Cloud storage services are a lot of well-liked today . To secure information from those that don't have access, several encoding schemes are projected. Most of the projected schemes assume cloud storage service suppliers or trustworthy... more
Cloud storage services are a lot of well-liked today . To secure information from those that don't have access, several encoding schemes are projected. Most of the projected schemes assume cloud storage service suppliers or trustworthy third parties handling key management are trustworthy and can't be hacked; but, in follow, some entities could intercept communications between users and cloud storage suppliers and so compel storage suppliers to unleash user secrets by victimisation government power or alternative means that. During this case, encrypted information are assumed to be identified and storage suppliers are requested to unleash user secrets. Since it's tough to fight against outside coercion, we tend to aimed to create Associate in Nursing encoding theme that might facilitate cloud storage suppliers avoid this plight. We provide cloud storage suppliers means that to make pretend user secrets. Given such pretend user secrets, outside coercers will solely obtained solid information from a user’s keep cipher text. Once coercers suppose the received secrets are real, they'll be happy and a lot of significantly cloud storage suppliers won't have discovered any real secrets. Therefore, user privacy continues to be protected.
— Cloud computing is a kinds of computing that depend on distribution computing resources before having local servers or own devices to knob applications. Cloud computing is equivalent to grid computing, In the cloud is a kind of... more
— Cloud computing is a kinds of computing that depend on distribution computing resources before having local servers or own devices to knob applications. Cloud computing is equivalent to grid computing, In the cloud is a kind of computing where vacant handing out rounds of the entire computers in a network are harnesses to solved the concerns also focused for some stand-alone mechanism. Cloud computing security mentions to the group of processes, procedures and standards designed to deliver information security guarantee in a cloud environment. Cloud computing security comprises both logical and physical security concerns across all the diverse various models of software platform, infrastructure and software. It also defines how these services are delivered (public, private or hybrid delivery model).
Regarding the increasingly expanded utility of Cloud storage, the improvement of resources management in the shortest time to respond upon the users’ requests and the geographical constraints is of prime importance to both the Cloud... more
Regarding the increasingly expanded utility of Cloud storage, the improvement of resources management in the shortest time to respond upon the users’ requests and the geographical constraints is of prime importance to both the Cloud service providers and the users. Since the Cloud storage systems are exposed to failure, fault-tolerance is appraised by Cloud storage systems’ capability for responding to unexpected fault through software or hardware. This paper represents an algorithm based on Learning Automata–oriented approach to fault tolerance data in Cloud storage regarding traffic and query loads dispatched on data centers and learning automata that provides the best possible status for scaling up or down of data nodes. Based on appraisal of traffic on nodes, the node with the highest traffic is chosen for coping among physical nodes. The experimental results indicate that the proposed Learning Automata Fault-Tolerant and High-efficient Replication algorithm (LARFH) has utilization high replication, high query efficiency, low cost and high availibility in comparison with other similar approaches.
E-medical systems play a quite essential role in the digital transformation of health care record, which allows a patient or the user to create, manage, and control its private Personal Health Record (PHR) through the internet [1][2].... more
E-medical systems play a quite essential role in the digital transformation of health care record, which allows a patient or the user to create, manage, and control its private Personal Health Record (PHR) through the internet [1][2]. Most of the E-Medical record services are outsourced to a third-party that is public cloud. However, such outsourcing of data may lead to a variety of privacy and security related issues because of the risk of information leakage. To avoid such problems, we are developing systems in which data will be encrypted using 3DES algorithm before uploading to the cloud. Subsequently, only the authorized client who has the key or permissions can decrypt the data. E-Medical records are basically sensitive and should be stored in database in encrypted form. Once medical records are encrypted and outsourced, the cloud server can no longer perform keyword search, because the server is not expected to obtain any information about the records. Hence, the goal of the project is to provide security to personal health records where data needs to be kept private.
