SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
__________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 272
Dynamic Resource Allocation and Data Security for Cloud
Rajesh M. Devakate Amol B. Rajmane
Annasaheb Dange College of Engg. & Technology, Ashokrao Mane Group of Institutions, Vathar Tarf
Ashta, Maharashtra, India. Vadgaon, Maharashtra, India.
Abstract— Cloud computing is the next generation of IT organization. Cloud computing moves the software and
databases to the large centres where the management of services and data may not be fully trusted. In this system, we
focus on cloud data storage security, which has been an important aspect of quality of services. To ensure the
correctness of user’s data in the cloud, we propose an effective scheme with Advanced Encryption Standard and MD5
algorithm. Extensive security and performance analysis shows that the proposed scheme is highly efficient. In
proposed work we have developed efficient parallel data processing in clouds and present our research project for
parallel security. Parallel security is the data processing framework to explicitly exploit the dynamic storage along with
data security. We have proposed a strong, formal model for data security on cloud and corruption detection.
Keywords— Cloud computing, Resource Allocation, cryptography Encryption, Decryption, corruption detection.
I. INTRODUCTION
Several trends are opening in cloud computing, which is an Internet-based and use of computer technology to
development. The cheaper and more powerful processors with the software as a service (SaaS) computing architecture are
transforming data centres into pools of computing service on a large scale. The increasing network bandwidth and reliable
network connections make it even possible that internet users can subscribe high quality services from data and software
that resides on remote centres. Moving data into the cloud storage offers great benefit to users since they don’t have to
care about the difficulties of direct hardware management. The colonizer of cloud computing vendors, Amazon Simple
Storage Service (S3) and Amazon Elastic Compute Cloud (EC2) [1] are both known examples. While these online
services provides large amounts of storage space and customizable computing resources, this platform shift, however, is
eliminating the responsibility of local machines for data storage and maintenance at the same time. As a result, users are at
the leniency of their cloud service providers for the availability and integrity of their data. From the perspective of data
security, which has always been an important part of quality of service, cloud computing poses new challenging security
threats for number of reasons. Such as traditional cryptographic system for the purpose of data security protection cannot
be directly adopted due to the user’s loss control of data under cloud storage. Therefore, verification of correct data stored
in the cloud must be conducted without knowledge of the whole data. Considering various kinds of data for each user
stored in the cloud and the demand of continuous assurance of their data safety, the problem of verifying correctness of
data storage in the cloud becomes even more challenging. Cloud computing is not just a third party data warehouse. The
data stored in the cloud may be updated by the users. However, this dynamic feature also makes traditional integrity
insurance techniques. The deployment of cloud computing is powered by data centres running in a simultaneous,
cooperated and distributed manner. Individual user’s data is redundantly stored in multiple locations to further reduce the
data integrity threats. Therefore, distributed protocols for storage correctness assurance will be of most importance in
achieving a robust and secure cloud data storage system in the real world. However, such important area remains to be
fully explored in the literature.
This techniques, while can be useful to ensure the storage correctness without having users possessing data and they are
all focusing on single server scenario and most of them do not consider dynamic data operations. As a complementary
approach, researchers have also proposed distributed protocols [8] for ensuring storage correctness across multiple servers.
Again, none of these distributed schemes is aware of dynamic data operations. As a result, their applicability in cloud data
storage can be drastically limited.
In this paper, we proposed an effective and flexible distributed scheme with explicit dynamic data support to ensure the
correctness of user’s data in the file distribution preparation to provide redundancies and guarantee the data dependability.
This construction drastically reduces the communication and storage overhead as compared to the traditional replication-
based file. To process/allocate jobs like customer documentation upload to cloud server, we will provide facility of admin
to feed input to main server i.e. documents will be uploaded by admin on main server. Further our system will
automatically process data in parallel feed to cloud nodes for storage. Obviously, these documents will be chunked in
multiple parts and with the encryption. Once admin/user uploads desired documents, the basic working platform will be
ready for actual research. The file/resources storage on cloud is common application of corporate cloud. But if any loss of
data occurred due to virus attack or hacking, it will be difficult to recover.
Proposed work focuses on security and corruption detection of data. For this purpose we developed own system which
co-actively work with parallel data processing approach. We also utilized concept of MD5 to tag files with document
