scholarly journals Security Enhanced Model for Cloud Data Based on Dynamic Data Fragmentation and Replication (DDFR)

Nowadays cloud computing is utilized in several IT capabilities like smart industry with IoTs, Mobile computing, etc., It is happen through outsourcing data to a third-party administrative control which is great application of cloud. But this leads to data leakage through attacks. A high level of data security is required on the data stored in cloud nodes. This paper enhances the security and data availability by dynamic fragmentation and replication process. The fragmentation is performed in runtime to create the fragments according to the available virtual machine. The replication aims to enhance the better load balance with less number of replicas. Bee colony algorithm is used for finding the best node in replication. The AES encryption approach is used for encrypting the fragments. This approach does not provides the original data if any attacks happened successfully.

2013 ◽  
Vol 347-350 ◽  
pp. 2693-2699 ◽  
Author(s):  
Li Xuan Wang ◽  
Li Fang Liu ◽  
Shen Ling Liu ◽  
Dong Chen ◽  
Yu Jiao Chen

The increasing popularity of cloud service is leading people to concentrate more on cloud storage than traditional storage. However, cloud storage confronts many challenges, especially, the security of the out-sourced data (the data that is not stored/retrieved from the tenants own servers). Security not only can keep the data from attacking but also can recover the original data after attack efficiently. Thus, to address the security issue, we proposed a new distributed and data fragmentation model of cloud storage named DDFM (Distributed and Data Fragmentation Model). DDFM aims to provide tenants a secured and integrated cloud storage service with layer-to-layer protection strategy. The layer-to-layer protection strategy of our model includes three main algorithms: the Authentication and Authorization Management Algorithm based on OpenID and OAuth, the Data Fragment Algorithm based on Granular Computing and the Haystack File Storage Algorithm. Considering tenants' security requirement our model DDFM based on these algorithms provided a better decision of cloud storage architecture for our tenants. Furthermore, DDFM can defense most of the network threats and provide a secured way for the third-party applications to access sensitive information that stored on the cloud storage.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


2020 ◽  
Vol 63 (8) ◽  
pp. 1216-1230 ◽  
Author(s):  
Wei Guo ◽  
Sujuan Qin ◽  
Jun Lu ◽  
Fei Gao ◽  
Zhengping Jin ◽  
...  

Abstract For a high level of data availability and reliability, a common strategy for cloud service providers is to rely on replication, i.e. storing several replicas onto different servers. To provide cloud users with a strong guarantee that all replicas required by them are actually stored, many multi-replica integrity auditing schemes were proposed. However, most existing solutions are not resource economical since users need to create and upload replicas of their files by themselves. A multi-replica solution called Mirror is presented to overcome the problems, but we find that it is vulnerable to storage saving attack, by which a dishonest provider can considerably save storage costs compared to the costs of storing all the replicas honestly—while still can pass any challenge successfully. In addition, we also find that Mirror is easily subject to substitution attack and forgery attack, which pose new security risks for cloud users. To address the problems, we propose some simple yet effective countermeasures and an improved proofs of retrievability and replication scheme, which can resist the aforesaid attacks and maintain the advantages of Mirror, such as economical bandwidth and efficient verification. Experimental results show that our scheme exhibits comparable performance with Mirror while achieving high security.


Author(s):  
Md Equebal Hussain ◽  
Mohammad Rashid Hussain

security is one of the most important concern on cloud computing therefore institutions are hesitating to host their data over cloud. Not all data can be afforded to move on the cloud (example accounts data). The main purpose of moving data over cloud is to reduce cost (infrastructure and maintenance), faster performance, easy upgrade, storage capacity but at the same time security is major concern because cloud is not private but maintained by third party over the internet, security issues like privacy, confidentiality, authorization (what you are allowed to do), authentication (who you are) and accounting (what you actually do) will be encountered. Variety of encryption algorithms required for higher level of security. In this paper we try to provide solution for better security by proposing a combined method of key exchange algorithm with encryption technique. Data stored in cloud can be protected from hackers using proposed solution because even if transmitted key is hacked of no use without user’s private key.


2013 ◽  
Vol 2013 ◽  
pp. 1-7 ◽  
Author(s):  
Igor G. Zurbenko ◽  
Amy L. Potrzeba-Macrina

The reconstruction of periodic signals that are embedded in noise is a very important task in many applications. This already difficult task is even more complex when some observations are missed or some are presented irregularly in time. Kolmogorov-Zurbenko (KZ) filtration, a well-developed method, offers a solution to this problem. One section of this paper provides examples of very precise reconstructions of multiple periodic signals covered with high level noise, noise levels that make those signals invisible within the original data. The ability to reconstruct signals from noisy data is applied to the numerical reconstruction of tidal waves in atmospheric pressure. The existence of such waves was proved by well-known naturalist Chapman, but due to the high synoptic fluctuation in atmospheric pressure he was unable to numerically reproduce the waves. Reconstruction of the atmospheric tidal waves reveals a potential intensification on wind speed during hurricanes, which could increase the danger imposed by hurricanes. Due to the periodic structure of the atmospheric tidal wave, it is predictable in time and space, which is important information for the prediction of excess force in developing hurricanes.


