A Novel Approach for Cloud Data Security Enhancement through Cryptography and Biometric in the Public Cloud environment
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 12
Abstract
Cloud computing takes the technology, services, and applications that are similar to those on the Internet and turns them into a self-service utility. It is the delivery of computing as a service rather than a product whereby shared resources, software and information is provided to computers. In these days a single server handles the multiple requests from the user. Here the server has to process the both the request from the user simultaneously, so the processing time will the high. This may leads to loss of data and packets may be delayed and corrupted and also the Data Management and the Services are not Trust Worthy. Users start worrying about losing control of their own data. Also the data processed on clouds are often outsourced, leading to a number of issues related to accountability, including the handling of personally identifiable information. An efficient data placement algorithm is proposed and implemented in this paper. The data placement algorithm will tell us how to place the files efficiently to the containers in object storage. Besides, the files will merge when client needs it back. So some additional algorithms are also used for partitioning and merging of files. So the objective is to achieve good security for cloud storage system, through proposed algorithm by using multiple containers of object storage in cloud. To handle these issues, the paper proposed an approach to store the data through data placement algorithm, to provide authentication and secure access control for data using Crypto-Biometric System (CBS) in cloud computing and to Protect the data from unauthorized access.
Authors and Affiliations
S. Prabu, Prof. Gopinath Ganapathy
Efficient Automobile License Plate Recognition Technique in Traffic System
One of the most important aspects of applying computer techniques towards intelligent transportation systems is License plate detection and recognition .Nowadays this computer science techniques are widely used in drive...
Red Tacton Human Area Networking
Almost all the services asked by the user in the present day require technologies that enable communication between people and objects in close proximity. Let us make use of a technology which is neither wireless nor a...
Programmable Voltage/Current Output Source with Overflow of Voltage/Current Protection Circuit
In this paper, I am designing a programmable current/voltage source, using the analog devices ‘industrial current/voltage output driver (ad5750)’, ‘12-bit nano dac (ad5624)’. The output programmable range of current is...
A Systematic Approach For Storage Free Smart Energy Management With Frequency Control In Hybrid AC Micro Grid System
This paper provides a systematic coordinated control scheme for energy management in hybrid photo voltaic(PV), fuel cell (FC) and diesel engine generator (DEG) in an AC micro grid without any storage like batteries or f...
Chunked N-Grams for Sentence Validation
This paper deals with Sentence Validation - a sub-field of Natural Language Processing. Sentence Validation refers to verification of "Natural Language" sentence on basis of its syntax and semantics. Sentence Validation...