Efficient Share Generator for Slicing and Securely Retrieving the Cloud-Hosted Heterogeneous Multimedia Data

2021 ◽  
pp. 20-32
Author(s):  
admin admin ◽  

Recently, the security of heterogeneous multimedia data becomes a very critical issue, substantially with the proliferation of multimedia data and applications. Cloud computing is the hidden back-end for storing heterogeneous multimedia data. Notwithstanding that using cloud storage is indispensable, but the remote storage servers are untrusted. Therefore, one of the most critical challenges is securing multimedia data storage and retrieval from the untrusted cloud servers. This paper applies a Shamir Secrete-Sharing scheme and integrates with cloud computing to guarantee efficiency and security for sensitive multimedia data storage and retrieval. The proposed scheme can fully support the comprehensive and multilevel security control requirements for the cloud-hosted multimedia data and applications. In addition, our scheme is also based on a source transformation that provides powerful mutual interdependence in its encrypted representation—the Share Generator slices and encrypts the multimedia data before sending it to the cloud storage. The extensive experimental evaluation on various configurations confirmed the effectiveness and efficiency of our scheme, which showed excellent performance and compatibility with several implementation strategies.

2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Ruoshui Liu ◽  
Jianghui Liu ◽  
Jingjie Zhang ◽  
Moli Zhang

Cloud computing is a new way of data storage, where users tend to upload video data to cloud servers without redundantly local copies. However, it keeps the data out of users' hands which would conventionally control and manage the data. Therefore, it becomes the key issue on how to ensure the integrity and reliability of the video data stored in the cloud for the provision of video streaming services to end users. This paper details the verification methods for the integrity of video data encrypted using the fully homomorphic crytosystems in the context of cloud computing. Specifically, we apply dynamic operation to video data stored in the cloud with the method of block tags, so that the integrity of the data can be successfully verified. The whole process is based on the analysis of present Remote Data Integrity Checking (RDIC) methods.


2015 ◽  
pp. 1432-1449
Author(s):  
M. Sundaresan ◽  
D. Boopathy

Cloud storage systems can be considered to be a network of distributed datacenters that typically use cloud computing technology like virtualization and offer some kind of interface for storing data. To increase the availability of the data, it may be redundantly stored at different locations. Basic cloud storage is generally not designed to be accessed directly by users but rather incorporated into custom software using API. Cloud computing involves other processes besides storage. In this chapter, the authors discuss different viewpoints for cloud computing from the user, legal, security, and service provider perspectives. From the user viewpoint, the stored data creates a mirror of currently available local data. The backup feature allows users to recover any version of a previously stored data. Synchronization is the process of establishing consistency among the stored data. From the legal viewpoint, provisions regulating the user processing and storage of the data must have to be constant from when the data is stored in the cloud. The security viewpoint requires interaction with the Web application, data storage, and transmission. The service provider viewpoint requires the maximum level of cloud storage service at the minimum cost.


Author(s):  
Sadiq J. Almuairfi ◽  
Mamdouh Alenezi

Cloud computing technology provides cost-saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner's private information because the data owners lose control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. Anonymous Authentication Scheme will be proposed in this chapter as the most relatable, applicable, and appropriate techniques to be adopted by the cloud computing professionals for the eradication of risks that have been associated with the risks and challenges of privacy.


Author(s):  
Sadiq J. Almuairfi ◽  
Mamdouh Alenezi

Cloud computing technology provides cost-saving and flexibility of services for users. With the explosion of multimedia data, more and more data owners would outsource their personal multimedia data on the cloud. In the meantime, some computationally expensive tasks are also undertaken by cloud servers. However, the outsourced multimedia data and its applications may reveal the data owner's private information because the data owners lose control of their data. Recently, this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data. Anonymous Authentication Scheme will be proposed in this chapter as the most relatable, applicable, and appropriate techniques to be adopted by the cloud computing professionals for the eradication of risks that have been associated with the risks and challenges of privacy.


2011 ◽  
pp. 119-122
Author(s):  
Sonali Ajankar ◽  
Sanjay Nalbalwar ◽  
Z. A. Usmani

2013 ◽  
Vol 50 (5) ◽  
pp. 20-28
Author(s):  
M. Kurmis ◽  
D. Dzemydiene ◽  
R. Didziokas ◽  
J. Trokss

Abstract Storage and retrieval of space signals require an advanced set of core technologies that can be implemented with a cloud computing paradigm. In this work we propose a cloud computing solution for the distributed space data storage and access in mobile communication networks. The modeling and simulation results show that the proposed solution performs satisfactorily in the space data processing. In the future, experimental verification of the cloud computing model and its implementation are envisaged.


2015 ◽  
Vol 6 (2) ◽  
pp. 249
Author(s):  
Asril Basry

ABSTRAK Mitigasi dalam mengurangi risiko kerusakan data dimana bencana yang dimaksud seperti terjadi kebakaran , bencana alam , perang dll sehingga dapat menyebabkan kerusakan pada infrastruktur teknologi informasi dalam hal ini adalah media penyimpanan data. Salah satu strategi yang dilakukan suatu perusahaan adalah membuat perencanaan mitigasi kerusakan dengan memanfaatkan teknologi penyimpanan data yang berbasiskan cloud. Adapun cloud storage merupakan salah satu bagian dari cloud computing yang dilakukan oleh pihak penyedia layanan ini atau internet provider. Perusahaan harus memiliki strategi penyimpanan data berbasiskan cloud dengan menyalin atau back up data kedalam cloud storage dengan diupdate atau dimutakhirkan secara berkala sehingga jika suatu kondisi terjadi bencana yang menyebabkan tidak berfungsinya fasilitas dan infrastruktur teknologi informasi dalam hal ini media penyimpanan data ( data storage ) , maka perusahan dapat melanjutkan pengolahan data dengan menggunakan data yang disimpan dalam penyimpanan data yang berbasiskan cloud, adapun dalam penyimpanan data yang berbasiskan cloud tetap menjamin terhadap keamanan dan kerahasian data perusahaan. Kata kunci: mitigasi, strategi, pemulihan, bencana, penyimpanan awan, keamanan.


2019 ◽  
pp. 1440-1459
Author(s):  
Sara Usmani ◽  
Faiza Rehman ◽  
Sajid Umair ◽  
Safdar Abbas Khan

The novel advances in the field of Information Technology presented the people pleasure, luxuries and ease. One of the latest expansions in the Information Technology (IT) industry is Cloud Computing, a technology that uses the internet for storage and access of data. It is also known as on-demand computing. The end user can access personal data and applications anywhere any time with a device having internet. Cloud Computing has gained an enormous attention but it results in the issues of data security and privacy as the data is scattered on different machines in different places across the globe which is a serious threat to the technology. It has many advantages like flexibility, efficiency and scalability but many of the companies are hesitant to invest in it due to privacy concerns. In this chapter, the objective is to review the privacy and security issues in cloud storage of Big Data and to enhance the security in cloud environment so that end users can enjoy a trustworthy and reliable data storage and access.


2013 ◽  
Vol 756-759 ◽  
pp. 1275-1279
Author(s):  
Lin Na Huang ◽  
Feng Hua Liu

Cloud storage of high performance is the basic condition for cloud computing. This article introduces the concept and advantage of cloud storage, discusses the infrastructure of cloud storage system as well as the architecture of cloud data storage, researches the details about the design of Distributed File System within cloud data storage, at the same time, puts forward different developing strategies for the enterprises according to the different roles that the enterprises are acting as during the developing process of cloud computing.


Sign in / Sign up

Export Citation Format

Share Document