A Modified Heuristic-Block Protocol Model for Privacy and Concurrency in Cloud
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 9
Abstract
With boost in the figure of cloud users and the magnitude of sensitive data on cloud, shielding of cloud has become more important. Competent methods are consistently desirable to ensure the information privacy and load management of outsource data on un-trusted cloud servers. The base of our proposed idea is the chronological display of metaheuristic firefly algorithm and blocks based Merkle hash tree protocol. This pool of combination significantly reduces the communication delay and I/O costs. The projected scheme in addition considers the dynamic data operations at block level while maintaining the equivalent security assurance. Our method makes use of third party auditor to periodically verify the data stored at cloud provider side. Our elucidation removes the burden of verification from the user side and alleviates both the user’s and storage service’s fear about data outburst and data corruptions.
Authors and Affiliations
Akhilesh Bhardwaj, Dr. Surinder , Dr. Rajiv Mahajan
A P System for Solving All-Solutions of TSP
P system is a parallel computing system based on a membrane computing model. Since the calculation process of the P system has the characteristics of maximum parallelism and Non-determinism, it has been used to solve the...
Rising Issues in VANET Communication and Security: A State of Art Survey
VANET (Vehicular Adhoc Network) has made an evolution in the transportation hi-tech system in most of the developed countries. VANET plays an important role in an intelligent transportation system (ITS). This paper gives...
Validation of the Proposed Hardness Analysis Technique for FPGA Designs to Improve Reliability and Fault-Tolerance
Reliability and fault tolerance of FPGA systems is a major concern nowadays. The continuous increase of the system’s complexity makes the reliability evaluation extremely difficult and costly. Redundancy techniques are w...
An Interoperable Data Framework to Manipulate the Smart City Data using Semantic Technologies
During the last decade, enormous volumes of urban data have been produced by the Government agencies, the NGOs and the citizens. In such a scenario, we are presented with a diverse sets of data which holds valuable infor...
A Survey: Agent-based Software Technology Under the Eyes of Cyber Security, Security Controls, Attacks and Challenges
Recently, agent-based software technology has received wide attention by the research community due to its valuable benefits, such as reducing the load on networks and providing an efficient solution for the transmission...