scholarly journals Biometric Based User Authentication and Privacy Preserving In Cloud Environment

Author(s):  
Jaichandran R , Et. al.

Cloud technology provides advantage of storage services for individuals and organizations thus making file access easy and simple irrespective of location. The major concern is the security while the file is been outsourced. Maintaining integrity, file unchanged, gaining confidentiality during file outsourced plays an important role. In this paper, we propose identity based data outsourcing technique to provide data security during authorization and storage. For data authorization we propose finger print based authentication. The fingerprint based authentication is performed using Minutae Map algorithm (MM). For data security we convert the data owner files to hash values using SHA algorithm. Finally in the cloud storage stage, data security and data availability is addressed using multiple cloud storage system. 

2018 ◽  
Vol 7 (2.32) ◽  
pp. 315
Author(s):  
V Naresh ◽  
M Anudeep ◽  
M Saipraneeth ◽  
A Saikumar Reddy ◽  
V Navya

The cloud stockpiling framework, comprising of capacity servers, gives long haul stockpiling administrations on the Internet. Maintaining the data in the cloud computing of third parties generates: serious concern about the confidentiality of data and the reduction of data management costs. Nonetheless, we should give security certifications to outside information. We plan and actualize a protected cloud stockpiling framework that gives secure, secure and available record security for document administration and secure information exchange. It includes foreign files with a file access policy, possibly deleting files, to avoid being denied to anyone with a file access policy. To achieve these security objectives, a set of password keys is implemented that maintain a host (s) or head (s) separately. We offer a twofold edge intermediary coding plan and incorporate it with a decentralized disposal code, which is detailed with a safely Cloud storage framework. The Cloud storage system not only provides a secure and stable search and storage of data, but also allows the user to transfer their data to the user of the backup to another user without the data being returned.  


Author(s):  
Yogesh M Gajmal ◽  
R. Udayakumar

Access control is a major factor in enhancing data security in the cloud storage system. However, the existing data sharing and the access control method have privacy data leakage and key abuse, which is a major challenge in the research community. Therefore, an effective method named Blockchain-based access control and data sharing approach is developed in the cloud storage system to increase data security. The proposed Blockchain-based access control and data sharing approach effectively solve single-point failure in the cloud system. It provides more benefits by increasing the throughput and reducing the cost. The Data user (DU) makes the registration request using the ID and password and forwards it to the Data Owner (DO), which processes the request and authenticates the Data user. The information of the data owner is embedded in the transactional blockchain using the encrypted master key. The Data owner achieves the data encryption process, and encrypted files are uploaded to the Interplanetary File System (IPFS). Based on the encrypted file location and encrypted key, the Data owner generates the ciphertext metadata and is embedded in the transactional blockchain. The proposed Blockchain-based access control and data sharing approach achieved better performance using the metrics, like a better genuine user detection rate of 95% and lower responsiveness of 25sec with the blockchain of 100 sizes.


2018 ◽  
Vol 10 (2) ◽  
pp. 70-89 ◽  
Author(s):  
Jun Li ◽  
Mengshu Hou

This article describes how in order to reduce the amount of data, deduplication technology is introduced in the cloud storage. Adopting this technology, the duplicated data can be eliminated, users can conserve the storage requirement. However, deduplication technology also increases the data unavailability. To solve this problem, the authors propose a method to improve data availability in the deduplication storage system. It is based on the data chunk reference count and access frequency, and increases redundant information for the data chunks, to ensure data availability and minimize storage overhead. Extensive experiments are conducted to evaluate effectiveness of the improved method. WFD, CDC, and sliding block deduplication technology are used for comparison. The experimental results show that the proposed method can achieve higher data availability than the conventional method and increase little storage overhead.


2013 ◽  
Vol 834-836 ◽  
pp. 1795-1798
Author(s):  
Jun Qin ◽  
Ya Ping Zhang ◽  
Ping Zong

In cloud computing applications, the data security is a primary concern of user. In this paper, for the problem that data of the HDFS cannot be destroyed completely in open source cloud storage system, which may lead to data leakage, it designs a destruction mechanism of HDFS with multiple security level. This mechanism make data effectively destroyed by the method of data overwrite which makes a balance between security requirements and performance requirements. The Simulation experiments show that the mechanism can override a Block file in HDFS environment effectively to achieve the purpose of data destroying. At the same the overhead of different overwrite algorithm is different also which can ensure the security and efficiency is balanced.


2020 ◽  
Vol 17 (9) ◽  
pp. 3979-3982
Author(s):  
N. Harish Kumar ◽  
G. Deepak

Internet of Things has been increasing its usage and recognition in vast sectors like Defence, Business, Industries, and Hospitals. The data disruption is strictly unacceptable in a number of these sectors because it could end up in serious Loss or Damages to the entire system. As of now, IOT is using a central cloud storage system for information storage and transactions. However, some examples already verified that Central cloud storage information might be hacked and changed by the specialists. This paper presents an IoT system having localized block chain storage which works on real time data and manipulates with narrowness of data interruption and modification and its recovery.


2013 ◽  
pp. 542-558
Author(s):  
Vincenzo Daniele Cunsolo ◽  
Salvatore Distefano ◽  
Antonio Puliafito ◽  
Marco Scarpa

In grid computing infrastructures, the data storage subsystem is physically distributed among several nodes and logically shared among several users. This highlights the necessity of: (i) Availability for authorized users only, (ii) Confidentiality, and (iii) Integrity of information and data: in one term security. In this work we face the problem of data security in grid, by proposing a lightweight cryptography algorithm combining the strong and highly secure asymmetric cryptography technique (RSA) with the symmetric cryptography (Advanced Encryption Standard, AES). The proposed algorithm, we named Grid Secure Storage System (GS3), has been implemented on top of the Grid File Access Library (GFAL) of the gLite middleware, in order to provide a file system service with cryptography capability and POSIX interface. The choice of implementing GS3 as a file system allows to protect also the file system structure, and moreover to overcome the well-known problem of file rewriting in gLite/GFAL environments. This chapter describes and details both the GS3 algorithm and its implementation, also evaluating the performance of such implementation and discussing the obtained results.


Sign in / Sign up

Export Citation Format

Share Document