Cloud Computing is seen as greatly accessible computing resources as an outward service granted from the world wide web. As an economical view, the cloud computing key is that consumers are free to use whatever they want, and pay for the... more
Cloud Computing is seen as greatly accessible computing resources as an outward service granted from the world wide web. As an economical view, the cloud computing key is that consumers are free to use whatever they want, and pay for the services they want. The accessibility of the resources from the cloud is obtainable whenever users want and wherever they are. Therefore, users are free to purchase the IT service that they want and they do not have to be concern more about the manner that maintainable things can be beyond the positions. New model for data storage computing which considers as a web-based generation utilizes remote servers. The challenging needed to be undertook in cloud computing is the safety of information of service sources' site. Thus, this study suggests that designing new construction for the security of information storage with variety functions where information encrypted and split into many cipher blocks and disseminated between a large number of services suppliers locations instead of merely relying on only one supplier for information storage. Proposed based in the new architecture, it is applicable to ensure a better security, availability and reliability.
Cloud Storage Systems are increasingly noticed now-a-days as they are promising elastic capability and high reliability at low cost. In these services, the files are stored in an authenticated cloud storage service center. The most... more
Cloud Storage Systems are increasingly noticed now-a-days as they are promising elastic capability and high reliability at low cost. In these services, the files are stored in an authenticated cloud storage service center. The most important feature is storage is adjusted dynamically, and there won’t be any worry about space being inadequate or wasted. This paper presents a solution for deploying an Object Cloud Storage Service System based on the open-source cloud Operating System OpenStack and Swift.
Data are one of the major and core assets of every organization. Obviously there is a need for the data of any organization to be stored. There are different types of storage devices catering for different characteristics such as... more
Data are one of the major and core assets of every organization. Obviously there is a need for the data of any organization to be stored. There are different types of storage devices catering for different characteristics such as capacity, scalability, reliability, performance, and cost. Navigating and selecting a suitable storage device for a given purpose requires an understanding of the different storage devices available. The objective of this chapter is to describe the various storage devices, how they have progressed from being conventional storage devices to cloud storage devices, and how data and the need for digitization have evolved.
Blockchain Technology is an emerging technology in the software world. In order to understand the applications of the blockchain, it is necessary to understand how blockchain works. Blockchain was first introduced by Satoshi Nakamoto in... more
Blockchain Technology is an emerging technology in the software world. In order to understand the applications of the blockchain, it is necessary to understand how blockchain works. Blockchain was first introduced by Satoshi Nakamoto in 2008, which serve a Peer-to-Peer ledger for registering cryptocurrency bitcoin transactions. The blockchain is a list of records stored in the form of a chain. A blockchain is a decentralized distributed ledger which means a number of records are stored in a block and the block is added to the chain. Each block consists of a number of transactions for each transaction there will be a unique hash value, all hash values of the number of the transaction are combined and made a single hash value of the block and this follows Merkle root hash method. The invention of blockchain in cryptocurrency bitcoin solved the issue of double spending. The invention of blockchain in data backup can decrease the security complexity and duplication of the data. Rather than storing the data in one single hub that is the centralized system we can store the data in the blockchain which is a decentralized distributed ledger. In this decentralized system, the file is divided into a number of chunks stored into the blockchain which makes it difficult for data hacking and data tampering. In a centralized system if a server goes down then data is lost forever and in centralized system records can easily be altered because it does not have a backup to verify the records but in the blockchain, every peer in the network has the copy of the records and it is difficult to tamper the records. The files can be divided by a technology called Reed-Soloman erasure coding, generally used in CDs and DVDs. Reed-Soloman erasure coding allows dividing files in a redundant manner, where any 1 of 3 segments can fully recover a user's file.
Komputer awan merupakan topik baru dalam dunia komputer dan penggunaannya masih terbatas oleh beberapa pengguna saja. Untuk itu penulis melakukan studi literatur tentang komputer awan. Dalam artikel ini penulis menuangkan hasil studinya... more
Komputer awan merupakan topik baru dalam dunia komputer dan penggunaannya masih terbatas oleh beberapa pengguna saja. Untuk itu penulis melakukan studi literatur tentang komputer awan. Dalam artikel ini penulis menuangkan hasil studinya mengenai komputer awan dan penerapannya dalam pengolahan data. Diharapkan tulisan ini dapat menjadi bahan bacaan atau referensi bagi kalangan akademisi, pengguna komputer lainnya terutama para penggiat, administrator jaringan komputer dan para pengolah data.
