An Approach to Cloud Computing for Medical Image Analysis

Author(s):  
M. P. Chitra ◽  
R. S. Ponmagal ◽  
N. P. G. Bhavani ◽  
V. Srividhya

Cloud computing has become popular among users in organizations and companies. Security and efficiency are the two major problems facing cloud service providers and their customers. Cloud data allocation facilities that allow groups of users to work together to access the shared data are the most standard and effective working styles in the enterprises. So, in spite of having advantages of scalability and flexibility, cloud storage service comes with confidential and security concerns. A direct method to defend the user data is to encrypt the data stored at the cloud. In this research work, a secure cloud model (SCM) that contains user authentication and data scheduling approach is scheduled. An innovative digital signature with chaotic secure hashing (DS-CS) is used for user authentication, followed by an enhanced work scheduling based on improved genetic algorithm to reduce the execution cost.

2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


Author(s):  
VINITHA S P ◽  
GURUPRASAD E

Cloud computing has been envisioned as the next generation architecture of IT enterprise. It moves the application software and databases to the centralized large data centers where management of data and services may not be fully trustworthy. This unique paradigm brings out many new security challenges like, maintaining correctness and integrity of data in cloud. Integrity of cloud data may be lost due to unauthorized access, modification or deletion of data. Lacking of availability of data may be due to the cloud service providers (CSP), in order to increase their margin of profit by reducing the cost, CSP may discard rarely accessed data without detecting in timely fashion. To overcome above issues, flexible distributed storage, token utilizing, signature creations used to ensure integrity of data, auditing mechanism used assists in maintaining the correctness of data and also locating, identifying of server where exactly the data has been corrupted and also dependability and availability of data achieved through distributed storage of data in cloud. Further in order to ensure authorized access to cloud data a admin module has been proposed in our previous conference paper, which prevents unauthorized users from accessing data and also selective storage scheme based on different parameters of cloud servers proposed in previous paper, in order to provide efficient storage of data in the cloud. In order to provide more efficiency in this paper dynamic data operations are supported such as updating, deletion and addition of data.


Author(s):  
Narander Kumar ◽  
Jitendra Kumar Samriya

Background: Cloud computing is a service that is being accelerating its growth in the field of information technology in recent years. Privacy and security are challenging issues for cloud users and providers. Obective: This work aims at ensuring secured validation of user and protects data during transmission for users in a public IoT-cloud environment. Existing security measures however fails by their single level of security, adaptability for large amount of data and reliability. Therefore, to overcome these issues and to achieve a better solution for vulnerable data. Method: The suggested method utilizes a secure transmission in cloud using key policy attribute based encryption (KPABE). Initially, user authentication is verified. Then the user data is encrypted with the help of KP-ABE algorithm. Finally, data validation and privacy preservation are done by Burrows-Abadi-Needham (BAN) logic. This verified, and shows that the proposed encryption is correct, secure and efficient to prevent unauthorized access and prevention of data leakage so that less chances of data/identity, theft of a user is the analysis and performed by KP-ABE, that is access control approach. Results: Here the method attains the maximum of 88.35% of validation accuracy with a minimum 8.78ms encryption time, which is better when, compared to the existing methods. The proposed mechanism is done by MATLAB. The performance of the implemented method is calculated based on the time of encryption and decryption, execution time and validation accuracy. Conclusion: Thus the proposed approach attains the high IoT-cloud data security and increases the speed for validation and transmission with high accuracy and used for cyber data science processing.


2019 ◽  
pp. 446-458
Author(s):  
Arun Fera M. ◽  
M. Saravanapriya ◽  
J. John Shiny

Cloud computing is one of the most vital technology which becomes part and parcel of corporate life. It is considered to be one of the most emerging technology which serves for various applications. Generally these Cloud computing systems provide a various data storage services which highly reduces the complexity of users. we mainly focus on addressing in providing confidentiality to users' data. We are proposing one mechanism for addressing this issue. Since software level security has vulnerabilities in addressing the solution to our problem we are dealing with providing hardware level of security. We are focusing on Trusted Platform Module (TPM) which is a chip in computer that is used for secure storage that is mainly used to deal with authentication problem. TPM which when used provides a trustworthy environment to the users. A detailed survey on various existing TPM related security and its implementations is carried out in our research work.


2013 ◽  
Vol 760-762 ◽  
pp. 1758-1761
Author(s):  
Ji Ming Lan ◽  
Shu Jie Lu ◽  
Li Ming Zhang

Proposed that idea of cloud computing ecology development, supports and guiding cloud model deployment, the cloud service management and Clouds protocols observes the purification of mix cloud environment. Has designed the multiple dimension data saving structure and real-time mass-data processing of model as well as the asynchronous overall construction distributional ecology cloud structure. It has been shown that this ecology cloud structure is healthy.


