scholarly journals A Study on Real-World Complex Queries In DHT-Based for Secure Cloud Storage

Author(s):  
K. Ravikumar ◽  
S. Abirami

Dispersed hash tables (DHT) really are a key structure hinder for current P2P content-dissemination framework, as an examplein actualizing the appropriated tracker of BitTorrent Mainline DHT. DHTs, for their completely appropriated nature, are known to be helpless against particular kinds of assaults and various kinds of resistances have been proposed against these assaults. We have distinguished an oversight in past approachs used to quantify the measure of the device and our procedure redresses this. The proposed DA engineering for 1-D DHT has extremely less calculations when contrasted with existing 1-D DCT. The proposed DHT engineering executed in FPGA shows a huge equipment investment funds when contrasted with FPGA assets utilized in a proficient memory based DA approach. The extra preferred standpoint of SDHT is that its converse change is identical to forward change with a regular division. Our technique is dependent upon demonstrating slithering errors as a Bernoulli process. It ensures an incredibly precise estimation and can provide the gauge in 5 seconds. the individuals, is closeness mindful, adjusts to arrange conditions, and recuperates rapidly and smoothly from system parcels and resulting fixes.

Author(s):  
M A Manazir Ahsan ◽  
Ihsan Ali ◽  
Muhammad Imran ◽  
Mohd. Yamani Idna Idris ◽  
Suleman Khan ◽  
...  

2015 ◽  
Vol E98.D (4) ◽  
pp. 796-806 ◽  
Author(s):  
Da XIAO ◽  
Lvyin YANG ◽  
Chuanyi LIU ◽  
Bin SUN ◽  
Shihui ZHENG

2017 ◽  
pp. 197-219 ◽  
Author(s):  
Surya Nepal ◽  
Shiping Chen ◽  
Jinhui Yao

In cloud computing disseminated assets are shared by means of system in open condition. Subsequently client can without much of a stretch access their information from anyplace. Simultaneously exist protection and security problems because of numerous causes. Initial one is emotional improvement in system advances. Another is expanded interest for computing assets, which make numerous associations to reappropriate their information stockpiling. So there is a requirement for secure cloud stockpiling administration in open cloud condition where the supplier isn't a confided in one. Our research tends to various information security and protection assurance problems in a cloud computing condition and suggests a technique for giving diverse security administrations like validation, approval and classification alongside checking in postponement. 128 piece Advanced Cryptograph Standard (AES) is utilized to increment information security and classification. In this supported methodology information is encoded utilizing AES and afterward transferred on a cloud. The supported model uses Short Message Service (SMS) ready instrument with keeping away from unapproved access to client information.


2014 ◽  
Vol 668-669 ◽  
pp. 1257-1262
Author(s):  
Jun Zuo ◽  
Zhen Zhu ◽  
Jing Yan Wang

In order to meet growing demand of storage resources, improve the security and integrity of enterprise information resources, this paper analyzes storage resources status and existing problems of Foshan XY Elec-Mech Limited Corp in the first. Based on detailed analysis of cloud storage hierarchy and its advantages, the cloud storage framework is designed to meet enterprise’s demands, security control strategies and backup strategies are also discussed. After implementation, the integration of information resources in multi-systems and multi-platforms may realized for providing users with massive information storage and access services. Furthermore, when disaster coming, multiple backups may be used to recovery for ensuring the continuity of enterprise’s business processing.


Sign in / Sign up

Export Citation Format

Share Document