Design and implementation of an efficient multi cloud storage approach for resource constrained mobile devices

2017 ◽  
Vol 22 (S6) ◽  
pp. 13143-13157 ◽  
Author(s):  
Rajeev Kumar Bedi ◽  
Jaswinder Singh ◽  
Sunil Kumar Gupta
2016 ◽  
Vol 8 ◽  
pp. 279-282 ◽  
Author(s):  
Rajeev Kumar Bedi ◽  
Jaswinder Singh ◽  
Sunil Kumar Gupta

2018 ◽  
Vol 12 (3) ◽  
pp. 216
Author(s):  
Rajeev Kumar Bedi ◽  
Jaswinder Singh ◽  
Sunil Kumar Gupta

Author(s):  
Rajeev Kumar Bedi ◽  
Jaswinder Singh ◽  
Sunil Kumar Gupta

Regardless of high embracing rate among users, Multi Cloud Storage Systems for mobile devices still have many limitations. From recent studies, it is clear that multi cloud storage systems work well for desktop PCs where there is no resource limitation but when accessed on mobile devices, these systems consumed a lot of resources of the mobile device. In this article, the authors reviewed three multi cloud storage systems for mobile devices ES File Explorer, Mult Cloud, Otixo and evaluate their performance on the basis of parameters Battery Consumption, CPU Usage, and Data Usage on Jio-Fi network using two mobile devices Micromax Canvas E352 and Redmi Note 4. Then, the authors propose an approach for multi cloud storage for mobile devices that will remove the limitations of previously discussed systems.


Author(s):  
Jaswinder Singh ◽  
Sunil Kumar Gupta ◽  
Rajeev Kumar Bedi

Author(s):  
Leonel Moyou Metcheka ◽  
René Ndoundam

AbstractClassical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed steganography by fragmenting the secret message and embedding each secret piece into a distinct cover media. The major interest of this approach is to make the secret message detection extremely difficult. However, these file modifications leave fingerprints which can reveal a secret channel to an attacker. Our contribution is a new steganography paradigm transparent to any attacker and resistant to the detection and the secret extraction. Two properties contribute to achieve these goals: the files do not undergo any modification while the distribution of the secret in the multi-cloud storage environment allows us to hide the existence of the covert channel between the communicating parties. Information’s are usually hidden inside the cover media. In this work, the covert media is a pointer to information. Therefore the file carries the information without being modified and the only way to access it is to have the key. Experiments show interesting comparison results with remarkable security contributions. The work can be seen as a new open direction for further research in the field.


Sign in / Sign up

Export Citation Format

Share Document