Enviar búsqueda
Cargar
50120140504001
•
0 recomendaciones
•
318 vistas
IAEME Publication
Seguir
Tecnología
Empresariales
Denunciar
Compartir
Denunciar
Compartir
1 de 10
Descargar ahora
Descargar para leer sin conexión
Recomendados
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
IRJET Journal
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
neirew J
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
IRJET Journal
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
Editor IJARCET
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
CSCJournals
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFS
IRJET Journal
Recomendados
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
IRJET Journal
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
neirew J
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
IRJET Journal
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
Editor IJARCET
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
CSCJournals
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFS
IRJET Journal
50620130101004
50620130101004
IAEME Publication
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
ijiert bestjournal
Iaetsd time constrained self-destructing
Iaetsd time constrained self-destructing
Iaetsd Iaetsd
WJCAT2-13707877
WJCAT2-13707877
Nilotpal Choudhury
50120140507005 2
50120140507005 2
IAEME Publication
Gre322me
Gre322me
f95346
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
IJSRD
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...
IJERA Editor
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
A scalabl e and cost effective framework for privacy preservation over big d...
A scalabl e and cost effective framework for privacy preservation over big d...
amna alhabib
Survey on cloud backup services of personal storage
Survey on cloud backup services of personal storage
eSAT Journals
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
IJERA Editor
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET Journal
S.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage services
kalaiselvanresearch
30120140502004 2
30120140502004 2
IAEME Publication
Marksheet
Marksheet
jennifer_lawrence
Colegio blás infante
Colegio blás infante
Parque Infantil De Tráfico de Vícar
Keek advertising
Keek advertising
john896
Storytelling Bestias
Storytelling Bestias
Gabriel Andrés del Campo Araya
twitter e blaving parte 2
twitter e blaving parte 2
Marcelo Silva
Más contenido relacionado
La actualidad más candente
50620130101004
50620130101004
IAEME Publication
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
ijiert bestjournal
Iaetsd time constrained self-destructing
Iaetsd time constrained self-destructing
Iaetsd Iaetsd
WJCAT2-13707877
WJCAT2-13707877
Nilotpal Choudhury
50120140507005 2
50120140507005 2
IAEME Publication
Gre322me
Gre322me
f95346
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
IJSRD
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...
IJERA Editor
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
A scalabl e and cost effective framework for privacy preservation over big d...
A scalabl e and cost effective framework for privacy preservation over big d...
amna alhabib
Survey on cloud backup services of personal storage
Survey on cloud backup services of personal storage
eSAT Journals
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
IJERA Editor
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET Journal
S.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage services
kalaiselvanresearch
La actualidad más candente
(16)
50620130101004
50620130101004
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
Iaetsd time constrained self-destructing
Iaetsd time constrained self-destructing
WJCAT2-13707877
WJCAT2-13707877
50120140507005 2
50120140507005 2
Gre322me
Gre322me
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A scalabl e and cost effective framework for privacy preservation over big d...
A scalabl e and cost effective framework for privacy preservation over big d...
Survey on cloud backup services of personal storage
Survey on cloud backup services of personal storage
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
IRJET-Comparative Analysis of Disaster Recovery Solutions in Cloud Computing
S.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage services
Destacado
30120140502004 2
30120140502004 2
IAEME Publication
Marksheet
Marksheet
jennifer_lawrence
Colegio blás infante
Colegio blás infante
Parque Infantil De Tráfico de Vícar
Keek advertising
Keek advertising
john896
Storytelling Bestias
Storytelling Bestias
Gabriel Andrés del Campo Araya
twitter e blaving parte 2
twitter e blaving parte 2
Marcelo Silva
Ponta Grossa Agosto Pesquisa Eleitoral 2015
Ponta Grossa Agosto Pesquisa Eleitoral 2015
Franciel Oliveira
Tren yolculugu...ama bu trenle...
Tren yolculugu...ama bu trenle...
