A Novel Approach for Cloud Data Security Enhancement through Cryptography and Biometric in the Public Cloud environment
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 12
Abstract
Cloud computing takes the technology, services, and applications that are similar to those on the Internet and turns them into a self-service utility. It is the delivery of computing as a service rather than a product whereby shared resources, software and information is provided to computers. In these days a single server handles the multiple requests from the user. Here the server has to process the both the request from the user simultaneously, so the processing time will the high. This may leads to loss of data and packets may be delayed and corrupted and also the Data Management and the Services are not Trust Worthy. Users start worrying about losing control of their own data. Also the data processed on clouds are often outsourced, leading to a number of issues related to accountability, including the handling of personally identifiable information. An efficient data placement algorithm is proposed and implemented in this paper. The data placement algorithm will tell us how to place the files efficiently to the containers in object storage. Besides, the files will merge when client needs it back. So some additional algorithms are also used for partitioning and merging of files. So the objective is to achieve good security for cloud storage system, through proposed algorithm by using multiple containers of object storage in cloud. To handle these issues, the paper proposed an approach to store the data through data placement algorithm, to provide authentication and secure access control for data using Crypto-Biometric System (CBS) in cloud computing and to Protect the data from unauthorized access.
Authors and Affiliations
S. Prabu, Prof. Gopinath Ganapathy
Data Hiding Using Blind Algorithm of Steganography
The process of hiding messages or information within other non-secret text or data is called steganography. Steganography may be text, image, audio or video steganography. Digital image Steganography is popular because...
Implementation of a High-Speed RSD Based ECC Processor with Vedic Multipliers
In this paper, an exportable application-specific instruction-set elliptic curve cryptography processor based on redundant signed digit representation is proposed. The processor employs extensive pipelining techniques f...
Kinematics of Usain Bolt’s 100 m performance: A Review
The sprint event viz, 100m is considered as the blue riband event in the world, as athlete tries to cover the maximum distance in the shortest possible time. This study was aimed to review the kinematics of Usain Bolt’s...
Analysis on Combination of Local And Globle Contrast Image Enhancement Method
Enhancement is one of the tough factors in photo processing (IP). The objective of enhancement is to enhance the structural appearance of an image without any degradation within the enter picture. The enhancement techni...
Nek Soil Measurement and Automatic Fertilizer Dispense
agriculture is backbone of India and farmers need advanced knowledge to income decisions like digging, seed sowing, and fertilizer dispensing, etc., so that we can get high yield. This plan measures the amount of nitrog...