Data storage security in Cloud
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract : Cloud computing is worthy of consideration and try to build business systems as a way for businesses in this way can undoubtly bring about lower costs, higher profits and more choice; for large scale industry, Data security has become the most important issue of cloud computing security. Though many solutions have been proposed, many of them only considers one side of security ;this paper proposes the cloud data security must be considered to analyze the data security risk, the data security requirements, deployment of security functions and the data security process through encryption. Distribution of file is done on cloud servers with token generation. The security architecture of the system is designed using encoding algorithms, which eliminates the fraud that occurs today with stolen data. There is no danger of any data sent within the system being intercepted, and replaced. The system is acceptably secure, but that the level of encoding has to be stepped up as computing power increases. Results in order to be secured the system the communication between modules is encoded. Since the customer does not have control over data the cloud provider should assure the customer that data is not modified. In this paper a data correctness scheme is proposed in which a cloud service provider assures the user that the data is stored in the cloud is safe. This scheme also achieves the integration of storage correctness insurance and data error localization i.e., the identification of misbehaving server(s).
Authors and Affiliations
Mrs. Niyamat Ujloomwale, Mrs. Ranjana Badre
RED TACTON (An avant-garde Human Area Networking technology)
So many technologies for networking are known and are in use. These technologies connect people, objects and other networks together so as to share data and thus make information ready for access. Our body could...
Survey on Crowd-Source Video Sharing Systems
Abstract: Nowadays video capturing from mobile and sharing it is common. Consider it be any event, function, performance by an artist, any surprising event. For example, if any famous speaker addressing huge number ofpeo...
Face Recognition Using Convolution Based Dwt and CLBP Feature Vectors
Abstract: The face recognition is an essential criteria to identify a person in recent advanced security systems. In this paper, we propose efficient Face Recognition using Convolution based DWT and CLBP Feature Vectors....
Detection of Cancer in Pap smear Cytological Images Using Bag of Texture Features
We present a visual dictionary based method for content based image retrieval in cervical microscopy images using texture features. The nucleus region in each image is identified by a simple and reliable se...
Secured Genetic Algorithm based image hiding technique with location number compression
Abstract: Data hiding involves hiding of information in a cover media to obtain the indistinguishable media, in such a way that the cover media is supposed not to have any embedded image for its unintended recipien...