An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 2
Abstract
The widespread diffusion of distributed and cloud storage solutions has changed dramatically the way users, system designers, and service providers manage their data. Outsourcing data on remote storage provides indeed many advantages in terms of both capital and operational costs. To provide solutions for the above pollution attack and user data breach, we propose an early pollution detection algorithm able to spot the presence of an attack while fetching the data from cloud storage during the normal disk reading operations. Thus each fragment is check for malicious content and passed over to the server for processing. The alarm triggers a procedure that locates the polluting nodes in early stage of processing to avoid the intrusion. Also to detect the polluted content hashing methods are used. In this way, after network peers receive the transmitted data, hash value is calculated by hash functions and then the result is compared with the received hash value from the content distribution network (CDN) servers to determine whether the transmitted data is polluted or not. I proposed system to addresses in preserving user data confidentiality and integrity after outsourcing. For this concern, we present our design for a new cloud storage encryption scheme that enables cloud storage providers to create convincing fake user secrets to protect user privacy. Vani. S | Priya Radhika Devi. T"An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10744.pdf http://www.ijtsrd.com/engineering/computer-engineering/10744/an-efficient-securing-code-based-cloud-storage-using-rc5-encryption-algorithm-against-pollution-attacks/vani-s
A New breed NN Based UHVDC for Offshore Wind Power Plant to Enhance the Transient Response
In proposed system transient management of offshore wind power plant can be achieved by unified high voltage direct current transmission (HVDC) system. This advance HVDC transmission system rectifies the defect of recent...
Growth Analysis of Stock Market in India: An Empirical Study
Capital Market is a sine-quo-non for speedy growth and development of a countrys economy and India is no exception to it. Capital market has two components “ (i) Primary Capital Market and (ii) Secondary Capital Market....
Review of Green Building Index GBI in Malaysia
In recent years, global warming has been a major issue in every country all over the world which has yet to be resolved. World Development Indicator states, the amounts of carbon emission in Malaysia are increasing at an...
Design of multi -band dual linear polarized microstrip antenna for remote sensing applications
The design of triple “ band L1/L5/S dual linear polarized microstrip antenna is simulated and presented. The triple band is designed as one antenna for dual “ band L1/L5 with dual “ linear polarization and a shared apert...
Student Perception of Home Background and the Aquisition of English Language in Mbonge Municipality
The present study was intended to find out students perception of home background and the acquisition of English Language in Mbonge Municipality. Specific objectives were to examine how financial status of parent influen...