Advances the Forward Security in Parallel Network File System using An Efficient and Reliable Key Exchange Protocols
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2017, Vol 5, Issue 6
Abstract
In parallel file system we can disperse data over numerous nodes to permit simultaneous access by various errands of a parallel application. By play out the numerous errands in a parallel system is commonly to reduce execution and solid access to substantial data sets. In this work, we research the issue of secure many to numerous correspondences in substantial scale network file systems that bolster parallel access to different storage devices. That is, we consider a correspondence model where there are countless getting to various remote and conveyed storage devices in parallel. Especially, we concentrate on the most proficient method to trade key materials and set up parallel secure sessions between the clients and the storage devices in the parallel Network File System the present Internet standard in a productive and versatile way. In this paper we are proposed convention for performing key trade and furthermore build up parallel secure session amongst clients and storage devices. In this paper we are likewise proposed another idea for encryption and decoding of put away data. By actualizing this procedure we are utilizing mixture encryption and decoding calculation. By actualizing those ideas we can enhance execution of network and furthermore give greater security of put away data in the put away devices.
Authors and Affiliations
Kona H S Venkat Vinay| M.Tech (CSE) in Department of Computer Science Engineering, Gonna Institute Of Information Technology & Sciences Aganampudi, Visakhapatnam AP, INDIA, K Prameela| Assosc.Prof, Department of Computer Science and Engineering, Gonna Institute Of Information Technology & Sciences Aganampudi, Visakhapatnam AP, INDIA
Energy-Efficient Real-Time Tasks Scheduling in Cloud Data Centers
Reducing energy consumption in cloud computing systems has been a major concern among the researchers because it not only reduce the operational cost but also increase the system reliability, and efficient scheduling...
The data stored in cloud environment can be accessed from anywhere and at anytime and by anyone. Many techniques effectively provide the security for cloud storage data. During transmission of data in cloud environme...
Secure Database as a Service for Cloud Tenants With no Exposure Of Unencrypted Data
We propose a novel engineering that incorporates cloud database administrations with data mystery and the probability of executing concurrent operations on mixed data. This is the main course of action supporting ge...
Transparent User Authentication Using Biometric Traits for Secure Internet Services
In this innovation time security of electronic applications is a genuine worry, because of the late increment in the recurrence and many-sided quality of digital assaults, biometric methods offer developing answer fo...
Novel Techniques In Detecting Reputation based Attacks And Effectively Identify Trustworthy Cloud Services
The very dynamic, distributed, and non-transparent nature of cloud administrations make the trust administration in cloud situations a noteworthy test. Customers' criticism is a decent source to evaluate the general...