Raci Göktaş
Instant keek followers
Instant keek followers
john896
Plan de contingencia 2012
Plan de contingencia 2012
Inexa Suarez
Etica internet
Etica internet
Raphael Lourenço
AFTER THE ORDEAL
AFTER THE ORDEAL
Jose María Medina García
Georgi,petra dlr kn-david_implementing a pmo_nasa pm challenge_20120223_pg
Georgi,petra dlr kn-david_implementing a pmo_nasa pm challenge_20120223_pg
NASAPMC
Startapp
Startapp
startuppoint
Iklan alif silver
Iklan alif silver
UD. Berkah Jaya Komputer
Etica profesional
Etica profesional
KevinAndres1212
Colibri Food
Colibri Food
Canal Colibri
643
643
Efren80
Safras 2012/13
Safras 2012/13
Franciel Oliveira
Panaderia rikopan
Panaderia rikopan
leonjaimeparra
Destacado
(20)
30120140502004 2
30120140502004 2
Marksheet
Marksheet
Colegio blás infante
Colegio blás infante
Keek advertising
Keek advertising
Storytelling Bestias
Storytelling Bestias
twitter e blaving parte 2
twitter e blaving parte 2
Ponta Grossa Agosto Pesquisa Eleitoral 2015
Ponta Grossa Agosto Pesquisa Eleitoral 2015
Tren yolculugu...ama bu trenle...
Tren yolculugu...ama bu trenle...
Instant keek followers
Instant keek followers
Plan de contingencia 2012
Plan de contingencia 2012
Etica internet
Etica internet
AFTER THE ORDEAL
AFTER THE ORDEAL
Georgi,petra dlr kn-david_implementing a pmo_nasa pm challenge_20120223_pg
Georgi,petra dlr kn-david_implementing a pmo_nasa pm challenge_20120223_pg
Startapp
Startapp
Iklan alif silver
Iklan alif silver
Etica profesional
Etica profesional
Colibri Food
Colibri Food
643
643
Safras 2012/13
Safras 2012/13
Panaderia rikopan
Panaderia rikopan
Similar a 50120140504001
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ijccsa
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ijccsa
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ijccsa
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
IAEME Publication
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET Journal
thilaganga journal 1
thilaganga journal 1
thilaganga
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
IRJET Journal
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
Editor IJMTER
50120140507005
50120140507005
IAEME Publication
Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World
IRJET Journal
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
IRJET Journal
A Reconfigurable Component-Based Problem Solving Environment
A Reconfigurable Component-Based Problem Solving Environment
Sheila Sinclair
Similar a 50120140504001
(20)
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
thilaganga journal 1
thilaganga journal 1
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
50120140507005
50120140507005
Cloud Computing: A Perspective on Next Basic Utility in IT World
Cloud Computing: A Perspective on Next Basic Utility in IT World
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
A Reconfigurable Component-Based Problem Solving Environment
A Reconfigurable Component-Based Problem Solving Environment
Más de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Más de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Último
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Último
(20)
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
50120140504001
1.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 01-10 © IAEME 1 IT-DHSD: IMPLICIT TIME BASED DATA HANDLING AND SELF DESTRUCTION USING ACTIVE STORAGE OBJECT FOR CLOUD COMPUTING Mr. Sandip N. Vende[1] , Asst. Prof. Nitesh Rastogi[2] Department of Computer Science & Engineering, JDCT, Indore(M.P.), India ABSTRACT Computing is changing frequently to serve the user’s needs for security and reducing a dependency which leads researcher to develop newer technologies. Cloud computing is one of those technologies which successfully delivers the service oriented architecture to reduce the burdensome of managing the devices. But in some situation instead of providing controls to the end user it operates as a reverse effect. Data destruction is the one of that transformation in which the deletion of data is required by the user from the storage locations. But the existing destruction mechanism will leaves certain type of metadata residues from which either the data or users information can be regenerated which gives an attack prone zone for outsiders. This work proposes a novel IT-DHSD mechanism based on effective active storage object transition with privacy enabled operation to give more control to the user. In this each object contains the data and the destruction or deletion time which works as an implicit triggering condition for complete data removal. The approach also suggests synchronous modifications to different copies even with the delete operation also. At the prelim status of work the approach is completely satisfying the user’s needs of this time and will proves its efficiency in terms of performance, security and reduced overhead in near future of prototypic implementation. Index Terms: Cloud Computing, Data Destruction, Active Storage Object (ASO), Active Object Table (AOT), Deletion Policies, Implicit Time Based Data Handling and Self Destruction (IT-DHSD); INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 4, April (2014), pp. 01-10 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