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the cloud, the data is transferred among the server and client. High speed is the important issue in networking. Cloud security is the current... more
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the cloud, the data is transferred among the server and client. High speed is the important issue in networking. Cloud security is the current discussion in the IT world. This research paper helps in securing the data without affecting the network layers and protecting the data from unauthorized entries into the server, the data is secured in server based on users’ choice of security method so that data is given high secure priority. Cloud Computing has been fancied as the next generation architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well unde...
Cloud storage is a service where data is remotely maintained, managed and backed up. The service is available to users over a network, which is usually the internet. It allows the user to store files online so that the user can access... more
Cloud storage is a service where data is remotely maintained, managed and backed up. The service is available to users over a network, which is usually the internet. It allows the user to store files online so that the user can access them from any location via the internet. The provider company makes them available to the user online by keeping the uploaded files on an external server. This gives companies using cloud storage services ease and convenience, but can potentially be costly. Users should also be aware that backing up their data is still required when using cloud storage services because recovering data from cloud storage is much slower than the local backup. Although there are downsides to cloud storage, many organizations believe the benefits to far outweigh the risks. The cost savings, disaster-recovery, security, and accessibility are just a few intriguing benefits to businesses. Cloud storage can reduce costs, simplify IT management, improve user experience, and allow employees to work and collaborate from remote locations. This simplifies sharing and collaboration among staff and easing IT logistics as a whole.
A reliability model for the hard disk drive (HDD) is developed, focusing on head-disk separation as the primary independent variable. Among the many factors contributing to reliability, the role of water vapor is described for the first... more
A reliability model for the hard disk drive (HDD) is developed, focusing on head-disk separation as the primary independent variable. Among the many factors contributing to reliability, the role of water vapor is described for the first time. An experimental method based on magnetic spacing loss theory is used to characterize the head-media separation as a function of temperature, altitude, humidity, and HDD operating mode. A statistical model based on these empirical data is developed to predict HDD reliability for various operating conditions. The predictive capability of the model is verified experimentally through application to HDD product reliability test data.
The present essay is organized into five main sections. We begin with a few preliminary remarks about “cloud computing, ” which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen... more
The present essay is organized into five main sections. We begin with a few preliminary remarks about “cloud computing, ” which are developed more fully in a later section. This is followed by a brief overview of the evolution of Helen Nissenbaum’s framework of “privacy as contextual integrity. ” In particular, we examine Nissenbaum’s “Decision Heuristic ” model, described in her most recent work on privacy (Nissenabum 2010), to see how it enables the contextual-integrity framework to respond to privacy challenges posed by new and emerging technologies. We then apply that heuristic device to questions surrounding one aspect of cloud computing – viz., “cloud storage ” technology. In particular, we focus on current practices affecting Google Docs as an instance of a cloud-storage system.
Cloud storage services are widely getting acceptance and gaining popularity, since it is used mostly by companies and students in Malaysian higher learning institutions. While cloud storage services got popular within last two years, most... more
Cloud storage services are widely getting acceptance and gaining popularity, since it is used mostly by companies and students in Malaysian higher learning institutions. While cloud storage services got popular within last two years, most of the people are still trying to adapt to this new technology and some people still does not fully understand what cloud storage services are. In this paper, the authors present the results and an analysis of survey conducted on the awareness and concerns of Malaysians about cloud storage services, and its forensics and security issues. Questionnaires were administered to two hundred fifty users of cloud storage in Malaysia and fifty to the public to get the responses of people, especially student concerning about the cloud storage services. The responses from participants revealed valuable information about the public awareness and knowledge on cloud services. Relevant areas that required improvements are also investigated and discussed in this paper.
People used to carry their documents about on CDs only a few years ago. Many people have recently turned to memory sticks. Cloud computing, in this case, refers to the capacity to access and edit data stored on remote servers from any... more
People used to carry their documents about on CDs only a few years ago. Many people have recently turned to memory sticks. Cloud computing, in this case, refers to the capacity to access and edit data stored on remote servers from any Internet-connected platform. Cloud computing is a self-service Internet infrastructure that allows people to access computing resources at any location worldwide. The world has altered as a result of cloud computing. Cloud computing can be thought of as a new computing typology that can provide on-demand services at a low cost. By increasing the capacity and flexibility of data storage and providing scalable compute and processing power that fits the dynamic data requirements, cloud computing has aided the advancement of IT to higher heights. In the field of information technology, privacy and data security have long been a serious concern. It becomes more severe in the cloud computing environment because data is stored in multiple locations, often acr...
