scholarly journals The Identical Data in Cloud Storage with ADJDUP Technique

Author(s):  
Anubhav Pandit

Data deduplication is necessary for corporations to minimize the hidden charges linked with backing up their data using Public Cloud platform. Incapable data storage on its own can become improvident, and such problem are enlarging in the Public Cloud at other and scattered satisfied confirmed storage structure are creating multiple clone of single account for collating or other purposes. Deduplication is friendly in cost shrinking by lengthening the benefit of a precise volume of data. Miserably, data duplicity having several safety constraints, so more than one encoding is appropriate to validate the details. There is a system for dynamic Information-Locking and Encoding with Convergent Encoding. In this Information-Locking and Encoding with Convergent Encoding, the data is coded first and then the cipher text is encoded once more. Chunk volume is used for deduplication to diminish disk capacity. The same segments would still be encrypted in the same cipher message. The format of the key neither be abbreviated from encrypted chunk data by the hacker. The comprehension is also guarded from the cloud server. The center of attention of this document is to reducing disk storage and provides protection for online cloud deduplication.

2018 ◽  
Vol 7 (3.1) ◽  
pp. 128
Author(s):  
Selvam L ◽  
Arokia Renjit J

Recent security incidents on public cloud data storage had raised concerns on cloud data security. Development in the hacking area has risen in the past few years. Due to this, Cyber Security is needed which plays an important role to cover the secret information. Currently, the attack of challenging channel is both the symmetric as well as the asymmetric encryption algorithm. Since, in both criteria the secret key has to be transmitting through a security challenging channel. For this many techniques have been put forward. The Main focus is on the vulnerabilities of the private keys while hoarded in different places for the fast utilization of the round key of the AES algorithm. In the view of the hackers, extracting the private key is nearly as same as obtaining the plain text itself. So, the honey encryption technique is used to futile the attacker by producing the fake key for each and every try of the Key puncher. An indication will be generated automatically to the storage manager when an attempt is made by the attacker. The Honey encryption is the best algorithm to overcome the drawbacks of the AES algorithm but it has some time constraints which are also eliminated here. Thus, eliminating the Brute Force Attack and providing a secure system for storing the secret key.  


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Samuel Heuchert ◽  
Bhaskar Prasad Rimal ◽  
Martin Reisslein ◽  
Yong Wang

PurposeMajor public cloud providers, such as AWS, Azure or Google, offer seamless experiences for infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS). With the emergence of the public cloud's vast usage, administrators must be able to have a reliable method to provide the seamless experience that a public cloud offers on a smaller scale, such as a private cloud. When a smaller deployment or a private cloud is needed, OpenStack can meet the goals without increasing cost or sacrificing data control.Design/methodology/approachTo demonstrate these enablement goals of resiliency and elasticity in IaaS and PaaS, the authors design a private distributed system cloud platform using OpenStack and its core services of Nova, Swift, Cinder, Neutron, Keystone, Horizon and Glance on a five-node deployment.FindingsThrough the demonstration of dynamically adding an IaaS node, pushing the deployment to its physical and logical limits, and eventually crashing the deployment, this paper shows how the PackStack utility facilitates the provisioning of an elastic and resilient OpenStack-based IaaS platform that can be used in production if the deployment is kept within designated boundaries.Originality/valueThe authors adopt the multinode-capable PackStack utility in favor of an all-in-one OpenStack build for a true demonstration of resiliency, elasticity and scalability in a small-scale IaaS. An all-in-one deployment is generally used for proof-of-concept deployments and is not easily scaled in production across multiple nodes. The authors demonstrate that combining PackStack with the multi-node design is suitable for smaller-scale production IaaS and PaaS deployments.


2013 ◽  
Vol 3 (3) ◽  
pp. 50-59
Author(s):  
Sandeep K. Sood

Security of data is one of the main concern in the implementation of cloud computing. This paper proposes a highly effective and efficient cloud security model. The proposed security model keeps the most critical data on the private cloud and the rest of it on the public cloud. It uses hash codes to check the integrity of the data at the public cloud. The proposed cloud security model provides the provision of defining user roles thereby determining the type of access the user exercises on the data. This model uses dual verification mechanism for user authentication by using username and password on one layer and key authentication on another layer. A cryptographic process is used to make the overall security of the data on the cloud highly robust. A comprehensive security analysis of the model is done against various types of attacks and the results are very promising. This model is compared to various existing cloud security models and the results shows that our technique is faster, much more robust and efficient as compared to other existing models. This model is cost effective because it uses private cloud only for highly sensitive data. Rest of data is stored on the public cloud, where data storage cost is comparatively very less.


2018 ◽  
Vol 7 (3.12) ◽  
pp. 437
Author(s):  
R Aditya Balaji ◽  
R Pragadeeeshwaran ◽  
G K. Sandhia

The most common cloud service is Data Storage. In order to reduce the storage space, deduplication is used. Data deduplication is a process of removing redundant copies of same data. If a file which is already present in the cloud, is uploaded by the same user or different user, then it will not be uploaded again. Therefore storage required is decreased but reliability is also reduced. Data are encrypted and stored in cloud to protect the privacy of users and this introduces new challenges. The proposed system uses M3 algorithm for encryption and Chunking technique for deduplication. The results of the evaluation show that the security and reliability are increased in the proposed scheme.  


