An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2018, Vol 2, Issue 2
Abstract
The widespread diffusion of distributed and cloud storage solutions has changed dramatically the way users, system designers, and service providers manage their data. Outsourcing data on remote storage provides indeed many advantages in terms of both capital and operational costs. To provide solutions for the above pollution attack and user data breach, we propose an early pollution detection algorithm able to spot the presence of an attack while fetching the data from cloud storage during the normal disk reading operations. Thus each fragment is check for malicious content and passed over to the server for processing. The alarm triggers a procedure that locates the polluting nodes in early stage of processing to avoid the intrusion. Also to detect the polluted content hashing methods are used. In this way, after network peers receive the transmitted data, hash value is calculated by hash functions and then the result is compared with the received hash value from the content distribution network (CDN) servers to determine whether the transmitted data is polluted or not. I proposed system to addresses in preserving user data confidentiality and integrity after outsourcing. For this concern, we present our design for a new cloud storage encryption scheme that enables cloud storage providers to create convincing fake user secrets to protect user privacy. Vani. S | Priya Radhika Devi. T"An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10744.pdf http://www.ijtsrd.com/engineering/computer-engineering/10744/an-efficient-securing-code-based-cloud-storage-using-rc5-encryption-algorithm-against-pollution-attacks/vani-s
A Mobile Application for Bus E Ticketing System
In cities, the buses are the nerves of the cities. However, there are many bus operations, which were operated manually. The manual and traditional system takes a lot of time and the tickets cost being of odd amounts and...
Harmonic Analysis of SVPWM Based Three Phase Inverter using MATLAB Simulink
In recent years inverters has taken a vast place in industrial application and is also used in various other applications such as static power converter for high power applications, FACTS devices, HVDC and also as electr...
Ecotoxicants and Pathologies Occurring in Productive Animals Body under their Influence
The article provides information on the ecotoxicants composition formed by industrial production and pathological processes occurring in the productive animal bodies from their harmful effects. Tashmurodov Elmurod | Alib...
The Ethical Practices Among Tourism Workers in The First and Second Congressional Districts of Zamboanga Del Norte A Basis for Proposed Intervention Program for Local Tourism
The study aimed to determine the significant difference between the profile and the ethical practices of tourism workers in the first and second congressional districts of Zamboanga del Norte as basis for a proposed inte...
Behaviour of Interlocking Hollow Concrete Blocks
India is one of the highly populated countries of the world. It ranks the second in population next to China. Besides this, major section of the people live below poverty line. Due to over population, poverty, high land...