The concept of cloud computing becomes more popular in latest years. Data storage is very important and valuable research field in cloud computing. Cloud based file sharing is a file sharing security in cloud. The required security from... more
The concept of cloud computing becomes more popular in latest years. Data storage is very important and valuable research field in cloud computing. Cloud based file sharing is a file sharing security in cloud. The required security from unauthorized access of the file in the cloud is provided by the encryption and decryption function. The admin can provide file access option to the authorized users. This facility limits the number and time of access of the shared files by the admin for the authorized user. Cloud data storage technology is the core area in cloud computing and solves the data storage mode of cloud environment. This project introduces the concept of cloud computing and cloud storage as well as the architecture of cloud storage firstly. Then we analyze the cloud data storage technology amazon web services, wasabi, Digital Ocean etc. We will improve the traditional file storage method and we will make a platform which will get more privileges.
— With technological advancements and constant changes of Internet, cloud computing has been today's trend. With the lower cost and convenience of cloud computing services, users have increasingly put their Web resources and information... more
— With technological advancements and constant changes of Internet, cloud computing has been today's trend. With the lower cost and convenience of cloud computing services, users have increasingly put their Web resources and information in the cloud environment. Increasing data volume is giving the bigger task of Data Centers to provide a better quality of cloud computing. The main usage of cloud computing is data storage. It is more reliable and flexible to users to store and retrieve their data at anytime and anywhere. the security of cloud computing plays a major role in the cloud computing, as customers often store important information with cloud storage providers but these providers may be unsafe. Customers are wondering about attacks on the integrity and the availability of their data in the cloud from malicious insiders and outsiders, and from any collateral damage of cloud services. These issues are extremely significant but there is still much room for security research in cloud computing. This paper presents a framework for global data security of the cloud with two-level Security model. The proposed framework is intended for adapting a system and the framework allows the network service provider to deploy a security in different data centers dynamically while the customers need more security for increasing the data storage.
Multi-client framework for access control to datasets set away in an untrusted cloud condition. Appropriated storing like some other untrusted condition needs the capacity to check share data. Our framework gives a path of authority over... more
Multi-client framework for access control to datasets set away in an untrusted cloud condition. Appropriated storing like some other untrusted condition needs the capacity to check share data. Our framework gives a path of authority over the informational index away in the cloud without the supplier adventure. The fundamental instrument of access control structure is the figure content arrangement trademark based encryption plot with dynamic properties. Utilizing a blockchain based decentralized record, our framework gives the steady log of all vital security occasions, for example, key age, get the chance to strategy undertaking, change or refusal, and get the chance to ask for. We propose a huge amount of cryptographic conventions guaranteeing the security of cryptographic endeavors requiring conundrum or private keys. Just ciphertexts of hash codes are exchanged through the blockchain record. The model of our structure is acknowledged utilizing sharp contracts and endeavored on square chain sort out. Here is proposed structure as a customer if they are going to enroll in that account director will give assorted keys to each customer it takes after a private key in the wake of selecting a customer they can log in and they can exchange all of the reports what they need while exchanging time the substance everything will be encoded and for that one open key will be produce these all will be secured in cloud database. As a customer they have an alternate privet key which was given by the manager so they can log in and they can get to that account if they have to exchange they can exchange else they have to get any record they can get that record by using of cloud they can see all the customer archives if they need any record they have to send sales to executive .if overseer to recognize that request they can get that interface if the customer need that record they have to click that record in case you clicked that archive, by then it will be asked first it will ask private key. Obviously, it will ask with respect to whether two keys was composed then nobody however they can prepared to download else they can't prepared to down weight .
Today, gas leakage and detection are important issues in our everyday lives. Gas waste is also a big issue that must be addressed. LPG gas is very combustible and can endanger both people and property. To avoid such scenarios, substantial... more
Today, gas leakage and detection are important issues in our everyday lives. Gas waste is also a big issue that must be addressed. LPG gas is very combustible and can endanger both people and property. To avoid such scenarios, substantial effort has been given to the development of accurate systems for detecting gas leaks. Because simply knowing that a leak exists isn't always enough to initiate remedial action, several leak detection techniques were created to provide for the potential of identifying the leak. Our goal is to use the Internet of Things to decrease hazards in the kitchen. The main goal is to propose the design and implementation of a Gas Leakage Alert System based on SMS. Gas sensors are used in kitchens to detect gas leaks. The issue of gas wastage is also checked with the assistance of an infrared sensor. When the sensor detects no vessel over the burner for an extended length of time, an alert is triggered.