2.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 01-10 © IAEME 2 I. INTRODUCTION Cloud computing is the current area through which the computing ability and components can be delivered as a service to the end user. The maintenance and operational burdens are reduced from the service owner by using the different service level agreements. It is a combined concept of distributed, grid, utility and self corrective autonomic environment. Everything should be treated as a utility model like pay-per-use model by which the processing, storage, bandwidth etc can be provides to end user as a tenancy model. It is a kind of intellectual collaborated evolution for organizations by which the load of managing server based technologies and capital cost are reduced and focus on their core business operations can be increased. Such effective services are based on a layered architecture and various organizations with different service level agreements between the user, service provider and the cloud provider works effectively. This multi-tenancy characteristic of cloud gets a strong impact on its security due to its dynamic scalability, multi-providers SLA and resources, virtualized environment and huge information size [1]. Several organization works together to provide effective services to the end users and hence the risk of misalignment between them will also be higher. A slight change in behaviour of functionality of any layer between them will disrupt all the service availability and reliability. Even the data security at the third party storage server might also be affected of loosed. The aim these service layers are to provide the data security and guaranteed operations when required and after the completion the temporary or permanent files which are of no use must be removed. Data will sustain its locations and being used in operation up to a limited or defined period of time. When this period of lifecycle is over then, data should be removed with all its copies. Most of the organizations have the several policies for this data destructions based on the fixed time interval. But as of now the copies or replicas of data is getting multiplicatively increased so deleting all in a single go is very difficult. Also the deletion is not complete and some residues metadata remains at the location of the files from which the recreation of data can be performed. Data destruction is the process of deleting the data and its overall components and copies when the lifecycle of its operations is finished [2]. The deletion should be in such a way that its reconstruction cannot be performed but many organizations are unable to achieve such behaviour and hence left a vacant space for attackers to regenerates the copies of original and forged some other services by the same. The removal of data is quite a complicated task before which the total number of copies which is generated has to be identified. Whenever a file is replicated some information needs to be attached there in its replica about its previous file location and total number of replications applied by which all the same existing copies is located and deleted. Most of the organizations are unable to perform such forensic deletion or destruction of data from the storage and always have vulnerability of data regeneration attacks. Thus this paper gives a brief study of such issues and provides a solution to overcome the existing data destruction issues. II. BACKGROUND As of now cloud computing is getting popularity most frequently among the various existing methodologies because of its scalable, reliable and maintainable nature. It reduces the loads on end users and providers and increases the computational and operational capabilities. The prime focus of the cloud provider is to make the data available to users always whenever required. Also when the usage of data is finished and the overall lifecycle period is over than it needs to be removed. Generally the lifecycle includes the generation, transfer, use, share, archive and destruct. All the above phases are time constraints based or use count based. The data which is most used and shared will stays for longer period and the data with less use will removed more frequently. But in current scenarios there is no such policy available for effective data destruction. It could be named in several
3.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 01-10 © IAEME 3 ways by different authors like destruction, deletion, removal, decommissioning, sanitizing, vanishing, disposal etc. The destruction is based on time factor of usage analysis of future which clears the further scope of data usage in near future. During the fault tolerance mechanism provided by the cloud the multiple copies of data is replicated to different locations. Also when the user share download the files to local machine and then uploads it again and sends to some other users, new copy and location of the same file is generated which is not in concern of the cloud service provider. Hence at the time of deletion these files remain as replicas over the different locations which might not be deleted. Also some of the files residues in terms of their Meta data from the same locations is not been deleted or removed from which the forensic attackers might generates the forged copy. Such issues are not taken over in the current data destruction in lifecycle management or storage schemes. Apart from the wide adoption of cloud computing services, there are some factors whose outlines have to be marked form detection of activities avoiding the juridical limit of data access. These areas include the data regeneration after deletion from any of the server or storage locations by forensic means. Thus various law enforcement acts and their applicability is clarified by the author of [3]. Thus it is clear that the how crucial is the complete and secure data