identity number. Hence if any part of file missing system can recover data using anti-parallel resource algorithm.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
__________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -273
II. LITERATURE REVIEW
Cloud computing is providing unlimited infrastructure to store and execute customer data and program. As customers
you do not need to own the infrastructure, they are merely accessing or renting; they can forego capital expenditure and
consume resources as a service, paying instead for what they use. Cloud storage can save users lots of money over local
storage solutions [1]. When user uses the cloud, user doesn’t know exactly where your data is hosted, what country it will
be stored in? Data should be stored and processed only in specific jurisdictions as define by user. Provider should also
make a contractual commitment to obey local privacy requirement on behalf of their customers. Data-centred policies that
are generated when a user provides personal or sensitive information, that information travels throughout its lifetime to
ensure that the information is used only in accordance with the policy [5]. Data that is generated during running of
program on instances is all customer data and therefore provider should not perform backups [7, 8].
Cong Wang investigated the problem of data security [2] in cloud data storage, which is essentially a distributed
storage system but doesn’t provide recovery facility. The processing frameworks which are currently used have been
designed for static, homogenous cluster setup and disregard the particular nature of cloud [3]. Fast and secure message
authentication in cryptography [4] provides splitting of file only supports for encryption and decryption of file in cloud
computing. Proofs of retrievability protocol represents the proof of data stored in server is intact and retrievable but not
support for file updates, as well as publicly verifiable PORs.
III. COMMENTS
As there is no facility of data recovery available in cloud domain, this is very crucial application to prove efficient
method for missing data recovery. The cloud’s virtualized nature helps to enable promising new use cases for efficient
parallel data processing. However, it also imposes new challenges compared to classic cluster setups. The major challenge
we see is the cloud’s opaqueness with prospect to exploiting data locality. For security reasons clouds often incorporate
network virtualization techniques which can hamper the inference process, in particular when based on latency
measurements.
To provide efficient parallel data processing for resource allocation we need to consider greater security while resources
being allocated, data loss prevention and efficient allocation of cloud storage resources. Many cloud infrastructures are
facing problems in parallel processing of data. Such problems may encounter due to hacking methodologies.
IV.NEED OF WORK
• To provide secure cloud storage for registered clients.
• To provide security against data hacking / server hacking
• To provide way for administrator to maintain user profiles and data profiles.
• To provide security for files through encryption concept.
• To provide multi-server facility for data storage i.e. to make multi-parts of client files.
• To allocate resources / files based upon storage capacity.
• To recover infected or corrupted resources /files.
V. PROPOSED WORK
To provide parallel data allocation and data security we have stored data on multiple cloud nodes and in case if any
data/part of file is missing or virus infected then we can able to recover data/resources. For recovery purpose we have
implemented self-derived algorithm which collectively work with MD5, dynamic data allocation approach and logical
addresses of file. We aim to recover data 100% which is not possible with existing systems.
In our proposed system client can be able to register with cloud service provider. Registered client have to login to
upload file which he/she want to store on cloud. Here client expects higher level of security for his/her resources. In this
system server receives resources uploaded by client. Server reviews received resource to filter banned data/documentation.
The main server receives resources uploaded by client. Consider user have upload “test.txt” file proposed algorithm
encrypts the file and splits into number of data chunks. These splitted data chunks parallelly processed to store on
auxiliary cloud server-1 and auxiliary cloud server-2 shown in figure 1. This system provides more security for data and
there will not be any direct access to user to auxiliary server’s data. We have implemented MD5 algorithm to check all
files are stored as it is or any files are modified due to impact of any mishap. In case of data corruption or missing file part,
we can recover original data from cloud server by using MD5 hash value.
A. Client Registration Facility for New Clients & Login Facility for Existing Clients
We have developed client registration and login window. This will register new user with system to avail system
facility. In this module existing client can log-in to upload his/her data file. If user is registered then he/she gets ID
& password. At the time of login user has to provide correct ID & password. Then system checks the user ID &
password if both are correct then user logged into the system. Unauthorized person cannot be able to login into the
system.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
__________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -274
Figure 1: System Architecture