Cloud storage systems play a key role in many cloud services. To tolerate multiple simultaneous disk failures and reduce the storage overhead, today cloud storage systems often employ erasure coding schemes. To simplify implementations,... more
Cloud storage systems play a key role in many cloud services. To tolerate multiple simultaneous disk failures and reduce the storage overhead, today cloud storage systems often employ erasure coding schemes. To simplify implementations, existing systems, such as MicrosoftAzure and EMC Atmos, only support file appending operations. However, this feature leads to a nontrivial and increasing portion of redundant data on cloud storage systems.
To reduce the data redundancy due to file updates by users so as to reduce the corresponding encoding and storage cost, in this work, we investigate how to efficiently integrate the inline deduplication capability into the general context of the Reed-Solomon (RS) code. For this purpose, we present our initial design of CodePlugin. Basically, CodePlugin introduces some preprocessing steps before the normal encoding. In these pre-processing steps, the data duplications are identified and properly shuffled so that the redundant blocks do not have to be encoded. CodePlugin is applicable to any existing coding scheme and our preliminary experimental results show that CodePlugin can effectively improve the encoding throughput (by ~20%) and reduce the storage cost (by ~17.4%).
Las bibliotecas han funcionado por mucho tiempo como depósitos de información, a la cual facilitan el acceso recogiéndola y preservándola. Actualmente el entorno ha cambiado y las bibliotecas se enfrentan al reto de contener un creciente... more
Las bibliotecas han funcionado por mucho tiempo como depósitos de información, a la cual facilitan el acceso recogiéndola y preservándola. Actualmente el entorno ha cambiado y las bibliotecas se enfrentan al reto de contener un creciente volumen de información digital, de ahí que son necesarias las tecnologías de información masiva. Este trabajo tiene como propósito revisar los métodos de sistemas de almacenamiento de datos masivos, por lo cual se describen y analizan cuatro tipos de tecnologías de almacenamiento en datos: DAS, NAS, SAN y almacenamiento en nube; para ello se utilizó el método documental. Se encontró escasa literatura sobre los sistemas de almacenamiento digital vistos desde la perspectiva de las ciencias de la información, razón por la cual se retoman publicaciones del área de ciencias de la computación e ingeniería en sistemas para comprender el tópico. Se concluye que el almacenamiento de los datos en la era digital se lleva a cabo de forma concentrada y distribuida.
Libraries have long functioned as information repositories, providing access to it by collecting and preserving data. In the present, environment has changed, so libraries are challenged to contain an increasing volume of digital information, hence the massive information technologies are needed. The aim of this paper is revising methods of storage systems for massive data; therefore, four types of data storage technologies, which are DAS, NAS, SAN and cloud storage are described and analyzed using the documentary method. It was found scarce literature on digital storage systems viewed from the perspective of information science; for this reason, publications in the field of computer science and engineering systems were used in order to understand the topic. It is concluded that storing data in the digital age is carry out in concentrated and distributed form.
Cloud storage is a service that moves user‟s data into large data centers. Here datas are remotely located, maintained, managed and backed up through internet. Cloud provides the way for check the integrity of user‟s data if he can‟t... more
Cloud storage is a service that moves user‟s data into large data centers. Here datas are remotely located, maintained, managed and backed up through internet. Cloud provides the way for check the integrity of user‟s data if he can‟t access the data physically. In this paper we provide the proof of retrievability (POR) scheme to ensure the data integrity in cloud based on SLA (service level agreement). In addition we provide a dynamic audit service for verifying the integrity of outsourced and untrusted storage of data by using method based on probabilistic query and periodic verification for improving the performance of audit services
Abstract. The ever growing technology has resulted in the need for storing and processing excessively large amounts of data on cloud. The current volume of data is enormous and is expected to replicate over 650 times by the year 2014, out... more
Abstract. The ever growing technology has resulted in the need for storing and processing excessively large amounts of data on cloud. The current volume of data is enormous and is expected to replicate over 650 times by the year 2014, out of which, 85% would be unstructured. This is known as the ‘Big Data’ problem. The techniques of Hadoop, an efficient resource scheduling method and a probabilistic redundant scheduling, are presented for the system to efficiently organize "free" computer storage resources existing within enterprises to provide low-cost high-quality storage services. The proposed methods and system provide valuable reference for the implementation of cloud storage system. The proposed method includes a Linux based cloud.