destruction. Here the service provider complies some of the new policies and procedures for this timely disposal and ensures that by the use of any forensic means, the data is not recoverable. For performing the above operation several guidelines are available like ISO 270001 and NIST 800-88, to destroy data as part of the decommissioning process [4]. Several solutions for the above approach is taken over object oriented cloud and gives the improved results than the procedural based frameworks. The aim is to develop a system in which time constrained data deletion is applied in virtual machines instances [5]. The phenomenon is quite simple, instead of replicating the copy of overall file or data, the object is created for single purpose use and then destroyed. The object in use is known as active storage object. This active storage can make the device more intelligent because of supportive internal computation in storage devices [6]. By this the granularity and flexibility of storage services is increased and hence the issues is resolved about the destruction because as their usage is over the object is destroyed itself. Whenever any modification is performed automatically it is reflected to its copies. Some of the work had also implemented the desired for the P2P systems by using the distributed hash tables (DHT) [7]. In this the encryption and decryption is used even after the replica is removed and the metadata is encrypted for preventing the further regeneration of the data. This paper gives a brief study about the existing data deletion approaches presented in next section of literature survey and later on suggest a novel solution to overcome the upcoming issues in this domain. III. LITERATURE SURVEY Cloud computing environment supports portability of data and services with reliable behaviour. Serving this reliable behaviourof the user, aims to get secure application and data storage always while the usage and removing the less usable and other components. So due to privacy reasons the data and the user information needs to be removed completely from the storage provider locations after the terminations of SLA’s. Removing this data effectively and purely comes under the data destruction activity. During the last few years, various approaches provide the different solutions for the above mentioned issues of self and complete data destructions. Among them, few approaches show their strong presence is covered here as the surveyed literature and given as: Taking the privacy a major concern before and after the service usage, the paper [8] proposes a scheme for Zero Data Remnance Proof (ZDRP). It is a combined evidence given by the cloud data storage provider as regards to zero data remnance proof the after the SLA period is over. The mechanism holds the various SLA’s and maintained them as a proof for destroying the data after end
4.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 01-10 © IAEME 4 of usages. In the absence of this SLA management, data don't secure even after the deletion has taken place. For implementing the solution the paper also suggests an algorithm for complete deletion along with some SLA’s. The implementation of this can be achieved by suitable variation of the data updating mechanisms provided by open cloud service providers (CSP). Some of the authors focus on the encryption mechanism for securing the users data and metadata. Likewise suggested in the paper [9], in which a formal cryptographic based model for secure deletion is given. According to it the deletion or removal can be monitored by several policies of data removal from storage systems whose security totally relies on some of the cryptographic functions and keys. The work regularly maintains some of the deletion class in which the members are regularly updating their entries and those who required complete removal can be erased automatically with all its related entries. A prototype implementation of the approach is proving its efficiency through Linux based file system. Some of the authors also focused their intentions towards the deletion of less important data or used data from the P2P systems. In such systems the type of attacks occurred due to remaining residues of the deleted files is very high. Specifically the copies related to the data have to be taken over specifically because their locations are different from the actual copies. In the paper [10] a Vanish system is proposed for completely removing the data using a global scale cryptographic technique and distributed hash table (DHT). The approach had also implemented a prototype for the suggested mechanism in OpenDHT Vuze Bit Torrents application online. Practical evaluations of the approach can be applied by adding a plug-in for different browsers. Carrying forward the above approach of Vanish and updated model Safe Vanish is proposed in [11]. This is an improved mechanism by which the data can be able to destruct itself after the end of use and increases the privacy parameter. The approach implements a threshold function k for generating the composite key. It sustains the self destructing nature by limiting the attacker's prone zone and sniffing the attacks in real systems. At the primary work stages and implementation prototypes is proving the efficiency of the suggested approach. In the paper [12], there are three modifications suggested which includes cascading operation, tide operation and Existing Vanish mechanism. On the basis of above mechanism improvements in the existing destruction phenomenon is measured. According