf\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2019\/09\/Img1-1.png\",\"datePublished\":\"2019-09-17T08:57:05+00:00\",\"dateModified\":\"2019-09-17T10:02:27+00:00\",\"author\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/0fee890b071b4083d5422be043bb99e9\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/#primaryimage\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2019\/09\/Img1-1.png\",\"contentUrl\":\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2019\/09\/Img1-1.png\",\"width\":487,\"height\":443},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.gyanvihar.org\/journals\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Computing Security Issue and Its Proposed Solution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#website\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/\",\"name\":\"research journal\",\"description\":\"Research Journal\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gyanvihar.org\/journals\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/0fee890b071b4083d5422be043bb99e9\",\"name\":\"gyanvihar3\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ea51e7e852346f1b6b7715e7b9b893df?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ea51e7e852346f1b6b7715e7b9b893df?s=96&d=mm&r=g\",\"caption\":\"gyanvihar3\"},\"url\":\"https:\/\/www.gyanvihar.org\/journals\/author\/gyanvihar3\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"research journal - Research Journal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Computing Security Issue and Its Proposed Solution - research journal","og_description":"Cloud Computing Security Issue and Its Proposed Solution Rajni Kumari , M.Tech Research Scholar ,Center of Cloud Infrastructure and Security, Suresh Gyan Vihar University , Jaipur , Rajasthan. E-mail-: rmanushendra@gmail.com Dr. Manish Sharma , HOD, Center of Cloud Infrastructure and Security, Suresh Gyan Vihar University , Jaipur , Rajasthan. E-mail-: manish.sharma@mygyanvihar.com. Dr. Rashid Hussian, Associate [&hellip;]","og_url":"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/","og_site_name":"research journal","article_published_time":"2019-09-17T08:57:05+00:00","article_modified_time":"2019-09-17T10:02:27+00:00","og_image":[{"width":487,"height":443,"url":"https:\/\/www.gyanvihar.org\/journals\/uploads\/2019\/09\/Img1-1.png","type":"image\/png"}],"author":"gyanvihar3","twitter_card":"summary_large_image","twitter_misc":{"Written by":"gyanvihar3","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/","url":"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/","name":"Cloud Computing Security Issue and Its Proposed Solution - research journal","isPartOf":{"@id":"https:\/\/www.gyanvihar.org\/journals\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/#primaryimage"},"image":{"@id":"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2019\/09\/Img1-1.png","datePublished":"2019-09-17T08:57:05+00:00","dateModified":"2019-09-17T10:02:27+00:00","author":{"@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/0fee890b071b4083d5422be043bb99e9"},"breadcrumb":{"@id":"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/#primaryimage","url":"https:\/\/www.gyanvihar.org\/journals\/uploads\/2019\/09\/Img1-1.png","contentUrl":"https:\/\/www.gyanvihar.org\/journals\/uploads\/2019\/09\/Img1-1.png","width":487,"height":443},{"@type":"BreadcrumbList","@id":"https:\/\/www.gyanvihar.org\/journals\/cloud-computing-security-issue-and-its-proposed-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gyanvihar.org\/journals\/"},{"@type":"ListItem","position":2,"name":"Cloud Computing Security Issue and Its Proposed Solution"}]},{"@type":"WebSite","@id":"https:\/\/www.gyanvihar.org\/journals\/#website","url":"https:\/\/www.gyanvihar.org\/journals\/","name":"research journal","description":"Research Journal","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gyanvihar.org\/journals\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/0fee890b071b4083d5422be043bb99e9","name":"gyanvihar3","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ea51e7e852346f1b6b7715e7b9b893df?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ea51e7e852346f1b6b7715e7b9b893df?s=96&d=mm&r=g","caption":"gyanvihar3"},"url":"https:\/\/www.gyanvihar.org\/journals\/author\/gyanvihar3\/"}]}},"_links":{"self":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/3119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/comments?post=3119"}],"version-history":[{"count":5,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/3119\/revisions"}],"predecessor-version":[{"id":3142,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/3119\/revisions\/3142"}],"wp:attachment":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/media?parent=3119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/categories?post=3119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/tags?post=3119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}