2014 ◽  
Vol 701-702 ◽  
pp. 1106-1111 ◽  
Author(s):  
Xin Zheng Zhang ◽  
Ya Juan Zhang

As information and processes are migrating to the cloud, Cloud Computing is drastically changing IT professionals’ working environment. Cloud Computing solves many problems of conventional computing. However, the new technology has also created new challenges such as data security, data ownership and trans-code data storage. We discussed about Cloud computing security issues, mechanism, challenges that Cloud service providers and consumers face during Cloud engineering. Based on concerning of security issues and challenges, we proposed several encryption algorithms to make cloud data secure and invulnerable. We made comparisons among DES, AES, RSA and ECC algorithms to find combinatorial optimization solutions, which fit Cloud environment well for making cloud data secure and not to be hacked by attackers.


The tradition of moving applications, data to be consumed by the applications and the data generated by the applications is increasing and the increase is due to the advantages of cloud computing. The advantages of cloud computing are catered to the application owners, application consumers and at the same time to the cloud datacentre owners or the cloud service providers also. Since IT tasks are vital for business progression, it for the most part incorporates repetitive or reinforcement segments and framework for power supply, data correspondences associations, natural controls and different security gadgets. An extensive data centre is a mechanical scale task utilizing as much power as a community. The primary advantage of pushing the applications on the cloud-based data centres are low infrastructure maintenance with significant cost reduction for the application owners and the high profitability for the data centre cloud service providers. During the application migration to the cloud data centres, the data and few components of the application become exposed to certain users. Also, the applications, which are hosted on the cloud data centres must comply with the certain standards for being accepted by various application consumers. In order to achieve the standard certifications, the applications and the data must be audited by various auditing companies. Few of the cases, the auditors are hired by the data centre owners and few of times, the auditors are engaged by application consumers. Nonetheless, in both situations, the auditors are third party and the risk of exposing business logics in the applications and the data always persists. Nevertheless, the auditor being a third-party user, the data exposure is a high risk. Also, in a data centre environment, it is highly difficult to ensure isolation of the data from different auditors, who may not be have the right to audit the data. Significant number of researches have attempted to provide a generic solution to this problem. However, the solutions are highly criticized by the research community for making generic assumptions during the permission verification process. Henceforth, this work produces a novel machine learning based algorithm to assign or grant audit access permissions to specific auditors in a random situation without other approvals based on the characteristics of the virtual machine, in which the application and the data is deployed, and the auditing user entity. The results of the proposed algorithm are highly satisfactory and demonstrates nearly 99% accuracy on data characteristics analysis, nearly 98% accuracy on user characteristics analysis and 100% accuracy on secure auditor selection process


2018 ◽  
Vol 7 (4.36) ◽  
pp. 511
Author(s):  
Mr. Girish kumar d ◽  
Dr. Rajashree v biradar ◽  
Dr. V c patil

Cloud computing increases the capacity or capabilities vigorously without devoting new infrastructure, training new personnel, or licensing the new software . In the past few years, cloud computing has grown from being a promising business concept to one of the fast-growing sectors of IT industry. As the more sensitive information and data are moved into the cloud data centers, they run on virtual computing resources in the form of virtual machines. Security has become one of the major issue in cloud computing which reduces the growth of cloud environment with complications in data privacy and data protection continue to outbreak the market. A new model created for the advancement should not result as a threat to the existing model. The architecture of cloud poses such a threat to the security of existing models when deployed in a cloud environment. The different cloud service users need to be attentive in considerate,about the risk of data breaks in the new environment. In this paper, advanced survey of the various secured storage in cloud computing using bidirectional protocols is presented.  


Author(s):  
K Pooja ◽  
◽  
Dr Shailaja S ◽  

Multiple applications of cloud servicing can be seen in the field of logical programming as well as IT industries. Complex computations over local machines may demand for plenty of system resources thereby delaying the data processing operations. In order to achieve speed in processing one must opt for cloud computing techniques. Extensive maneuver of cloud services is desirable for scientific computation of user data and application. This will require a platform designed in a way to meet the specific requirements of individual users, providing an ease for moving their data and applications over different devices. Symbolic-Numeric Computation using cloud service platform is presented in the paper. In this approach user tasks are presented in the form of symbolic expressions using languages like Java, C/C++, APIs etc. Proposed work employs Python programming for carrying out compilation process.


Author(s):  
R.Santha Maria Rani ◽  
Dr.Lata Ragha

Cloud computing provides elastic computing and storage resource to users. Because of the characteristic the data is not under user’s control, data security in cloud computing is becoming one of the most concerns in using cloud computing resources. To improve data reliability and availability, Public data auditing schemes is used to verify the outsourced data storage without retrieving the whole data. However, users may not fully trust the cloud service providers (CSPs) because sometimes they might be dishonest. Therefore, to maintain the integrity of cloud data, many auditing schemes have been proposed. In this paper, analysis of various existing auditing schemes with their consequences is discussed.  Keywords: — Third Party Auditor (TPA), Cloud Service Provider (CSP), Merkle-Hash Tree (MHT), Provable data Possession (PDP), Dynamic Hash Table (DHT).


Sign in / Sign up

Export Citation Format

Share Document