to cascade operation, multiple key storage system is taken as a combined system which increases the attack resistance. Similarly tide is a new key storage phenomenon through apache servers online. Various attacks and their preventions is simulated after applying the suggested approach and measured a performance improvement and applicability generalization by Vuze, OpenDHT and Vanish. The calculated result shows that these defences provide a countable improvement over the original Vuze DHT, which is impractical in most of the situations. Thus the aim is to remove all the data and its copies completely from the server and storage locations. It makes the data privacy a stronger hand over other security parameters. Most of the existing mechanism is suggesting the approaches based on copies, but none of them focusing on complete deletion. Complete removal and self destruction is the primary aim of the approach SeDas in [13]. It is an active object based approach in which apart from creating the copies of the data some active objects is created which decreases the probability of leaving the data residues after deletions. The approach uses a time field which works as a triggered event after which the automatically destroying the data is initiated. Practical evaluations and implementation of the approach is proving its efficiency from existing approaches in more than 72 % in the case of uploading and downloading. Carrying forward the approach of active storage, this paper gives a virtualization realization phenomenal of applications running at client ends and the data treated as an object by which the throughput and latency is increased [14]. Here the virtual machines are acting as an active object and generating keys for each of the active partitions. By using this mechanism the encrypted files are
5.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 01-10 © IAEME 5 uploaded and downloaded from the server using the agent structure. The evaluations and verifications apply in both the cases of uploading and downloading to check the authenticity of process, application and the user. The article given by [15] presented a disk based erasing mechanism for P2P systems which can be further modified and can be used for cloud and storage technologies also. The mechanism is serving a simple understanding about the complete removal of the data from the servers or storage locations which practically containing some of the disks which needs to be erased. They are dependent on the policies, serving the user’s needs about the self data disposals after a fixed time period of data Lifecycle. User required the clean data removal from the existing medium through these policies. The article also presents issues of simple delete can’t be able to remove all the information from the storage medium and some residues remain. This from this residue data regeneration or attacks can be formed. Thus the security mechanism having complete destruction is always required. The article presents a few of the product specific information about the above issues, solutions and provides the feature oriented compared with existing products. IV. PROBLEM STATEMENT Cloud computing is the third party reliable system having guaranteed security services for data in case of any failure, losses or thefts. Out of which the first two is fault or failure oriented which is some uncertain conditions due o environment variables. But the theft is a planned action and comes under the category of attacks. In outsourced environment the data is stored at different storage locations of multiple data centres. While the data is in uses various security policies had let the usage of data in secure ways. But after the usage or life period of sustainability is over these data bytes are removed or deleted from their locations. Such deletion should be of time oriented or some regular interval basis. All the existing techniques destruct this data and their copies which makes the data disappears from the clients view and seems to have deleted all the related information. Also the schemes using the active object are unable to define the policy behaviour at the time of modification of file. The vanish based schemes are not been able to completely destroy the information and some of the metadata remains there until some new data is rewritten on the same locations. Also some history of data needs to be maintained for the condition if requires the older data has to be regenerated or called. So for this the suggested approaches are using the regular archival mechanism which is capable of serving the futuristic scopes of deleted or removed data call. Some of the issues which remain unaddressed after studying the related articles of existing approaches are: Problem-I: After the data destruction the data is not removed completely and there exists some residues of metadata or user’s information from which the Sybil attack is planted or some portion of data is regenerated. Problem-II: Use of active object reduces the chances of data residues but some of the timely destruction of those created object and the number of copies in local machines have also be in controlled and recorded distribution. Problem-III: The extension of created active objects of destruction is fixed and is no extendable. In certain case the extension for deletion period is required and has to be provided. Problem-IV: Key based active object generation sustains users nature in key generation so some other user is not been able to extract the same location with different behaviour information’s.
