K-RSA: Secure data storage technique for multimedia in cloud data server

2020 ◽  
Vol 39 (3) ◽  
pp. 3297-3314
Author(s):  
Keshav Sinha ◽  
Annu Priya ◽  
Partha Paul

Cloud has become one of the most demanding services for data storage. On another hand, the security of data is one of the challenging tasks for Cloud Service Provider (CSP). Cryptography is one of the ways for securing the storage data. Cryptography is not a new approach instead of the efficient utilization of cryptographical algorithms is greatly needed. In this work, we proposed a Secure Hidden Layer (SHL) and Application Programming Interface (API) for data encryption. The SHL is consisting of two major modules (i) Key Management Server (KMS) and (ii) Share Holder Server (SHS) which is used for storing and sharing of cryptographic key. For this purpose, we proposed a server-side encryption algorithm, which is based on the asymmetric algorithm (RSA and CRT) for providing end-to-end security of multimedia data. The experimental results of text and video are evidence that the size of file is not much affected after the encryption and effectively stored at Cloud Storage Server (CSS). The parameters like ciphertext size, encryption time and throughput are considered for performance evaluation of the proposed encryption technique.

2021 ◽  
Vol 2094 (3) ◽  
pp. 032045
Author(s):  
A Y Unger

Abstract A new design pattern intended for distributed cloud-based information systems is proposed. Pattern is based on the traditional client-server architecture. The server side is divided into three principal components: data storage, application server and cache server. Each component can be used to deploy parts of several independent information systems, thus realizing shared-resource approach. A strategy of separation of competencies between the client and the server is proposed. The strategy assumes that the client side is responsible for application logic and the server side is responsible for data storage consistency and data access control. Data protection is ensured by means of two particular approaches: at the entity level and at the transaction level. The application programming interface to access data is presented at the level of identified transaction descriptors.


2015 ◽  
Vol 25 (09n10) ◽  
pp. 1611-1632 ◽  
Author(s):  
Haiping Xu ◽  
Deepti Bhalerao

Despite the popularity and many advantages of using cloud data storage, there are still major concerns about the data stored in the cloud, such as security, reliability and confidentiality. In this paper, we propose a reliable and secure distributed cloud data storage schema using Reed-Solomon codes. Different from existing approaches to achieving data reliability with redundancy at the server side, our proposed mechanism relies on multiple cloud service providers (CSP), and protects users’ cloud data from the client side. In our approach, we view multiple cloud-based storage services as virtual independent disks for storing redundant data encoded with erasure codes. Since each CSP has no access to a user’s complete data, the data stored in the cloud would not be easily compromised. Furthermore, the failure or disconnection of a CSP will not result in the loss of a user’s data as the missing data pieces can be readily recovered. To demonstrate the feasibility of our approach, we developed a prototype distributed cloud data storage application using three major CSPs. The experimental results show that, besides the reliability and security related benefits of our approach, the application outperforms each individual CSP for uploading and downloading files.


In recent years, with the widespread application of cloud computing, more and more enterprises, institutions, and individuals have started to use cloud services to place their data in the cloud. With the rise of cloud services, the accompanying data security issues have received increasing attention. Because data stores are in the cloud, there are many outstanding security issues. This paper proposes a public cloud data security solution based on a trusted third-party platform. The solution is based on an independent and trusted third-party platform, and has certain advantages in data encryption, key management, data awareness, data sharing, and accident responsibility.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 64 ◽  
Author(s):  
S. Renu ◽  
S.H. Krishna Veni

The Cloud computing services and security issues are growing exponentially with time. All the CSPs provide utmost security but the issues still exist. Number of technologies and methods are emerged and futile day by day. In order to overcome this situation, we have also proposed a data storage security system using a binary tree approach. Entire services of the binary tree are provided by a Trusted Third Party (TTP) .TTP is a government or reputed organization which facilitates to protect user data from unauthorized access and disclosure. The security services are designed and implemented by the TTP and are executed at the user side. Data classification, Data Encryption and Data Storage are the three vital stages of the security services. An automated file classifier classify unorganized files into four different categories such as Sensitive, Private, Protected and Public. Applied cryptographic techniques are used for data encryption. File splitting and multiple cloud storage techniques are used for data outsourcing which reduces security risks considerably. This technique offers  file protection even when the CSPs compromise. 


