UBackup-II: A QoS-Aware Anonymous Multi-cloud Storage System

Author(s):  
Kai Guo ◽  
Pengyan Shen ◽  
Mingzhong Xiao ◽  
Quanqing Xu
Author(s):  
Lu Shen ◽  
Shifang Feng ◽  
Jinjin Sun ◽  
Zhongwei Li ◽  
Gang Wang ◽  
...  

2016 ◽  
Vol E99.D (8) ◽  
pp. 2036-2043 ◽  
Author(s):  
Lu SHEN ◽  
Shifang FENG ◽  
Jinjin SUN ◽  
Zhongwei LI ◽  
Ming SU ◽  
...  

Multicloud is one such aspect which is considered as the vision of the future. It includes distribution of data for the user automatically by means of cloud storage providers (CSPs) which in turn provides a considerable degree of control over information leakage. Due to the process of unplanned distribution of data chunks will result in disposing the crucial information while using multiple clouds. A storage system named Storesim is introduced in Multicloud to store syntactically relevant data on the assigned cloud, thereby limiting the intensity of leakage of information across those clouds. During this survey it has been identified that few CSP’s of some Multicloud services got compromised under coercion. In this paper, we made use of the Ultramodern Encryption Standard (UES) into storesim thereby avoiding unauthorized access to the information present in the Multicloud ensuring better level of security to CSP’s implicating reduced information leakage


Author(s):  
Leonel Moyou Metcheka ◽  
René Ndoundam

AbstractClassical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed steganography by fragmenting the secret message and embedding each secret piece into a distinct cover media. The major interest of this approach is to make the secret message detection extremely difficult. However, these file modifications leave fingerprints which can reveal a secret channel to an attacker. Our contribution is a new steganography paradigm transparent to any attacker and resistant to the detection and the secret extraction. Two properties contribute to achieve these goals: the files do not undergo any modification while the distribution of the secret in the multi-cloud storage environment allows us to hide the existence of the covert channel between the communicating parties. Information’s are usually hidden inside the cover media. In this work, the covert media is a pointer to information. Therefore the file carries the information without being modified and the only way to access it is to have the key. Experiments show interesting comparison results with remarkable security contributions. The work can be seen as a new open direction for further research in the field.


Sign in / Sign up

Export Citation Format

Share Document