6.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 01-10 © IAEME 6 Problem-V: Key shares, length, generation and distribution mechanism needs to be secure from different users and providers itself. So based on the above shortcoming this paper proposes a novel model for improving the self data destruction mechanism and making it as a complete and secure deletion of data and its replicas. For this decentralized approach had chosen which generates the random keys for different time based active object triggering and have a specific procedure of performing the operations on storage. V. PROPOSED IT-DHSDAPPROACH The temporary data or reference removal will not work in case of cloud computing because of its number of backups and archives replica copies. These copies will remain there on some unknown distributed locations. If the destruction needs to be applied completely then the approach should remove all types of copies form every locations. This is what the existing approaches is not been able to apply. This work proposes a novel IT-DHSD (Implicit Time Based Data Handling and Self Destruction) mechanism to overcome the above mentioned issues by the use of secure active storage objects with destruction time and the replica modification scheme. According to the suggested approach shown in figure 1, initially the users call for a service or its storage requirements which will creates an object of user request for storage along with the component (data). FIGURE 1: PROPOSED IT-DHSD SCHEME FOR SELF DATA DESTRUCTION IN CLOUD COMPUTING This object contains the data, object identifier and destruction time for object. The object creation works on the single data copy by using an object generation each time when a user demands a data. Later on the mechanism provides the updation in the object to the main data copy. After this object creation the entries with respect to each active instance generation is stored on to some centrally managing server. According to the users characteristics this object transition can be further provided security by using the encryption approaches for objects. Later on to that this encrypted secure object is stored into its locations. Similarly when user demanded its data for modification an runtime copy of this stored data in terms of object is generated which after passing the similar inserted key at the Secret Key Sharing Storage Pool Storage Pool Storage Pool Storage Pool Networked Storage System Encryption Algorithm Application Server Key Generation Storage Pool Random Key Passing Decryption Algorithm User User User User Data Active Object Destroy Time Active Object Table (AOT) Server [ObjID, Key, RandomEncyprtA lgo, TimeDestroy] Encrypted/ Decrypted Active Objects
7.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 01-10 © IAEME 7 time of encryption is passed to retrieve the data. The above mechanism can be clarified by its components working given as: A. User: It the type of user accessing the services from the application or cloud server. The number of services offered or selected by user depends upon the users proficiency level. B. Active Storage Object Generator: This phase actively generates the objects of the users request by initiating the active storage object (ACO) at AOT (Active Object Table Server). This AOT server stores the information regarding to number of object generation, their recognition ID’s, Key for encryption, Random Encryption mechanism selected, and the destruction time). C. Secure Object Transition: This is an application server which assures the object security by encrypting them from the user based key. Later on the similar component is responsible for retrieving or decrypting the data and sharing the secret key. D. Networked Storage: It holds the actual data encapsulated in an object with the destruction time. The server calls the deletion time or the stored object with destruction time triggers the safe removal of the data from the location. The full secure version of object is stored at the storage location with fixed destroying time so the copies can’t be created from this and if it occurs than it destroy the object copy also. FIGURE 2: ACTIVE OBJECT BASED DATA MODIFICATION CONSISTENCY SCHEME Active Object Handling through Proposed Scheme Security can be provided by integrating the encryption mechanism with active object creation but issues related to the multiple copies and their modification remains the same. Thus to manage the multiple copies and there modification with same number of copies and reflection of consistent changes to all simultaneously can be archived in four basic steps of the scheme. Step 1: Local Data Copy A user demands the local copy of its stored data to be changed is supplied to local machine in the form of active object. For this the user sends the command request CheckIn. Step 2: Revert Local Copy In this step the user sends the modified copy of object to the server or storage location from which the object is generated. For this user executes the command CheckOut. 1. Access Local Copy (CheckIn) 2. Revert Local Copy (CheckOut) 3. Changes Updated to Master Copy (Commit) 4. Changes Updated to Unchanged All Local copies on Distributed/Shared Nodes (UpdateAll) User Active Object Master Data Copy User User Active Object Active Object Storage Locations 1 2 3 4 4 4