Infrastructure as a Service is a form of cloud computing that provides virtualized computing resources over the Internet. This paper provides a short overview of how to create instance based on user request and how to set priority and... more
Infrastructure as a Service is a form of cloud computing that provides virtualized computing resources over the Internet. This paper provides a short overview of how to create instance based on user request and how to set priority and schedule the instance. In this project use generalized priority algorithm and PSO (particle swarm optimization based scheduling) to manage the instance. The use of generalized priority algorithm is to prioritize the user requests based on size, Memory and bandwidth and also use to rank the instance based on cloudlet. The working procedure of PSO used to outsource its task to external clouds when its own resources are not sufficient to meet the demand and at the same time guarantee the QoS (Quality of Service). It is similar to outsourcing during hike period. Users also can store their data to cloud. By the help of advanced encryption standard and diff algorithm increase reliability and efficiency by encrypting user files and remove duplicate data from cloud.
The essential function of the learning management system (LMS) is to manage and the learning object. Therefore, storage capacity becomes critical component when the content and the user is growing. Some of the existing LMS experience... more
The essential function of the learning management system (LMS) is to manage and the learning object. Therefore, storage capacity becomes critical component when the content and the user is growing. Some of the existing LMS experience problems to store many files because of limited storage capacity and also the inability of the LMS has scalability on the storage. This paper makes an effort to improve the LMS capability on storage capacity by integrating the LMS storage with the cloud storage. Specifically, this paper proposes low cost consumer cloud storage to be used for storage extension on the LMS. This paper discusses about the comparison between several consumer cloud storage and its integration strategy. As a result, this paper can be a consideration when choosing a cloud storage for LMS or e-learning.
The focus of this paper is to secure sensitive data on smartphones using cloud infrastructure. Nevertheless, the biggest challenge is data security. This work, therefore, addresses the issues of security of user data by using cloud... more
The focus of this paper is to secure sensitive data on smartphones using cloud infrastructure. Nevertheless, the biggest challenge is data security. This work, therefore, addresses the issues of security of user data by using cloud storage with the development of Solo App v2.1 android application which adopted an Advanced Encryption Standard (AES) for maintaining the confidentiality of data. This will enable smartphones data to remain secure either at rest or in transit. Since numerous threats to mobile phones nowadays have made the issue of security of data on smartphones very critical, hence, the need for the development of such application. Three Android devices were used for the experiments to implement the application. The results are presented using time performance metrics that is based on encryption time and decryption time for each device. The results showed that the work can effectively protect user sensitive data with speed using cloud and when compared with existing works, the results are satisfactory.
In present day technological generation still, maximum of the housing societies use the old-age conventional technique for the administration work of the society. The bill generation is still done manually for each society member, and... more
In present day technological generation still, maximum of the housing societies use the old-age conventional technique for the administration work of the society. The bill generation is still done manually for each society member, and there can be hundreds of them, which is time-consuming. Keeping records of those bills and keeping track of their status is a harrowing process. All the information of the members and society's accounts is not safe on the papers. The proposed application is android based, which makes it easier for all the members to adopt it. This is enforced with Two-Factor Authentication making it fairly secure. The Admin can easily generate and view bills and monitor the billing status of all the members. The members will get notified of their pending bills. Other facilities provided in this app are a platform for scheduling events and meetings, making announcements and providing a summary of the meeting. So this app takes care of the overall needs of a housing society.