B. File Encryption and Upload
In this module, when user is registered he/she uploads file on main server and the main server encrypts the file
and stored on server.
Figure 2: AES Encryption
The Advanced Encryption Standard (AES) algorithm is implemented for encryption of the data shown in figure 2.
The main server receives files uploaded by client. Then file is splitted into number of data chunks. The AES
algorithm will encrypt the splitted file parts. These data will be parallelly processed to store on nodes.
C. File Decryption and Download
In this module, user can download the files from server. The main server decrypts the file using AES algorithm
and gives to the user. The AES algorithm is also implemented for decryption of the data. This will provide more
security for data and there will not be any direct access of user to auxiliary server’s data.
D. Dynamic Resource Allocation
In this module, we have created virtual nodes for allocating different servers for storage. In our project, we have
created nodes for storing the files shown in figure 3. Suppose file is encrypted and stored on different nodes. When
we are trying to download file then file parts are collected from various nodes.
We have presented a system that uses virtualization technology to store data resources (file) dynamically and
support green computing by optimizing the number of servers in use. We have combined different types of
workloads (storage) nicely and improved the overall utilization of server resources. We have developed a set of
heuristics that prevent overload in the system effectively while saving energy used.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
__________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -275
Figure 3: Node Information
E. File Corruption Detection and Recovery
In this module, we have implemented MD5 algorithm. User’s file is splitted and encrypted using AES algorithm.
That file parts are stored on different nodes. By using MD5, we have calculated hash value and stored on database.
When user wants to download his/her file then again hash value of current file is calculated and verified with old
hash value. If both hash values are matched then user gets his original file. If hash values are not same then we can
say that file parts are corrupted or infected. When we know that file is corrupted then we can recover this file.
VI.RESULTS
TABLE I
File & Fragmentation size for 2 Node
File size Fragment
sizeF1 50KB 25KB
F2 50MB 25MB
F3 500MB 250MB
F4 1GB 512MB
Table I shows the file size and fragment size. We are using two nodes for storage then file is splitted into two parts.
TABLE II
Comparison of Encryption Algorithms
File
Average Encryption time
(Milliseconds)
AES128 AES256 DES
F1 0.00055 0.0008 0.00135
F2 0.0006 0.00095 0.00155
F3 0.0007 0.0012 0.0018
F4 0.00095 0.0014 0.0020
Table II shows the file and time required for encryption. We have taken three different algorithms for comparison
viz. Advanced Encryption Standard (128bits), AES (256bits) and Data Encryption Standard.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
__________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page -276
Figure 4: Comparison of three encryption algorithms
Figure (4) shows the result of comparison of different encryption algorithms such as Advanced Encryption Standard
(AES128 & AES256) and Data Encryption Standard (DES). The obtained results from different encryption algorithms are
used to analyze the result of proposed system. The obtained results from encryption algorithms are compared & after
comparing the obtained results it shows the AES128 is efficient algorithm for encryption and decryption.
VII. CONCLUSION
We have implemented the system to provide data security and ensure the correctness of user’s data in cloud. Security
is provided through the encryption and decryption technique. Also system is implemented for parallel processing of data.
We provide dynamic resource allocation by creating virtual nodes and data recovery in cloud computing. So user can
recover his/her data if infected or corrupted.
ACKNOWLEDGEMENT
I would like to thanks my guide Prof.A.B.Rajmane for his valuable and constructive comments. I would also like to
thanks Prof. Mrs. A.N. Mulla, HOD Computer Science & Engineering Department, Annasaheb Dange College of
Engineering & Technology, Ashta for her valuable support.
REFERENCES
[1] Amazon.com. Amazon simple storage service (Amazon S3), 2009.
[2] Cong Wang, Qian Wang, Kui Ren and Wenjing Lou “Ensuring Data Storage Security in Cloud Computing” ,IEEE
2009.
[3] Daniel Warneke, Member, IEEE, and Odej Kao. Dynamic resource allocation for efficient parallel data processing in
cloud, 2011.
[4] D. Warneke and O. Kao, “Nephele: Efficient Parallel Data Processing in the Cloud,” Proc. Second Workshop Many-
Task Computing on Grids and Supercomputers (MTAGS ’09), pp. 1-10, 2009.
[5] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at
untrusted stores. In 14th ACM CCS, pages 598–609, 2007.
[6] J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: Fast and secure message authentication. In
CRYPTO, volume 1666 of LNCS, pages 216–233, 1999.
[7] K. D. Bowers, A. Juels, and A Oprea: A high-availability and integrity layer for cloud storage, 2008. IACR ePrint
manuscript 2008/489.
[8] K. D. Bowers, A. Juels, and A Oprea. Proofs of retrievability: Theory and implementation, 2008. IACR ePrint
manuscript 2008/175.
[9] D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L.Youseff, and D.Zagorodnov, “Eucalyptus: A
Technical Report on an Elastic Utility Computing Architecture Linking Your Programs to Useful Systems,”
technical report, Univ. of California, Santa Barbara, 2008.