8.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 01-10 © IAEME 8 Step 3: Changes Update to Master Copy After the updated local copy reach to the storage location the changes has to be reflected to the master copy for consistency of the later use of the file. For this the user commands the Commit operation. Step 4: Updation to all Local Copies at Distributed Locations After the above three step the unified modification is applied to the central copy which needs to be supplied to each local machine which contains the previous copy of data before the commit operation. Thus those copies also need to be updated. Thus to achieve this server fires the command Update All after which all the copies at distributed locations is changed with the modifications done the files o object. The outline of the scheme is shown in figure 2. According to the scheme the consistency is maintained between the several copies of similar data. Thus the suggested mechanism is capable of providing the centrally controlled mechanism for the data modification. Apart from the above improvements the object storage tendency will also be make more private so as the pattern based detection can be removed. In the above scheme the original data is not passed between different locations and users. Instead of that the copy of master data is passed in the form of active object. Now these objects can be removed after the fixed user decided destruction time automatically. This provides the effective self destruction for the generated object. Cloud is totally an outsourced environment in which the controls are always in the providers end. So whenever the users are required to make such controlled operation of removal of data the complete deletion is not possible. Thus by implementing the above mechanism controls can be shifted to the user for each object and the unified policies can be applied for updations and destructions of the data. Practical implementation of solution can be achieved by applying the above mechanism for both HDD and SDD based storages because the networked storage can be of any type and it may occurs that a local copy of the data is generated at users end. Now when the server copy is removed completely than the local copy of data should also be removed. Even the approach will also reduce the total number of read and write operations. Applications Now days the destruction mechanism is applicable for various online data storing applications including the web based and mobile based version. Some of the application where the suggested scheme can be effectively used for improved security and control over data and its modifications are: (i) Social networking (ii) Messaging services (iii) Mailing service (iv) Online document sharing (v) Record Based Systems (vi) Enterprise Resource Planning (vii) Business intelligence (viii) Transportation systems
9.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 01-10 © IAEME 9 VI. EXPECTED OUTCOMES Cloud computing is the most vibrant combination of technologies which serves the user and provider a best way to interact through some broker based structure. In such environment various transition and control shifting is measured which decreases the user control on data. In some situations user needs to remove the data from storage mechanism which is not completely performed by existing approaches. This work gives a novel mechanism which is capable of performing the act with respect to time. So there are some measured outcomes after the peer level of work given here as: (i) Time Based Data Control for Modification: Active storage object (ASO) must destroy automatically apply changes consistently without any triggered explicit action. (ii) Complete Deletion without any Remaining Residue: Expiration of ASO makes the data also unreachable because the key is removed from the application server so no residue of data remains from which regeneration cannot be planned. (iii) Secure Active Object Transition between the machines: Encryption of active object let the privacy of transition increased. (iv) Unique User Based Key Generation and Secure Key Sharing. (v) Less Vulnerable to Attacks Specially the Sybil and Intruder. (vi) Known Timeout for Implicit Data Destruction. (vii) Compatible with several storage technologies such as SSD and HDD: System is compatible with the existing infrastructure so no need to make updations on such cost factors. (viii) Parallel modification to copies at distributed location: Reduced burdensome increases the cost and effort benefits for cloud provider and service users. (ix) Complete synchronous operations. (x) Object based structure reduces the overhead and increases performance. VII.CONCLUSION Cloud computing raises the users trust on conditional storage at third party locations. This condition gives the user trust over the owned data means for any changes the modification will be uniform and will update to the all existing copy of the same data. Even with destruction all the copies should be removed completely. But the existing mechanism is unable to achieve this goal. After studying the various research articles, this paper presents a novel IT-DHSD approach for improved self data destruction mechanism satisfying the feature of complete deletion in bounded time factor. Here, suggested approach effectively uses the active storage object transition and controlled modification with consistency in nature. By this mechanism, changes applied will be reflected to each copy with synchronous operations even with the deletion or removal also. Proposed approach will serve to satisfy the user requirements for privacy and integrity based data access and provides the complete deletion of data. It works even with the distributed structures also in the same manner and will definitely proves its efficiency in near future prototypic implementations.
