scholarly journals ENCODING PERSONAL INFORMATION ON DATA SHARING IN CLOUD USING BASE64 ALGORITHM

Author(s):  
P.L. RINI ◽  
Y.GOLD ANAND. N

A major feature of cloud services is that user data are processed remotely among machines. But user fears of losing control of their own data, particularly financial and health data can becomes a significant barrier to wide adoption of cloud services in order to avoid this problem we provide a novel approach, namely Cloud Information Accountability (CIA) for clients. So that the authorized client can only access the data in the cloud. Data owner store data in the format of JAR format thus client access data only by the permission of data owner. To strengthen user’s control also provide a distributed audit mechanism by push and pull mode. Base64 encoding algorithm is used for encoding the JAR file in order to secure JAR file from attackers. Log maintained and send periodically to the data owner.

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


2018 ◽  
Vol 1 (29) ◽  
pp. 490-497
Author(s):  
L.A Abdul Rasul A. AL WAILI

Cloud Computing is emerging as one of the high performance and integrity aware area in the distributed and grid based computing environment. Enormous computing and technology based services are delivered and disseminated throughout the globe using cloud implementations because of increasing usage of technology products. As these products and devices are quite costly to purchase, cloud computing gives the option to hire the computing infrastructure with per usage base. As cloud computing is escalating by number of services, there are lots of issues regarding vulnerability and integrity in the data centers from where these cloud services are disseminated. This research manuscript presents and implements a unique and effectual approach for security of data centers using dynamic approach for encryption during communication and accessing the cloud services. The results in the projected novel approach are effective in terms of cost, complexity and overall performance. The projected novel approach is using nature inspired approach River formation dynamics Metaheuristic Approach for the enhancement of results and performance. Keywords – Cloud Computing, Cloud of Things, Nature Inspired Approach, Network Security, River formation dynamics Metaheuristic Approach


2014 ◽  
Vol 13 (9) ◽  
pp. 5011-5014
Author(s):  
Vikas Lonare ◽  
Prof. J.N. Nandimath

Cloud computing is used to provide scalable services which are easily used over the internet as per the requirement. A major feature of the cloud services is that users data are remotely processed in unknown machines that users do not know or users are not operating these machines. While using these services provided by cloud computing, users fear of losing their own data. The content of data can be financial, health, personal. To resolve this problem, we use information accountability in decentralized format to keep track of the usage of the users data over the cloud. It is object oriented approach that enables enclosing our logging mechanism together with users data and apply access policies with respect to users data. We use JAR programming which provides the dynamic and traveling object functionality and to track any access to userâs data will call authentication and automated logging mechanism to the JAR files. Each access to users cloud data will be getting recorded in separate log file. To provide robust users control, distributed auditing functionality is also provided to track the usage of data. The proposed system also provides the authentication mechanism using external channels and also makes a log of user details from which the cloud data is accessed. Only data owner can retrieve the detail log of his data as per requirement. Data owner will provide the type of access to his data and based on that, authorized data user can access the data over the cloud environment.


2021 ◽  
Vol 11 (19) ◽  
pp. 8841
Author(s):  
JoonYoung Lee ◽  
MyeongHyun Kim ◽  
JiHyeon Oh ◽  
YoungHo Park ◽  
KiSung Park ◽  
...  

As the amount of data generated in various distributed environments is rapidly increasing, cloud servers and computing technologies are attracting considerable attention. However, the cloud server has privacy issues, including personal information and requires the help of a Trusted Third Party (TTP) for data sharing. However, because the amount of data generated and value increases, the data owner who produces data must become the subject of data sharing. In this study, we use key aggregate searchable encryption (KASE) technology, which enables keyword search, to efficiently share data without using TTP. The traditional KASE scheme approach only discusses the authority delegation from the data owner to another user. The traditional KASE scheme approach only discusses delegation of authority from the data owner to another user. However, if the delegated entity cannot perform time-critical tasks because the shared data are unavailable, the delegate must further delegate the rights given to other users. Consequently, this paper proposes a new KASE scheme that enables multi-delegation without TTP and includes an authentication technique between the user and the server. After that, we perform informal and formal analysis using BAN logic and AVISPA for security evaluation, and compare the security and performance aspects with existing schemes.


2021 ◽  
pp. 180-184
Author(s):  
Naeem Th. Yousir ◽  
Sami Hasan

Increasing Mobile Device on Cloud Technology will dominate the various industries. Cloud has different data storage and data protecting techniques that based on Data User (DU) and industry’s needs. In this paper, an efficient way of managing user data sharing via Mobile Agent (MA) also called Mobile Proxy (MP) is proposed. The role of Mobile Agent Authorize User to collect the data from Cloud like Proxy and supply data to another Client due to this missing of cloud data is not possible. Instead of access data for all clients, the proxy hold required data and share the customer because of this network reliability, Network Bandwidth, User Congestion, Data Security. Also, this proposed scheme have more functionality like Cloud Authentication, Data Owner (DO) Sending files to Cloud, Sending password, Send Mail and Send SMS. Suppose Data Users need to communicate and share information on Cloud with the help of Mobile Agent only. So, Data Users may be assured that whatever resource required in the cloud with the documents on their Mobile Agent in the office


2020 ◽  
Vol 21 (3) ◽  
pp. 407-424
Author(s):  
Gaurav Deep ◽  
Jagpreet Sidhu ◽  
Rajni Mohana

