A Novel Approach for Cloud Data Security Enhancement through Cryptography and Biometric in the Public Cloud environment
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 12
Abstract
Cloud computing takes the technology, services, and applications that are similar to those on the Internet and turns them into a self-service utility. It is the delivery of computing as a service rather than a product whereby shared resources, software and information is provided to computers. In these days a single server handles the multiple requests from the user. Here the server has to process the both the request from the user simultaneously, so the processing time will the high. This may leads to loss of data and packets may be delayed and corrupted and also the Data Management and the Services are not Trust Worthy. Users start worrying about losing control of their own data. Also the data processed on clouds are often outsourced, leading to a number of issues related to accountability, including the handling of personally identifiable information. An efficient data placement algorithm is proposed and implemented in this paper. The data placement algorithm will tell us how to place the files efficiently to the containers in object storage. Besides, the files will merge when client needs it back. So some additional algorithms are also used for partitioning and merging of files. So the objective is to achieve good security for cloud storage system, through proposed algorithm by using multiple containers of object storage in cloud. To handle these issues, the paper proposed an approach to store the data through data placement algorithm, to provide authentication and secure access control for data using Crypto-Biometric System (CBS) in cloud computing and to Protect the data from unauthorized access.
Authors and Affiliations
S. Prabu, Prof. Gopinath Ganapathy
Design and Analysis of a Camshaft by using 3D Printing Technology
Normally the cam shaft found over the piston cylinder and its rotate about that axis across connected to the timing chain. It can be functioned of opening and closing of inlet and outlet valve of the engine. In our proj...
Synthetize and Magnetic Properties of Ni Substituted Polycrystalline Zn-spinel Ferrites
The mixed polycrystalline 1 2 4 Ni Zn Fe O s s ferrites where s is the percentage increments of Zn ions, were prepared using the standard double sintering by mixing pure metal oxides NiO , ZnO and 2 3 Fe O . The netmag...
A Novel Approach for Eliminating Duplicates in Large Dataset
One of the serious problems faced in several applications with personal details management, customer affiliation management, data mining, etc is duplicate detection. This survey deals with the various duplicate record d...
GSM Based Automation System Using Microcontroller
Object tracking and detection is first step in applications such as video surveillance. The main aim of object tracking has been developed to estimate location, velocity and distance parameters of moving objects with th...
Challenges in Steganography
The primary reason for selecting steganography among the list was due to the unfamiliarity of the word that twigged an interest in the subject. that claims terrorists, may be using steganography to communicate with each...