scholarly journals Attribute Based Collusion Resistant Controlled Secure Data Processing System Using Node Insertion Method

Author(s):  
Dhanalakshmi P. ◽  
Rajarajeswari S ◽  
Nripendra Narayan Das ◽  
Karthikeyan C ◽  
L. Chandra Sekhar Reddy ◽  
...  

Abstract In the fast-developing technological world, a large number of informational data is obtained out of different software applications and hardware sources. Data storing, sharing of data, and then processing is more effective through the cloud computing method. In practice, the issue faced is a lack of security where the user details are leaked due to the exposure of software and hardware conflict. Among different data sharing technique, cloud computing is the most convenient method to be adapted due to service satisfying features and economy. Attribute-Based-Encryption (ABE) has the potential to detect even a narrow-drawn data sharing. The drawback of the conventional attribute-based encryption (ABE) poor data security and high over-head computation. The customer side satisfaction is not achieved because of security lacking in narrow-drawn informational data sharing as well as processing. The difficulty in achieving a standardized form of data sharing is an unsolved challenge for secured data processing. The attribute-based data sharing method is more effective for secured data processing in cloud computing. Customer satisfaction can be achieved through the secured services of cloud. The customer’s data should be secured and also the customer’s data is under an authorized access. The protection of data in cloud computing includes the usage of hardware solutions for a secured data operation, provides support in data storage, access, sharing, and automated detecting of risk during data processing.

2014 ◽  
Vol 556-562 ◽  
pp. 6302-6306 ◽  
Author(s):  
Chun Mei Duan

In allusion to limitations of traditional data processing technology in big data processing, big data processing system architecture based on hadoop is designed, using the characteristics of quantification, unstructured and dynamic of cloud computing.It uses HDFS be responsible for big data storage, and uses MapReduce be responsible for big data calculation and uses Hbase as unstructured data storage database, at the same time a system of storage and cloud computing security model are designed, in order to implement efficient storage, management, and retrieval of data,thus it can save construction cost, and guarantee system stability, reliability and security.


2012 ◽  
Vol 4 (2) ◽  
pp. 28-48 ◽  
Author(s):  
George Grispos ◽  
Tim Storer ◽  
William Bradley Glisson

Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy, and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. This development has significant implications for digital forensic investigators, equipment vendors, law enforcement, as well as corporate compliance and audit departments, amongst other organizations. Much of digital forensic practice assumes careful control and management of IT assets (particularly data storage) during the conduct of an investigation. This paper summarises the key aspects of cloud computing and analyses how established digital forensic procedures will be invalidated in this new environment, as well as discussing and identifying several new research challenges addressing this changing context.


2018 ◽  
Vol 8 (12) ◽  
pp. 2519
Author(s):  
Wei Li ◽  
Wei Ni ◽  
Dongxi Liu ◽  
Ren Liu ◽  
Shoushan Luo

With the rapid development of cloud computing, it is playing an increasingly important role in data sharing. Meanwhile, attribute-based encryption (ABE) has been an effective way to share data securely in cloud computing. In real circumstances, there is often a mutual access sub-policy in different providers’ access policies, and the significance of each attribute is usual diverse. In this paper, a secure and efficient data-sharing scheme in cloud computing, which is called unified ciphertext-policy weighted attribute-based encryption (UCP-WABE), is proposed. The weighted attribute authority assigns weights to attributes depending on their importance. The mutual information extractor extracts the mutual access sub-policy and generates the mutual information. Thus, UCP-WABE lowers the total encryption time cost of multiple providers. We prove that UCP-WABE is selectively secure on the basis of the security of ciphertext-policy weighted attribute-based encryption (CP-WABE). Additionally, the results of the implementation shows that UCP-WABE is efficient in terms of time.


2018 ◽  
Vol 1 (2) ◽  
pp. 14-24
Author(s):  
Dame Christine Sagala ◽  
Ali Sadikin ◽  
Beni Irawan

The data processing systems is a very necessary way to manipulate a data into useful information. The system makes data storage, adding, changing, scheduling to reporting well integrated, so that it can help parts to exchange information and make decisions quickly. The problems faced by GKPI Pal Merah Jambi are currently still using Microsoft Office Word and in disseminating information such as worship schedules, church activities and other worship routines through paper and wall-based worship services. To print worship and report reports requires substantial operational funds, in addition to data collection and storage there are still deficiencies including recording data on the book, difficulty in processing large amounts of data and stored in only one special place that is passive. Based on the above problems, the author is interested in conducting research with the title Designing Data Processing Systems for Web-Based Churches in the GKPI Pal Merah Church in Jambi. The purpose of this study is to design and produce a data processing system for the church. Using this system can facilitate data processing in the GKPI Pal Merah Jambi Church. This study uses a waterfall development method, a method that provides a systematic and sequential approach to system needs analysis, design, implementation and unit testing, system testing and care. Applications built using the web with MySQL DBMS database, PHP programming language and Laravel.


Author(s):  
Ganesh Chandra Deka

NoSQL databases are designed to meet the huge data storage requirements of cloud computing and big data processing. NoSQL databases have lots of advanced features in addition to the conventional RDBMS features. Hence, the “NoSQL” databases are popularly known as “Not only SQL” databases. A variety of NoSQL databases having different features to deal with exponentially growing data-intensive applications are available with open source and proprietary option. This chapter discusses some of the popular NoSQL databases and their features on the light of CAP theorem.


Author(s):  
Neha Agarwal ◽  
Ajay Rana ◽  
J.P. Pandey ◽  
Amit Agarwal

Cloud computing is an emergent computing paradigm; however, data security is a significant issue in recent time while outsourcing the data to the cloud preventing users to upload their data on cloud. The data forwarded to cloud can be protected using some cryptographic techniques based on identity, attributes, and prediction. But these algorithms lack their performance when a revoked user collude with cloud; therefore, it becomes essential to develop a secure data sharing framework with some enhanced cryptographic techniques. The proposed methodology presented a secure privacy preserving data sharing with encryption technique called dynamic unidirectional proxy re-encryption (PRE) with cipher text policy attribute-based encryption. The technique ensures the privacy, integrity, and security of the data while retrieving through the cloud. The framework is implemented in the cloud sim with java language. Experimental results proved that proposed frame work attains reasonable results compared to traditional methods.


Author(s):  
Shweta Kaushik ◽  
Charu Gandhi

Today's people are moving towards the internet services through cloud computing to acquire their required service, but they have less confidence about cloud computing because all the tasks are handled by the service provider. Cloud system provides features to the owner to store their data on some remote locations and allow only authorized users to access their data according to their access capability. Data security becomes particularly serious in the cloud computing environment because data are scattered in different machines and storage devices including servers, PCs, and various mobile devices such as smart phones. To make the cloud computing be adopted by enterprise, the security concerns of users should be rectified first to make cloud environment trustworthy. The trustworthy environment is the basic prerequisite to win the confidence of users to adopt this technology. However, there are various security concerns that need to be taken care of regarding the trust maintenance between various parties, authorized access of confidential data, data storage privacy, and integrity.


Sign in / Sign up

Export Citation Format

Share Document