10.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 01-10 © IAEME 10 VIII. REFERENCES [1] Deyan Chen and Hong Zhao, “Data Security and Privacy Protection Issues in Cloud Computing”, in International Conference on Computer Science and Electronics Engineering, IEEE Computer Society, DOI 10.1109/ICCSEE.2012.193, 2012. [2] Frank Simorjay, Ariel Siverstone and Aaron Weller, “The Microsoft approach to cloud transparency”, at www.microsoft.com/twcnext, 2012. [3] Josiah Dykstra, “Seizing Electronic Evidence from Cloud Computing Environments”, in IGI Global, Chapter 7, DOI: 10.4018/978-1-4666-2662-1.ch007, 2013. [4] Product Description Amazon Web Services: “Overview of Security Processes”, at http://aws.amazon.com/security/, June 2013. [5] M. Nandhini and S. Jenila, “Time Constrained Data Destruction in Cloud”, in International Journal of Innovative Research in Computer and Communication Engineering, ISSN (Online): 2320-9801, Vol.2, Special Issue 1, March 2014. [6] Yulai Xie, Kiran Kumar Muniswamy-Reddy, Dan Feng and Others, “Design and Evaluation of Oasis: An Active Storage Framework Based on T10 OSD Standard”, a presentation on Storage System Research Centre, 2012. [7] Prashant Pilla, “Enhancing Data Security by Making Data Disappear in a P2P Systems”, in Computer Science Department, Oklahoma State University, Stillwater. [8] Mithun Paul and Ashutosh Saxena, “Zero Data Remnance in Cloud Storage”, in International Journal of Network Security & Its Applications (IJNSA), DOI: 10.5121/ijnsa.2010.2419, Vol.2, No.4, October 2010. [9] Christian Cachin, Kristiyan Haralambie and Hsu-Chun Hsiao, “Policy-based Secure Deletion”, at IBM Research, Zurich, Aug 2013. [10] Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy and Henry M. Levy, “Vanish: Increasing Data Privacy with Self-Destructing Data”, in University of Washington, Supported work of Grant NSF-0846065, NSF-0627367, and NSF-614975, [11] LingfangZeng, Zhan Shi, ShengjieXu and Dan Feng, “SafeVanish: An Improved Data Self- Destruction for Protecting Data Privacy”, Presentation at CloudCom, Dec 2013. [12] Roxana Geambasu, Tadayoshi Kohno, Arvind Krishnamurthy, Amit Levy and Henry Levy, “New Directions for Self-Destructing Data Systems”, in University of Washington, 2010. [13] Lingfang Zeng, Shibin Chen, Qingsong Wei and Dan Feng, “SeDas: A Self-Destructing Data System Based on Active Storage Framework”, in IEEE Transaction on Knowledge and Data Engineering, DOI: 10.1109/TMAG.2013.2248138, 2013. [14] Backya S and Palraj K, “Declaring Time Parameter to Data in Active Storage Framework”, in International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), ISSN: 2278 – 1323, Volume 2, Issue 12, December 2013. [15] David Logue and Kroll Ontrack, “SSDs: Flash Technology with Risks and Side-Effects”, in data recovery blog at http://www.thedatarecoveryblog.com/tag/data-destruction/, 2013. [16] Rohini G.Khalkar and Prof. Dr. S.H.Patil, “Data Integrity Proof Techniques in Cloud Storage”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 454 - 458, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [17] Gurudatt Kulkarni, Jayant Gambhir and Amruta Dongare, “Security in Cloud Computing”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 258 - 265, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
Descargar ahora