Protected Data Forwarding by Erasure Coding to Cloud Storage System

Abstract

Present so many mobile services are converting to cloud depended mobile services with highly communications and higher flexibility. We explore a unique mobile cloud infrastructure that attaches mobiles and cloud services. This fresh infrastructure gives mobile instances which are virtual among cloud computing. To enter into marketing level various services containing this type of infrastructure, the people which give providers service have to know about these security openings. In this paper, we initially declare different mobile cloud services get into mobile cloud infrastructure and to discuss the security threats that might be chance through the usage of many service scenarios. Then, we explore architecture and methodology for abnormal behavior detection through the observation of host and network data. To check our methodology, we inserted malicious programs into our mobile cloud test be and utilized a machine learning algorithm to find out from those programs the abnormal behavior that arise.

Authors and Affiliations

Naren Raghavendra Suri , S. Gowtham Bharath

Keywords

Related Articles

‘On Demand Service Management’ For Next Generation Mobile Networks [LTE] Using Agents

The novelty of our work is the development of an optimal service provisioning and customer experience management framework, adding value to the mobile user community and also to the business development of network servic...

Strategizing Power Utilization within Intelligent Tags

Power management within intelligent Tags is one of the most important issues that must be given with utmost importance as the Tags are driven by battery power and the longevity of the battery must be increased so as to r...

 A Study on Network Security Aspects and Attacking Methods

 Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better u...

 Methodology for Artificial Immune Systems and Immune Pathology

 Artificial immune system (AIS) mimics the superior properties of biological immune system and provides an effective method in intelligent computing and intelligent system designing. But the disease-causing mechanis...

 REMOTE SENSING AND GIS APPLICATION IN BRACKISH AQUACULTURE IN NORTHERN PART OF ANDHRA PRADESH FROM SRIKAKULAM TO WEST GODAVARI

 Aquaculture development over the past 50 years has been facilitated largely by the application of science and the introduction of new technologies. Selection of potential and suitable site is the first and foremost...

Download PDF file
  • EP ID EP141469
  • DOI -
  • Views 72
  • Downloads 0

How To Cite

Naren Raghavendra Suri, S. Gowtham Bharath (2013). Protected Data Forwarding by Erasure Coding to Cloud Storage System. International Journal of P2P Network Trends and Technology(IJPTT), 3(10), 442-447. https://europub.co.uk/articles/-A-141469