COMPREHENSIVE STUDY AND COMPARISON OF INFORMATION DISPERSAL TECHNIQUES FOR CLOUD COMPUTING
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 5
Abstract
Cloud systems refer to the collection of interconnected servers that are provisioned dynamically on demand, for execution of applications, to the customer like electricity grid. Cloud computing has gained great attention from industry but there are still many issues that are in their primitive stage which is hampering the growth of Cloud. One of the issues is security of data stored in the servers of datacenters of Cloud service providers. Many schemes have been developed till date for ensuring security of data in Distributed Systems. These schemes have been studied, analyzed and new method has been proposed which infix the parameters of security like recovery of data, confidentiality of data and integrity of data such that it ensure security of data stored in the servers of Cloud systems. The proposed scheme is based on two methods – Information Dispersal Algorithm and Fingerprinting. Information dispersal algorithm helps in maintaining confidentiality and integrity of data and Fingerprinting helps in recovery of data. Here Cloudsim simulation tool is used for simulation. CloudSim is an extensible simulation toolkit that enables modeling and simulation of Cloud computing systems and application provisioning environments.
Authors and Affiliations
Ms. Priyanka , Mr. Kapil Kumar Kaswan
Human Computer Interaction based on Psychology and Interactive system design
Human - computer interaction (HCI) is the area of intersection between psychology and the social sciences, on the one hand, and computer science and technology, on the other.HCI researchers analyze and design-specific us...
INVISIBLE MULTIPLE WATERMARKING WITH MINIMUM DISTORTION USING DWT-DCT-CDMA
with the advent of digital media copyright protection is main concern. To protect copyright of images DWT DCT image watermarking is used. In this CDMA approach of embedding watermark is taken so that maximum number of wa...
A NOVEL APPROACH FOR COMMUNITY DISCOVERY IN DYNAMIC NETWORKS
Recently, discovering aggressive communities has become an increasingly critical task. Many conclusion have been expected, most of which only use correlation structure. However, rich information is cipher in the content...
A Comparative Study on ATM Security with Multimodal Biometric System
Security is a major issue in Automated Teller Machine (ATM).with the wide spread utilization of electronic transactions it is necessary to increase customers recognition accuracy. Biometric systems can offer convenient a...
Comparative study of Gradient based image denoising methods
Images are playing very key role in various applications like medical imaging, remote sensing, and scientificresearch and in all these applications image clarity plays a major role. Any image that is captured has to be p...