scholarly journals Secured Data Storage for RDPC Protocol with Enhanced TPA Auditing Scheme Using MHT in Cloud Computing

IJIREEICE ◽  
2014 ◽  
pp. 2173-2178
Author(s):  
MS.N. ELAMATHI ◽  
B. SELVANAYAGI
2021 ◽  
Vol 33 (6) ◽  
pp. 0-0

In the mobile cloud computing era, the sharing of secured large-scale data which have major challenges. From an existing quantum based security mechanism randomly chosen the photon detector which creates small length of qubits so it cannot provide much security in MCC also data storage in the cloud server doesn’t guarantees the lossless back up and data recovery as well attains more computation complex during secure access of stored data. Therefore to solve those issues a unique combination of the Trefoil Congruity framework is proposed which consist Quantum Key Fibo Privacy Approach (QKFPA) performing the quantum key generation for encrypt and decrypt the data with the aid of Fibonacci chain-slanting matrix. Based on that quantum key data is uploaded, then secured data should be stored, ultra-widely distributed data transfer mechanism does the scrambling with sorting the stored data by implementing novel HS-DRT technique that improves the lossless backup and recovery of data storage.


2021 ◽  
Vol 15 (1) ◽  
pp. 746-756
Author(s):  
Sindhe Phani Kumar ◽  
R. Anandan ◽  
Fairouz Tchier ◽  
G. Rajchakit ◽  
Choonkil Park ◽  
...  

2021 ◽  
Author(s):  
Dhanalakshmi P. ◽  
Rajarajeswari S ◽  
Nripendra Narayan Das ◽  
Karthikeyan C ◽  
L. Chandra Sekhar Reddy ◽  
...  

Abstract In the fast-developing technological world, a large number of informational data is obtained out of different software applications and hardware sources. Data storing, sharing of data, and then processing is more effective through the cloud computing method. In practice, the issue faced is a lack of security where the user details are leaked due to the exposure of software and hardware conflict. Among different data sharing technique, cloud computing is the most convenient method to be adapted due to service satisfying features and economy. Attribute-Based-Encryption (ABE) has the potential to detect even a narrow-drawn data sharing. The drawback of the conventional attribute-based encryption (ABE) poor data security and high over-head computation. The customer side satisfaction is not achieved because of security lacking in narrow-drawn informational data sharing as well as processing. The difficulty in achieving a standardized form of data sharing is an unsolved challenge for secured data processing. The attribute-based data sharing method is more effective for secured data processing in cloud computing. Customer satisfaction can be achieved through the secured services of cloud. The customer’s data should be secured and also the customer’s data is under an authorized access. The protection of data in cloud computing includes the usage of hardware solutions for a secured data operation, provides support in data storage, access, sharing, and automated detecting of risk during data processing.


2018 ◽  
Vol 3 (2) ◽  
pp. 74
Author(s):  
Helina Apriyani ◽  
Sismadi Sismadi ◽  
Sefrika Sefrika

AbstrakInternet of things (IoT) adalah sebuah konsep yang menghubungkan komputer dan perangkat elektronik melalui internet dan dapat dikendalikan dari jarak jauh. Konsep terpenting dalam Internet of things (Iot) adalah modul sistem informasi, koneksi internet dan penyimpanan datanya dalam cloud computing. Konsep ini memiliki manfaat besar dalam perkembangan usaha dan kelangsungan bisnis perusahaan dimana hampir semua bidang menggunakan IoT untuk dapat bersaing di pasaran. Indonesia merupakan sebuah negara yang dianugerahi kekayaan alam yang melimpah ruah. Salah satu komoditi unggulan adalah produk pertanian. Penelitian ini bertujuan untuk membantu para petani dalam memasarkan produknya melalui e-commerce dengan menggunakan konsep Internet of things IoT. Metode penelitian dengan menggunakan metode incremental.  Incremental digunakan untuk mendesai produk, kemudian  diimplementasikan, dan diuji secara bertahap (setiap modul akan ditambahkan bertahap) hingga produk selesai. Hasil penelitian ini digunakan untuk membantu petani di Kabupaten Bogor untuk mendistribusikan penjualannya secara luas, meningkatkan revenue dan memutus rantai panjang proses penjualan. Kata kunci— sistem penjualan, incremental, Internet of Things (IoT), produk pertanian, Kabupaten Bogor Abstract Internet of things (IoT) is a concept that connects computers and electronic devices via the internet and can be controlled remotely. The main concept in Internet of things (IoT) is information systems, internet connections and data storage in cloud computing. This concept has great benefits in the efforts and efforts used to use IoT to be able to compete in the market. Indonesia is a country that is blessed with abundant natural resources. One of the leading commodities is agricultural products. This study aims to help farmers market their products through e-commerce using the IoT Internet of things concept. Research method using incremental method. Incremental to design the product, then implemented, and gradually delay (each module will be added gradually) until the product is finished. The results of this study are to help farmers in Bogor Regency to distribute sales widely, increase revenue and break the sales process. Keywords—sales system, incremental, Internet of Things (IoT), agricultural products, Kabupaten Bogor


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


Sign in / Sign up

Export Citation Format

Share Document