scholarly journals Design and Implementation of Efficient Transmission of Cloud Data in Wireless Media

Author(s):  
Virendra Pandharipant Nikam ◽  
Sheetal S Dhande

Nowadays, information security is a challenge especially when transmitted or shared in public clouds. Many of researchers have been proposed technique which fails to provide data integrity, security, authentication and another issue related to sensitivity data. The most common techniques were used to protect data during transmission on public cloud are cryptography, steganography, and compression. The proposed scheme suggests an entirely new approach for data security on public cloud. Authors have suggested an entirely new approach that completely makes secret data invisible behind carrier object and it is not been detected with the image performance parameters like PSNR, MSE, entropy and others. The details of results are explain in result section of paper. Proposed technique have better outcome than any other existing technique as a security mechanism on a public cloud. Primary focus of suggested approach is to minimize integrity loss of public storage data due to unrestricted access rights by uses. To improve reusability of carrier even after data concealed is really a challenging task and achieved through suggested approach.

Author(s):  
Yong Yu ◽  
Yannan Li ◽  
Man Ho Au ◽  
Willy Susilo ◽  
Kim-Kwang Raymond Choo ◽  
...  

2015 ◽  
Vol 799-800 ◽  
pp. 1132-1136 ◽  
Author(s):  
Nurlan Mukataev ◽  
Mamyrbek Beisenbi

The current article introduces a new method of construction of control systems for objects with uncertain parameters in the form of three-parameter structurally stable mappings from the theory of catastrophe, allowing to synthesize the highly effective control systems, which demonstrate the extremely wide range of robust stability. The research of robust stability of control systems is based on a new approach to post-rhenium of the A.M Lyapunov’s functions. The method of creation of control system with the increased potential of robust stability is stated. It could be concluded that the application of the suggested approach may assure asymptotically stable invariant states for the system in both negative and positive regions of variations of uncertain parameters.


2018 ◽  
Vol 7 (3.1) ◽  
pp. 128
Author(s):  
Selvam L ◽  
Arokia Renjit J

Recent security incidents on public cloud data storage had raised concerns on cloud data security. Development in the hacking area has risen in the past few years. Due to this, Cyber Security is needed which plays an important role to cover the secret information. Currently, the attack of challenging channel is both the symmetric as well as the asymmetric encryption algorithm. Since, in both criteria the secret key has to be transmitting through a security challenging channel. For this many techniques have been put forward. The Main focus is on the vulnerabilities of the private keys while hoarded in different places for the fast utilization of the round key of the AES algorithm. In the view of the hackers, extracting the private key is nearly as same as obtaining the plain text itself. So, the honey encryption technique is used to futile the attacker by producing the fake key for each and every try of the Key puncher. An indication will be generated automatically to the storage manager when an attempt is made by the attacker. The Honey encryption is the best algorithm to overcome the drawbacks of the AES algorithm but it has some time constraints which are also eliminated here. Thus, eliminating the Brute Force Attack and providing a secure system for storing the secret key.  


In the future generation would development of new technologies, such as cloud computing, Internet of things (IOT), used in the medical field from concept to practice. Health care medical field is the major import role in cloud computing. The E-medical record contains the Healthcare providers HIS, but its deployment process slow due to high cost and high maintenance cost. In this paper study, electronic medic records with cloudbased security and access rights. In the cloud data ware house contained for all hospital patients details. Cloud middleware gives a platform for electronic healthcare system. It is provides to secure access the medical health record only authorized users and avoid unauthorized user. In this paper, proposed cloud computing design, which enables the secure and collaborative Emedical records among the all the hospitals with case of access rights.


Sign in / Sign up

Export Citation Format

Share Document