More Related Content

What's hot

Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesIOSR Journals
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerIOSR Journals
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
 
Privacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudPrivacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudeSAT Publishing House
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based datahemanthbbc
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlijdpsjournal
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd Iaetsd
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...pharmaindexing
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET Journal
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd Iaetsd
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...IJCI JOURNAL
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET Journal
 

What's hot (17)

Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 
Enabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud ServerEnabling Integrity for the Compressed Files in Cloud Server
Enabling Integrity for the Compressed Files in Cloud Server
 
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
 
Privacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudPrivacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloud
 
Ieeepro techno solutions 2011 ieee java project -secure role based data
Ieeepro techno solutions   2011 ieee java project -secure role based dataIeeepro techno solutions   2011 ieee java project -secure role based data
Ieeepro techno solutions 2011 ieee java project -secure role based data
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
E045026031
E045026031E045026031
E045026031
 
Iaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloudIaetsd an efficient secure scheme for multi user in cloud
Iaetsd an efficient secure scheme for multi user in cloud
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
 

Viewers also liked

Stages of development contents
Stages of development contentsStages of development contents
Stages of development contentsHeywoodmedia
 
Visualizations - Make them stand out
Visualizations - Make them stand outVisualizations - Make them stand out
Visualizations - Make them stand outankur.jindal1985
 
Stereotype more complex
Stereotype more complexStereotype more complex
Stereotype more complextlink3
 
Skirts on New year
Skirts on New yearSkirts on New year
Skirts on New yearEra Chandok
 
Apocalypse intro
Apocalypse introApocalypse intro
Apocalypse introOwenMaers
 
Calorie Control Council Presentation
Calorie Control Council PresentationCalorie Control Council Presentation
Calorie Control Council PresentationMichael Durwin
 
Enterprise Collaboration and Employee Engagement with Microsoft SharePoint My...
Enterprise Collaboration and Employee Engagement with Microsoft SharePoint My...Enterprise Collaboration and Employee Engagement with Microsoft SharePoint My...
Enterprise Collaboration and Employee Engagement with Microsoft SharePoint My...rwuhrman
 
Nucleotidos
NucleotidosNucleotidos
NucleotidosCaiah
 
Amarillo Craft Brewing Company
Amarillo Craft Brewing CompanyAmarillo Craft Brewing Company
Amarillo Craft Brewing CompanyMatthew Helm
 

Viewers also liked (17)

Stages of development contents
Stages of development contentsStages of development contents
Stages of development contents
 
10042016 ssp seminar1_session1_asadilari
10042016 ssp seminar1_session1_asadilari10042016 ssp seminar1_session1_asadilari
10042016 ssp seminar1_session1_asadilari
 
