An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 2
Abstract
The widespread diffusion of distributed and cloud storage solutions has changed dramatically the way users, system designers, and service providers manage their data. Outsourcing data on remote storage provides indeed many advantages in terms of both capital and operational costs. To provide solutions for the above pollution attack and user data breach, we propose an early pollution detection algorithm able to spot the presence of an attack while fetching the data from cloud storage during the normal disk reading operations. Thus each fragment is check for malicious content and passed over to the server for processing. The alarm triggers a procedure that locates the polluting nodes in early stage of processing to avoid the intrusion. Also to detect the polluted content hashing methods are used. In this way, after network peers receive the transmitted data, hash value is calculated by hash functions and then the result is compared with the received hash value from the content distribution network (CDN) servers to determine whether the transmitted data is polluted or not. I proposed system to addresses in preserving user data confidentiality and integrity after outsourcing. For this concern, we present our design for a new cloud storage encryption scheme that enables cloud storage providers to create convincing fake user secrets to protect user privacy. Vani. S | Priya Radhika Devi. T"An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10744.pdf http://www.ijtsrd.com/engineering/computer-engineering/10744/an-efficient-securing-code-based-cloud-storage-using-rc5-encryption-algorithm-against-pollution-attacks/vani-s
Internet of Nanothings A Primer
The interconnection of nanodevices with Internet has led to development of a new phase of IoT called Internet of nanothings IoNT . Thus, Internet of nanothings IoNT is essentially the interconnection of nanoscale devices...
Development of Android Controlled AC Dim Light
The light level in a room has a huge effect on one's mood and productivity. Lighting can contribute to your alertness and awakeness in the mornings, and it can either entice you to feel tired or keep you up all night. Wi...
Improvement of the Production Process through the Application of the Simulation Technique
The present research presents the results obtained from a practical study regarding the improvement of the production process through the application of the simulation technique. A 90 reliability and 10 error were used f...
The Effect of using Interactive Whiteboard on the Achievement of Eleventh Grade Students in Computer Science Subject
The interactive whiteboard is present in the classroom setting to get better achievement in a computer science subject. The study was conducted on a sample of 56 eleventh standard student’s selected using subjective sa...
A Novel Approach: An Advanced Security Mechanism for Sending Messages using Steganography
Steganography is the art of concealing information in ways that prevents the detection of hidden messages. Providing security for sending messages and confidential information via internet has been a challenging task for...