Efficient data security method to control data in cloud storage system using cryptographic techniques

Author(s):  
Prakash G L ◽  
Manish Prateek ◽  
Inder Singh
2013 ◽  
Vol 834-836 ◽  
pp. 1795-1798
Author(s):  
Jun Qin ◽  
Ya Ping Zhang ◽  
Ping Zong

In cloud computing applications, the data security is a primary concern of user. In this paper, for the problem that data of the HDFS cannot be destroyed completely in open source cloud storage system, which may lead to data leakage, it designs a destruction mechanism of HDFS with multiple security level. This mechanism make data effectively destroyed by the method of data overwrite which makes a balance between security requirements and performance requirements. The Simulation experiments show that the mechanism can override a Block file in HDFS environment effectively to achieve the purpose of data destroying. At the same the overhead of different overwrite algorithm is different also which can ensure the security and efficiency is balanced.


2020 ◽  
Vol 17 (9) ◽  
pp. 3979-3982
Author(s):  
N. Harish Kumar ◽  
G. Deepak

Internet of Things has been increasing its usage and recognition in vast sectors like Defence, Business, Industries, and Hospitals. The data disruption is strictly unacceptable in a number of these sectors because it could end up in serious Loss or Damages to the entire system. As of now, IOT is using a central cloud storage system for information storage and transactions. However, some examples already verified that Central cloud storage information might be hacked and changed by the specialists. This paper presents an IoT system having localized block chain storage which works on real time data and manipulates with narrowness of data interruption and modification and its recovery.


2016 ◽  
Vol 65 (6) ◽  
pp. 1992-2004 ◽  
Author(s):  
Joseph K. Liu ◽  
Kaitai Liang ◽  
Willy Susilo ◽  
Jianghua Liu ◽  
Yang Xiang

Sign in / Sign up

Export Citation Format

Share Document