2016 ◽  
Vol 2016 ◽  
pp. 1-6
Author(s):  
Lei Xiao ◽  
Yu Sheng ◽  
Guanlan Tan ◽  
Jianxin Wang ◽  
Yi Pan

Now all kinds of public cloud providers take computing and storage resources as the user’s main demand, making it difficult for users to deploy complex network in the public cloud. This paper proposes a virtual cloud platform with network as the core demand of the user, which can provide the user with the capacity of free network architecture as well as all kinds of virtual resources. The network is isolated by port groups of the virtual distributed switch and the data forwarding and access control between different network segments are implemented by virtual machines loading a soft-routing system. This paper also studies the management interface of network architecture and the uniform way to connect the remote desktop of virtual resources on the web, hoping to provide some new ideas for the Network as a Service model.


2021 ◽  
Vol 13 (5) ◽  
pp. 65-77
Author(s):  
Rajashree Soman ◽  
Sukumar R.

Visitor validation at entrance generates a large number of image files that need to be transmitted over to cloud for future reference. The image data needs to be protected by active and passive adversaries from performing cryptographic attacks on these data. The image data also needs to be authenticated before giving it for future use. Focusing on reliable and secure image sharing, the proposed method involves building a novel cloud platform, which aims to provide a secure storage in the public cloud. The main objective of this paper is to provide a new way of secure image data storage and transmission on cloud using cryptographic algorithms. To overcome the flaws in current system, a novel method using BigchainDB, which has advantages of blockchain technology and traditional database, is proposed for storing attributes of image.


Author(s):  
Gottumukkala Hima Bindu ◽  
Chinta Anuradha ◽  
Patnala S. R. Chandra Murthy

Cloud computing has emerged to influence multimedia content providers like Disney to render their multimedia services. When content providers use the public cloud, there are chances to have pirated copies further leading to a loss in revenues. At the same time, technological advancements regarding content recording and hosting made it easy to duplicate genuine multimedia objects. This problem has increased with increased usage of a cloud platform for rendering multimedia content to users across the globe. Therefore it is essential to have mechanisms to detect video copy, discover copyright infringement of multimedia content and protect the interests of genuine content providers. It is a challenging and computationally expensive problem to be addressed considering the exponential growth of multimedia content over the internet. In this paper, we surveyed multimedia-content protection mechanisms which throw light on different kinds of multimedia, multimedia content modification methods, and techniques to protect intellectual property from abuse and copyright infringement. It also focuses on challenges involved in protecting multimedia content and the research gaps in the area of cloud-based multimedia content protection.


Data storage over cloud is a demanding service but it is vulnerable for various attacks. It is required to provide strong security to this data. An authenticity of the data on remote storage is necessary but data owners have to trust on cloud storage for their outsourced data. There is a need of some mechanism to check correctness of the data without compromising its confidentiality. We have studied homomorphic algorithms so that can be applied on the cipher text. Aim of the framework designed here is to enable any authentic user or auditor to verify hash value generated by owner with the hash value of encrypted data which is stored at remote storage for assuring authentication of the data. This can be done with strong mathematical cryptographic algorithms those can be used in the public environment and can provide better performance complexity.


2018 ◽  
Vol 7 (1.8) ◽  
pp. 223
Author(s):  
Snata Choudhury ◽  
V.B. Kirubanand

Cloud computing the most used word in the world of Information Technology, is creating huge differences in IT industry. Nowadays huge amount of data is being generated and the researchers are finding new ways of managing these data. Basically, the word cloud refers to a virtual database that stores huge data from various clients. There are three types of cloud public, private and hybrid. Public cloud is basically for general users where users can use cloud services free or by paying. Private cloud is for any particular organizations and hybrid one is basically combine of both. Cloud offers various kind of services such as IAAS, PAAS, SAAS where services like platform for running any application, accessing the huge storage, can use any application running under cloud are given. The cloud also has a disadvantage regarding the security for the data storage facility. Basically, the public cloud is prone to data modification, data hacking and thus the integrity and confidentiality of the data is being compromised. Here in our work the concern is to protect the data that will be stored in the public cloud by using the multi-phase encryption. The algorithm that we have proposed is a combination of Rail Fence cipher and Play Fair cipher.


Author(s):  
Jia Hua-Ping ◽  
Zhao Jun-Long ◽  
Liu Jun

Cardiovascular disease is one of the major diseases that threaten the human health. But the existing electrocardiograph (ECG) monitoring system has many limitations in practical application. In order to monitor ECG in real time, a portable ECG monitoring system based on the Android platform is developed to meet the needs of the public. The system uses BMD101 ECG chip to collect and process ECG signals in the Android system, where data storage and waveform display of ECG data can be realized. The Bluetooth HC-07 module is used for ECG data transmission. The abnormal ECG can be judged by P wave, QRS bandwidth, and RR interval. If abnormal ECG is found, an early warning mechanism will be activated to locate the user’s location in real time and send preset short messages, so that the user can get timely treatment, avoiding dangerous occurrence. The monitoring system is convenient and portable, which brings great convenie to the life of ordinary cardiovascular users.


Sign in / Sign up

Export Citation Format

Share Document