Cloud security is the most critical task while considering its working environment, i.e. outsourced, distributed and utility based. In such cases making the users data confidential, increases the trust over the system. Also the security... more
Cloud security is the most critical task while considering its working environment, i.e. outsourced, distributed and utility based. In such cases making the users data confidential, increases the trust over the system. Also the security procedure does not make the availability affected in any ways. The users of these kind of systems is always retained the services and securities preliminaries with respect to the data itself. As the cloud user can access its data frequently and if here some encryption is used which requires decryption and the repetitive process continues to increase the overheads. It requires some mechanism in which encryption is performed and if the user requires to perform some operations on secure file without decrypting it can be fulfilled. Thus homomorphic encryption lets the user facilitates about the performing operations on encrypted data which reduces the complexity of confidentiality operations. Also to prevent Cloud Servers from being able to learn both the data file contents and user access privilege information used to generate key along with the fastest access of secured data by using Attribute-based encryption (ABE).
Libraries have long functioned as information repositories, providing access to it by collecting and preserving data. In the present, environment has changed, so libraries are challenged to contain an increasing volume of digital... more
Libraries have long functioned as information repositories, providing access to it by collecting and preserving data. In the present, environment has changed, so libraries are challenged to contain an increasing volume of digital information, hence the massive information technologies are needed. The aim of this paper is revising methods of storage systems for massive data; therefore, four types of data storage technologies, which are DAS, NAS, SAN and cloud storage are described and analyzed using the documentary method. It was found scarce literature on digital storage systems viewed from the perspective of information science; for this reason, publications in the field of computer science and engineering systems were used in order to understand the topic. It is concluded that storing data in the digital age is carry out in concentrated and distributed form.
RFID was considered as an advanced technology for automatic identification of objects. RFID makes usage of radio alerts to discover, tune, kind and stumble on an expansion of items. Security prerequisite is necessary in most of the... more
RFID was considered as an advanced technology for automatic identification of objects. RFID makes usage of radio alerts to discover, tune, kind and stumble on an expansion of items. Security prerequisite is necessary in most of the applications. User's Authentication at the end of the RFID technology creates one of the major attacks on the system. A crucial challenge in RFID technology research is to provide efficient protection for the systems against tag cloning and information modification. In this paper, we have proposed a system where the information has to be more secured than existing system. We have used an encrypt-decrypt tools which is used for encryption and decryption of the information by a decryption keywords. The encrypted information can be saved to the local database or online cloud storage. But the main advantage of our proposed system is that the whole operation has worked with windows OS. Besides we also analyze the runtime for our system for a particular data and get a relatively better consuming runtime. Safety requirement is critical this packages. Our framework can be used to minimize the unauthorized usage of RFID Card information and focus on the runtime.
Security is provided for data according to the requirements of client. Cloud computing provides different types of services. Apart from the advantages of cloud, it has many security related issues. The topmost challenge in cloud is data... more
Security is provided for data according to the requirements of client. Cloud computing provides different types of services. Apart from the advantages of cloud, it has many security related issues. The topmost challenge in cloud is data security. There are more possibilities that the data are accessed by the other users of cloud storage. Data security must be addressed in the cloud storage. Cryptography is the most known technique for securing the data by encryption. It is necessary to propose encryption techniques which are suitable for cloud storage. Every cloud computing provides the different level of security. The aim of this study is to improve on the security of data or file stored on cloud storage using hybrid cryptographic algorithms for encryption. The algorithms are designed in such a way that one authenticates the authorized user and the other provides confidentiality and security for data stored on cloud.
Volume 2, Issue 4 July – August 2013 Page 342 Abstract: Cloud computing is a general term for anything that involves delivering hosted services over the Internet. Instead of running programs and data on an individual desktop computer,... more
Volume 2, Issue 4 July – August 2013 Page 342 Abstract: Cloud computing is a general term for anything that involves delivering hosted services over the Internet. Instead of running programs and data on an individual desktop computer, everything is hosted in the “cloud”. It offers a major change in how to store information and run applications. One of the primary uses of cloud computing is for data storage. With cloud storage, data is stored on multiple third-party servers, rather than on the dedicated servers used in traditional distributed data storage. In cloud storage, the user sees a virtual server; it appears as if the data is stored in a particular place with a specific name. But that place doesn’t exist in reality. It’s just to reference a virtual space in the cloud. This paper gives a quick introduction to cloud storage. It discusses the need for cloud storage, the main developing requirements and the challenges to cope with the changing IT and business environment. It revi...