A New Block-Based Data Distribution Mechanism in Cloud Computing

Author(s):  
Chandrima Dadi ◽  
Ping Yi ◽  
Zongming Fei ◽  
Hui Lu

2016 ◽  
pp. 1752-1776
Author(s):  
Min Yoon ◽  
Hyeong-il Kim ◽  
Miyoung Jang ◽  
Jae-Woo Chang

Because much interest in spatial database for cloud computing has been attracted, studies on preserving location data privacy have been actively done. However, since the existing spatial transformation schemes are weak to a proximity attack, they cannot preserve the privacy of users who enjoy location-based services in the cloud computing. Therefore, a transformation scheme is required for providing a safe service to users. We, in this chapter, propose a new transformation scheme based on a line symmetric transformation (LST). The proposed scheme performs both LST-based data distribution and error injection transformation for preventing a proximity attack effectively. Finally, we show from our performance analysis that the proposed scheme greatly reduces the success rate of the proximity attack while performing the spatial transformation in an efficient way.



Author(s):  
Wei Zhang ◽  
Huiling Shi ◽  
Xinming Lu ◽  
Longquan Zhou

With the development of information technology, more and more people use multimedia conference system to communicate or work across regions. In this article, an ultra-reliable and low-latency solution based on Deep Learning and assisted by Cloud Computing for multimedia conference system, called UCCMCS, is designed and implemented. In UCCMCS, there are two-tiers in its data distribution structure which combines the advantages of cloud computing. And according to the requirements of ultra-reliability and low-latency, a bandwidth optimization model is proposed to improve the transmission efficiency of multimedia data so as to reduce the delay of the system. In order to improve the reliability of data distribution, the help of cloud computing node is used to carry out the retransmission of lost data. the experimental results show UCCMCS could improve the reliability and reduce the latency of the multimedia data distribution in multimedia conference system.



2014 ◽  
Vol 10 (4) ◽  
pp. 26-49 ◽  
Author(s):  
Min Yoon ◽  
Hyeong-il Kim ◽  
Miyoung Jang ◽  
Jae-Woo Chang

Because much interest in spatial database for cloud computing has been attracted, studies on preserving location data privacy have been actively done. However, since the existing spatial transformation schemes are weak to a proximity attack, they cannot preserve the privacy of users who enjoy location-based services in the cloud computing. Therefore, a transformation scheme is required for providing a safe service to users. We, in this paper, propose a new transformation scheme based on a line symmetric transformation (LST). The proposed scheme performs both LST-based data distribution and error injection transformation for preventing a proximity attack effectively. Finally, we show from our performance analysis that the proposed scheme greatly reduces the success rate of the proximity attack while performing the spatial transformation in an efficient way.



The objective of the research work is focused on cloud computing which is a developing design to give secure change among continuous applications. Secure information sharing is characterized as transmission of at least one documents profitably this procedure is utilized to share data's, characteristics, records among different clients and associations in secure mode and verifies from outsider clients. Usually it is finished by encryption and unscrambling process over private system. This kind of information sharing is finished by new innovation of key cipher text KC-ABE. It can give secure record transmission by having confined access innovation. This developing procedure has been checked in tolerant individual wellbeing record upkeep. These documents are recorded and recovered safely without access by unapproved clients. KC-ABE encryption framework is material to produce for adaptable and secure sharing of information's in distributed computing, which will reinforcement persistent wellbeing creating records in increasingly defensive manner. In KC-ABE strategy, the subtleties of patient are put away in KC-ABE server farm. In KC-ABE, Key backer just legitimize the entrance control and can't issue by the encryption. Along these lines the relating tolerant just reserve the options to get to this KC-ABE innovation. It gives more secure information sharing than other encryption framework. The fundamental utilization of this technique are High key age time and encryption time. It can accomplish less encryption time and key age time to improve productivity of KC-ABE.



The cloud computing provides convenient ondemand access of the data. Sharing of data in the cloud computing will enable several users to easily handle the data that is being shared. The medical-field finds more advantages by the cloud-computing technology as the data can be accessed anywhere and anytime by the patients as well as this data can be shared with other medical-practitioners. This alarms for the security issues as the huge amount of sensitive data is being shared. The data must not be available to malicious-attackers. In this paper, we propose the block-design based key agreement protocol in order to share the data securely and the design provides fault-detection and fault-tolerance. The group-data model PSM is given with the block-based design, which decides how the sharing of the data is done by grouping and giving positions to users in particular blocks and the column. The design is proposed in our paper, which gives the technique for positioning of the users. The encryption and decryption of data is done and their times cost according to file size is found. The comparison of the time-cost for our model and existing models is compared with respect to different number of simulations.





Sign in / Sign up

Export Citation Format

Share Document