Computing on the cloud has changed the working of mankind in every manner, from storing to fetching every information on the cloud. To protect data on the cloud various access procedures and policies are used such as authentication and authorization. Authentication means the intended user is access data on the cloud and authorization means the user is accessing only that data for which he is allowed. The intended user now also includes Cyber-Physical Devices. Cyber-Physical Devices share data between them, fetch data from cloud. Cloud data is managed by employees of cloud Companies. Persons sitting on the cloud managing companies data is always doubtful as so many insider attacks have happened in the past affecting the company Image in the market. Data Related to Cyber-Physical Space may come under Insider attack. Companies managing user data are also liable to protect user data from any type of attack under various sections of the Indian IT act. Work in this paper has proposed blockchain as a possible solution to track the activities of employees managing cloud. Employee authentication and authorization are managed through the blockchain server. User authentication related data is stored in blockchain. Authorization rules are written in any Role/Attribute-based access language. These authorization rules stores the data related to user requests allowed access to data in blockchain. Proposed work will help cloud companies to have better control over their employee’s activities, thus help in preventing insider attack on User and Cyber-Physical Devices.


2021 ◽  
Vol 37 (4) ◽  
pp. 429-451
Author(s):  
Phan Duong Hieu ◽  
Moti Yung

Cryptography is the fundamental cornerstone of cybersecurity employed for achieving data confidentiality, integrity, and authenticity. However, when cryptographic protocols are deployed for emerging applications such as cloud services or big data, the demand for security grows beyond these basic requirements. Data nowadays are being extensively stored in the cloud, users also need to trust the cloud servers/authorities that run powerful applications. Collecting user data, combined with powerful machine learning tools, can come with a huge risk of mass surveillance or undesirable data-driven strategies for making profits rather than for serving the user. Privacy, therefore, becomes more and more important, and new techniques should be developed to protect personal information and to reduce trust requirements on the authorities or the Big Tech providers. In a general sense, privacy is ``the right to be left alone'' and privacy protection allows individuals to have control over how their personal information is collected and used. In this survey, we discuss the privacy protection methods of various cryptographic protocols, in particular we review: - Privacy in electronic voting systems. This may be, perhaps, the most important real-world application where privacy plays a fundamental role. %classical authentication with group, ring signatures, anonymous credentials. - Private computation. This may be the widest domain in the new era of modern technologies with cloud computing and big data, where users delegate the storage of their data and the computation to the cloud. In such a situation, ``how can we preserve privacy?'' is one of the most important questions in cryptography nowadays. - Privacy in contact tracing. This is a typical example of a concrete study on a contemporary scenario where one should deal with the unexpected social problem but needs not pay the cost of weakening the privacy of users. Finally, we will discuss some notions which aim at reinforcing privacy by masking the type of protocol that we execute, we call it the covert cryptographic primitives and protocols.


2021 ◽  
pp. 096100062199641
Author(s):  
Irfan Ali ◽  
Nosheen Fatima Warraich

The purpose of this study is to explore Personal Digital Archiving, and its practices, reasons, and challenges in desktop and in ubiquitous environment such as desktop computers, laptops, mobile phones or smartphones, tablets, and cloud services. Moreover, it is also aimed to develop a model of Personal Digital Archiving process for desktop and ubiquitous devices. This study used Preferred Reporting Items for the Systematic Review and Meta-Analysis guidelines for searching and devising, and inclusion and exclusion criteria. The Search was conducted from selected repositories, databases, and core journals, potentially containing studies related with Personal Digital Archiving. Consequently, 21 studies were included through identification, screening, eligibility, and inclusion of studies process. It was found that people used multiple devices such as mobile phones or smartphones along with other devices. It was established that people had also used cloud services with different devices including computers and smartphones or tablets for Personal Digital Archiving. Five major categories of individuals’ Personal Digital Archiving practices, that is, backup, replication or duplication, reorganizing and updating, cleaning or removing, and migration of information were found. Moreover, emotional motives, technological causes, alternative access, easy retrieval, and task completion were the reasons to adopt Personal Digital Archiving. On the basis of findings of selected studies, researchers developed a four steps model of Personal Digital Archiving process, consisting of initiation, identification, action, and evaluation constructs. Personal Digital Archiving challenges were also identified such as the individuals had to face through the use of desktop and ubiquitous devices including technical, fragmented and overloaded information, lack of training and expertise, and psychological and miscellaneous challenges. Personal Digital Archiving process model is based on the extracted data from studies published worldwide, and it is useful for both desktop and ubiquitous devices with reference to Personal Information Management context. The findings of the study will be helpful for software designers and android application developers to design and develop users’ centered Personal Information Management software.


Author(s):  
Steffen Kläbe ◽  
Kai-Uwe Sattler ◽  
Stephan Baumann

AbstractCloud data warehouse systems lower the barrier to access data analytics. These applications often lack a database administrator and integrate data from various sources, potentially leading to data not satisfying strict constraints. Automatic schema optimization in self-managing databases is difficult in these environments without prior data cleaning steps. In this paper, we focus on constraint discovery as a subtask of schema optimization. Perfect constraints might not exist in these unclean datasets due to a small set of values violating the constraints. Therefore, we introduce the concept of a generic PatchIndex structure, which handles exceptions to given constraints and enables database systems to define these approximate constraints. We apply the concept to the environment of distributed databases, providing parallel index creation approaches and optimization techniques for parallel queries using PatchIndexes. Furthermore, we describe heuristics for automatic discovery of PatchIndex candidate columns and prove the performance benefit of using PatchIndexes in our evaluation.


2016 ◽  
Vol 11 (2) ◽  
pp. 287-297 ◽  
Author(s):  
Yinbin Miao ◽  
Jianfeng Ma ◽  
Ximeng Liu ◽  
Zhiquan Liu ◽  
Limin Shen ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document