Pollution
PollutionPollution
Pollution
 
10042016 ssp seminar1_session4_myers
10042016 ssp seminar1_session4_myers10042016 ssp seminar1_session4_myers
10042016 ssp seminar1_session4_myers
 
Visualizations - Make them stand out
Visualizations - Make them stand outVisualizations - Make them stand out
Visualizations - Make them stand out
 
Stereotype more complex
Stereotype more complexStereotype more complex
Stereotype more complex
 
U4. passive voice
U4. passive voiceU4. passive voice
U4. passive voice
 
Skirts on New year
Skirts on New yearSkirts on New year
Skirts on New year
 
Apocalypse intro
Apocalypse introApocalypse intro
Apocalypse intro
 
Calorie Control Council Presentation
Calorie Control Council PresentationCalorie Control Council Presentation
Calorie Control Council Presentation
 
4
4 4
4
 
Filter Bubble
Filter BubbleFilter Bubble
Filter Bubble
 
Arn mensajero
Arn mensajeroArn mensajero
Arn mensajero
 
Enterprise Collaboration and Employee Engagement with Microsoft SharePoint My...
Enterprise Collaboration and Employee Engagement with Microsoft SharePoint My...Enterprise Collaboration and Employee Engagement with Microsoft SharePoint My...
Enterprise Collaboration and Employee Engagement with Microsoft SharePoint My...
 
Nucleotidos
NucleotidosNucleotidos
Nucleotidos
 
Amarillo Craft Brewing Company
Amarillo Craft Brewing CompanyAmarillo Craft Brewing Company
Amarillo Craft Brewing Company
 
Ghandi
GhandiGhandi
Ghandi
 

Similar to Dynamic Resource Allocation and Data Security for Cloud

Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostIRJET Journal
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureeSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with siceSAT Publishing House
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Journals
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Publishing House
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageeSAT Journals
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...IJMER
 
S.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage servicesS.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage serviceskalaiselvanresearch
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudINFOGAIN PUBLICATION
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationijmnct
 

Similar to Dynamic Resource Allocation and Data Security for Cloud (20)

Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
50620130101004
5062013010100450620130101004
50620130101004
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
 
S.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage servicesS.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage services
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
 

More from AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNAM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTAM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
 

More from AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Recently uploaded

