Distributed Multi Cloud Storage System to Improve Data Security with Hybrid Encryption

Author(s):  
Sayed Uz Zaman ◽  
Rezaul Karim ◽  
Mohammad Shamsul Arefin ◽  
Yasuhiko Morimoto
Author(s):  
Lu Shen ◽  
Shifang Feng ◽  
Jinjin Sun ◽  
Zhongwei Li ◽  
Gang Wang ◽  
...  

2013 ◽  
Vol 834-836 ◽  
pp. 1795-1798
Author(s):  
Jun Qin ◽  
Ya Ping Zhang ◽  
Ping Zong

In cloud computing applications, the data security is a primary concern of user. In this paper, for the problem that data of the HDFS cannot be destroyed completely in open source cloud storage system, which may lead to data leakage, it designs a destruction mechanism of HDFS with multiple security level. This mechanism make data effectively destroyed by the method of data overwrite which makes a balance between security requirements and performance requirements. The Simulation experiments show that the mechanism can override a Block file in HDFS environment effectively to achieve the purpose of data destroying. At the same the overhead of different overwrite algorithm is different also which can ensure the security and efficiency is balanced.


2020 ◽  
Vol 17 (9) ◽  
pp. 3979-3982
Author(s):  
N. Harish Kumar ◽  
G. Deepak

Internet of Things has been increasing its usage and recognition in vast sectors like Defence, Business, Industries, and Hospitals. The data disruption is strictly unacceptable in a number of these sectors because it could end up in serious Loss or Damages to the entire system. As of now, IOT is using a central cloud storage system for information storage and transactions. However, some examples already verified that Central cloud storage information might be hacked and changed by the specialists. This paper presents an IoT system having localized block chain storage which works on real time data and manipulates with narrowness of data interruption and modification and its recovery.


2014 ◽  
Vol 556-562 ◽  
pp. 5591-5596
Author(s):  
Yi Jie Fan ◽  
Zhen Qiao ◽  
Ming Zhong Xiao

We present a cross-cloud storage architecture that protects both user’s data and privacy from cloud providers or potential adversaries by leveraging the concept of Oblivious RAM on a logical layer. Our architecture allows users to conceal reading/writing operations and access sequences from clouds in order to prevent the leakage of access patterns, which may be a threat to data security. In addition, an anonymity preserving mechanism applied in our architecture makes it difficult to track users' data or confirm users' identities, which can effectively protect users' privacy. One Cloud, the proof-of-concept prototype of our architecture integrates four major cloud storage services and implements all key techniques we proposed in our architecture. We deploy it in a real-world network environment to analyze and evaluate the performance and the scalability of our architecture.


Sign in / Sign up

Export Citation Format

Share Document