New mechanism for Cloud Computing Storage Security
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 7
Abstract
Cloud computing, often referred to as simply the cloud, appears as an emerging computing paradigm which promises to radically change the way computer applications and services are constructed, delivered, managed and finally guaranteed as dynamic computing environments for end users. The cloud is the delivery of on-demand computing resources - everything from applications to data centers - over the Internet on a pay-for-use basis. The revolution of cloud computing has provided opportunities for research in all aspects of cloud computing. Despite the big progress in cloud computing technologies, funding concerns in cloud, security may limit a broader adoption. This paper presents a technique to tolerate both accidental and intentional faults, which is fragmentation-redundancy-scattering (FRS). The possibility to use the FRS technique as an intrusion tolerance one is investigated for providing secure and dependable storage in the cloud environment. Also a cloud computing security (CCS) based on the FRS technique is proposed to explore how this proposal can then be used via several scenarios. To demonstrate the robustness of the proposal, we formalize our design and we carry out a security as well as performance evaluations of the approach and we compare it with the classical model. The paper concludes by strongly suggesting future research proposals for the CCS framework.
Authors and Affiliations
Almokhtar Mrabti, Najim Ammari, Anas Kalam, Abdellah Ouahman, Mina Montfort
Big Data Processing for Full-Text Search and Visualization with Elasticsearch
In this paper, the task of using Big Data to identify specific individuals on the indirect grounds of their interaction with information resources is considered. Possible sources of Big Data and problems related to its p...
Uniform Segregation of Densely Deployed Wireless Sensor Networks
In wireless sensor networks, the selection of cluster heads relies upon the various selection parameters, such as energy, distance, node concentration and rate of retransmission. There is always uncertainty in the suitab...
Embedded Feature Selection Method for a Network-Level Behavioural Analysis Detection Model
Feature selection in network-level behavioural analysis studies is used to represent the network datasets of a monitored space. However, recent studies have shown that current behavioural analysis methods at the network-...
Hybrid Multi-faceted Computational Trust Model for Online Social Network (OSN)
Online Social Network (OSN) is an online social platform that enables people to exchange information, get in touch with family members or friends, and also helps as a marketing tool. However, OSN suffers from various sec...
PSO Algorithm based Adaptive Median Filter for Noise Removal in Image Processing Application
A adaptive Switching median filter for salt and pepper noise removal based on genetic algorithm is presented. Proposed filter consist of two stages, a noise detector stage and a noise filtering stage. Particle swarm opti...