2018 ◽  
Vol 8 (1) ◽  
pp. 2 ◽  
Author(s):  
Pranshul Sardana ◽  
Mohit Kalra ◽  
Amit Sardana

This paper proposes a monitoring system retro-fittable for existing Intravenous (IV) infusion setup. Traditionally, doctors and nurses use their experience to estimate the time required by an IV bottle to empty which makes the IV therapy vulnerable to human error. The current study proposes an internet connected monitoring platform for IV drip chambers. The device enables doctors and nursing staff to monitor the drip parameters wirelessly while emphasizing on low costs and high degree of reliability. It has two main units, namely chamber unit and pole unit. Chamber unit houses two types of sensors, optical based for drop detection and capacitive based for level detection, both of which are placed on the chamber unit. The pole unit majorly consists of a microcontroller and a GSM-based (Global System Mobile Communication) communication module. In addition, the device was tested along with various parameters like accuracy, readout stability, change in fluid used, changes in ambient conditions, end chamber conditions, optical unit malfunctions. Finally, the monitored data was securely and reliably transmitted to commercial cloud service using HTTP API calls (Hyper Text Transfer Protocol) (Application Programming Interface). This data was stored and visualized for ease of readability for nurses and doctors.


2014 ◽  
Vol 701-702 ◽  
pp. 1106-1111 ◽  
Author(s):  
Xin Zheng Zhang ◽  
Ya Juan Zhang

As information and processes are migrating to the cloud, Cloud Computing is drastically changing IT professionals’ working environment. Cloud Computing solves many problems of conventional computing. However, the new technology has also created new challenges such as data security, data ownership and trans-code data storage. We discussed about Cloud computing security issues, mechanism, challenges that Cloud service providers and consumers face during Cloud engineering. Based on concerning of security issues and challenges, we proposed several encryption algorithms to make cloud data secure and invulnerable. We made comparisons among DES, AES, RSA and ECC algorithms to find combinatorial optimization solutions, which fit Cloud environment well for making cloud data secure and not to be hacked by attackers.


Author(s):  
L. A. Volodchenkova ◽  
D. V. Kozirev

In this article the programm interface (API) of the server side of the cloud data storage is created.


2020 ◽  
Author(s):  
S. S. Jaya ◽  
K. T. Subhadra

Cloud computing is a growing technology that offers compute, storage and network resources as a service over the internet. It enables the individuals, clients or the enterprises to outsource their data and application software to the cloud server. The services are offered by a cloud service provider (CSP) and the users need to pay for what they use. There are many security concerns needs to be addressed when the data is maintained by third party service provider in cloud. The auditor is introduced to audit the integrity of the data on behalf of the client in order to ensure integrity of data. This can be called as public auditability of data. Recently, two privacy preserving auditing mechanisms named Oruta and Knox are introduced to check the correctness of stored data. In this paper, we try to propose the security flaw of their scheme when active adversaries are involved in cloud storage. An active adversary is capable of modifying the data stored in cloud arbitrarily. This data modification is not being identified by the user and the auditor in the verification process. We try to suggest a solution to resolve this flaw by signing the proof response generated on the cloud server side. Then the signed proof is sent to the trusted third party auditor (TTPA) for verification. The auditor first verifies the signature and for the validation of the proof. The proposed scheme is proved to be secure against active adversary.


2021 ◽  
Vol 7 (2) ◽  
pp. 108-118
Author(s):  
Erwin Yudi Hidayat ◽  
Raindy Wicaksana Hardiansyah ◽  
Affandy Affandy

Dalam menaikkan kinerja serta mengevaluasi kualitas, perusahaan publik membutuhkan feedback dari masyarakat / konsumen yang bisa didapat melalui media sosial. Sebagai pengguna media sosial Twitter terbesar ketiga di dunia, tweet yang beredar di Indonesia memiliki potensi meningkatkan reputasi dan citra perusahaan. Dengan memanfaatkan algoritma Deep Neural Network (DNN), neural network yang tersusun dari layer yang jumlahnya lebih dari satu, didapati hasil analisa sentimen pada Twitter berbahasa Indonesia menjadi lebih baik dibanding dengan metode lainnya. Penelitian ini menganalisa sentimen melalui tweet dari masyarakat Indonesia terhadap sejumlah perusahaan publik dengan menggunakan DNN. Data Tweet sebanyak 5504 record didapat dengan melakukan crawling melalui Application Programming Interface (API) Twitter yang selanjutnya dilakukan preprocessing (cleansing, case folding, formalisasi, stemming, dan tokenisasi). Proses labeling dilakukan untuk 3902 record dengan memanfaatkan aplikasi Sentiment Strength Detection. Tahap pelatihan model dilakukan menggunakan algoritma DNN dengan variasi jumlah hidden layer, susunan node, dan nilai learning rate. Eksperimen dengan proporsi data training dan testing sebesar 90:10 memberikan hasil performa terbaik. Model tersusun dengan 3 hidden layer dengan susunan node tiap layer pada model tersebut yaitu 128, 256, 128 node dan menggunakan learning rate sebesar 0.005, model mampu menghasilkan nilai akurasi mencapai 88.72%. 


Sign in / Sign up

Export Citation Format

Share Document