Blood ◽  
2001 ◽  
Vol 97 (2) ◽  
pp. 557-564 ◽  
Author(s):  
Peter J. Quesenberry ◽  
Suju Zhong ◽  
Han Wang ◽  
Marc Stewart

Abstract We have previously shown that the keys to high-level nontoxic chimerism in syngeneic models are stem cell toxic, nonmyelotoxic host treatment as provided by 100-cGy whole-body irradiation and relatively high levels of marrow stem cells. This approach was unsuccessful in H-2 mismatched B6.SJL to BALB/c marrow transplants, but with tolerization, stable multilineage chimerism was obtained. Ten million B6.SJL spleen cells were infused intravenously into BALB/c hosts on day −10 and (MR-1) anti-CD40 ligand monoclonal antibody (mAb) injected intraperitoneally at varying levels on days −10, −7, −3, 0, and +3 and the BALB/c mice irradiated (100 cGy) and infused with 40 million B6.SJL/H-2 mismatched marrow cells on day 0. Stable multilineage chimerism at levels between 30% to 40% was achieved in the great majority of mice at 1.6 mg anti-CD40 ligand mAb per injection out to 64 weeks after transplantation, without graft-versus-host disease. The transplanted mice were also tolerant of donor B6.SJL, but not third-party CBA/J skin grafts at 8 to 9 and 39 to 43 weeks after marrow transplantation. These data provide a unique model for obtaining stable partial chimerism in H-2 mismatched mice, which can be applied to various clinical diseases of man such as sickle cell anemia, thalassemia, and autoimmune disorders.


2017 ◽  
Vol 2017 ◽  
pp. 1-11
Author(s):  
Qian Meng ◽  
Jianfeng Ma ◽  
Kefei Chen ◽  
Yinbin Miao ◽  
Tengfei Yang

User authentication has been widely deployed to prevent unauthorized access in the new era of Internet of Everything (IOE). When user passes the legal authentication, he/she can do series of operations in database. We mainly concern issues of data security and comparable queries over ciphertexts in IOE. In traditional database, a Short Comparable Encryption (SCE) scheme has been widely used by authorized users to conduct comparable queries over ciphertexts, but existing SCE schemes still incur high storage and computational overhead as well as economic burden. In this paper, we first propose a basic Short Comparable Encryption scheme based on sliding window method (SCESW), which can significantly reduce computational and storage burden as well as enhance work efficiency. Unfortunately, as the cloud service provider is a semitrusted third party, public auditing mechanism needs to be furnished to protect data integrity. To further protect data integrity and reduce management overhead, we present an enhanced SCESW scheme based on position-aware Merkle tree, namely, PT-SCESW. Security analysis proves that PT-SCESW and SCESW schemes can guarantee completeness and weak indistinguishability in standard model. Performance evaluation indicates that PT-SCESW scheme is efficient and feasible in practical applications, especially for smarter and smaller computing devices in IOE.


2013 ◽  
Vol 25 (1) ◽  
pp. 199-229 ◽  
Author(s):  
Shane S. Dikolli ◽  
Susan L. Kulp ◽  
Karen L. Sedatole

ABSTRACT We investigate whether boards of directors adjust compensation contracts to lengthen a CEO's decision horizon, and if the use of such contract adjustments depends on the levels of external (i.e., shareholder-based) and internal (i.e., board-based) CEO monitoring. Based on insights from the career-concerns literature, we identify short-horizon CEOs as those nearing retirement, at a firm with a current earnings decline or loss, and/or with an impending job change. We find that firms with a CEO identified as having a short-horizon place greater contract weight on forward-looking information. This horizon-lengthening contract adjustment is less pronounced when there is greater external monitoring (i.e., as proxied by a high level of shareholder rights), consistent with the intuition that increased shareholder rights mitigate CEO entrenchment, leading to less myopic decision making, independent of a contract adjustment. However, we also find that the horizon-lengthening contract adjustment is more pronounced when there is greater internal monitoring (i.e., as proxied by characteristics of the board), consistent with the intuition that increased employment risk from more intense internal monitoring itself creates a demand for increased incentive weights as a means of compensating the CEO for the increased risk. Data Availability: Data used for this study are derived from publicly available databases and proxy statements. JEL Classifications: M52; M41; J33.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 64 ◽  
Author(s):  
S. Renu ◽  
S.H. Krishna Veni

The Cloud computing services and security issues are growing exponentially with time. All the CSPs provide utmost security but the issues still exist. Number of technologies and methods are emerged and futile day by day. In order to overcome this situation, we have also proposed a data storage security system using a binary tree approach. Entire services of the binary tree are provided by a Trusted Third Party (TTP) .TTP is a government or reputed organization which facilitates to protect user data from unauthorized access and disclosure. The security services are designed and implemented by the TTP and are executed at the user side. Data classification, Data Encryption and Data Storage are the three vital stages of the security services. An automated file classifier classify unorganized files into four different categories such as Sensitive, Private, Protected and Public. Applied cryptographic techniques are used for data encryption. File splitting and multiple cloud storage techniques are used for data outsourcing which reduces security risks considerably. This technique offers  file protection even when the CSPs compromise. 


Sign in / Sign up

Export Citation Format

Share Document