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

Dynamic Resource Allocation and Data Security for Cloud

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com __________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 272 Dynamic Resource Allocation and Data Security for Cloud Rajesh M. Devakate Amol B. Rajmane Annasaheb Dange College of Engg. & Technology, Ashokrao Mane Group of Institutions, Vathar Tarf Ashta, Maharashtra, India. Vadgaon, Maharashtra, India. Abstract— Cloud computing is the next generation of IT organization. Cloud computing moves the software and databases to the large centres where the management of services and data may not be fully trusted. In this system, we focus on cloud data storage security, which has been an important aspect of quality of services. To ensure the correctness of user’s data in the cloud, we propose an effective scheme with Advanced Encryption Standard and MD5 algorithm. Extensive security and performance analysis shows that the proposed scheme is highly efficient. In proposed work we have developed efficient parallel data processing in clouds and present our research project for parallel security. Parallel security is the data processing framework to explicitly exploit the dynamic storage along with data security. We have proposed a strong, formal model for data security on cloud and corruption detection. Keywords— Cloud computing, Resource Allocation, cryptography Encryption, Decryption, corruption detection. I. INTRODUCTION Several trends are opening in cloud computing, which is an Internet-based and use of computer technology to development. The cheaper and more powerful processors with the software as a service (SaaS) computing architecture are transforming data centres into pools of computing service on a large scale. The increasing network bandwidth and reliable network connections make it even possible that internet users can subscribe high quality services from data and software that resides on remote centres. Moving data into the cloud storage offers great benefit to users since they don’t have to care about the difficulties of direct hardware management. The colonizer of cloud computing vendors, Amazon Simple Storage Service (S3) and Amazon Elastic Compute Cloud (EC2) [1] are both known examples. While these online services provides large amounts of storage space and customizable computing resources, this platform shift, however, is eliminating the responsibility of local machines for data storage and maintenance at the same time. As a result, users are at the leniency of their cloud service providers for the availability and integrity of their data. From the perspective of data security, which has always been an important part of quality of service, cloud computing poses new challenging security threats for number of reasons. Such as traditional cryptographic system for the purpose of data security protection cannot be directly adopted due to the user’s loss control of data under cloud storage. Therefore, verification of correct data stored in the cloud must be conducted without knowledge of the whole data. Considering various kinds of data for each user stored in the cloud and the demand of continuous assurance of their data safety, the problem of verifying correctness of data storage in the cloud becomes even more challenging. Cloud computing is not just a third party data warehouse. The data stored in the cloud may be updated by the users. However, this dynamic feature also makes traditional integrity insurance techniques. The deployment of cloud computing is powered by data centres running in a simultaneous, cooperated and distributed manner. Individual user’s data is redundantly stored in multiple locations to further reduce the data integrity threats. Therefore, distributed protocols for storage correctness assurance will be of most importance in achieving a robust and secure cloud data storage system in the real world. However, such important area remains to be fully explored in the literature. This techniques, while can be useful to ensure the storage correctness without having users possessing data and they are all focusing on single server scenario and most of them do not consider dynamic data operations. As a complementary approach, researchers have also proposed distributed protocols [8] for ensuring storage correctness across multiple servers. Again, none of these distributed schemes is aware of dynamic data operations. As a result, their applicability in cloud data storage can be drastically limited. In this paper, we proposed an effective and flexible distributed scheme with explicit dynamic data support to ensure the correctness of user’s data in the file distribution preparation to provide redundancies and guarantee the data dependability. This construction drastically reduces the communication and storage overhead as compared to the traditional replication- based file. To process/allocate jobs like customer documentation upload to cloud server, we will provide facility of admin to feed input to main server i.e. documents will be uploaded by admin on main server. Further our system will automatically process data in parallel feed to cloud nodes for storage. Obviously, these documents will be chunked in multiple parts and with the encryption. Once admin/user uploads desired documents, the basic working platform will be ready for actual research. The file/resources storage on cloud is common application of corporate cloud. But if any loss of data occurred due to virus attack or hacking, it will be difficult to recover. Proposed work focuses on security and corruption detection of data. For this purpose we developed own system which co-actively work with parallel data processing approach. We also utilized concept of MD5 to tag files with document identity number. Hence if any part of file missing system can recover data using anti-parallel resource algorithm.
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com __________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -273 II. LITERATURE REVIEW Cloud computing is providing unlimited infrastructure to store and execute customer data and program. As customers you do not need to own the infrastructure, they are merely accessing or renting; they can forego capital expenditure and consume resources as a service, paying instead for what they use. Cloud storage can save users lots of money over local storage solutions [1]. When user uses the cloud, user doesn’t know exactly where your data is hosted, what country it will be stored in? Data should be stored and processed only in specific jurisdictions as define by user. Provider should also make a contractual commitment to obey local privacy requirement on behalf of their customers. Data-centred policies that are generated when a user provides personal or sensitive information, that information travels throughout its lifetime to ensure that the information is used only in accordance with the policy [5]. Data that is generated during running of program on instances is all customer data and therefore provider should not perform backups [7, 8]. Cong Wang investigated the problem of data security [2] in cloud data storage, which is essentially a distributed storage system but doesn’t provide recovery facility. The processing frameworks which are currently used have been designed for static, homogenous cluster setup and disregard the particular nature of cloud [3]. Fast and secure message authentication in cryptography [4] provides splitting of file only supports for encryption and decryption of file in cloud computing. Proofs of retrievability protocol represents the proof of data stored in server is intact and retrievable but not support for file updates, as well as publicly verifiable PORs. III. COMMENTS As there is no facility of data recovery available in cloud domain, this is very crucial application to prove efficient method for missing data recovery. The cloud’s virtualized nature helps to enable promising new use cases for efficient parallel data processing. However, it also imposes new challenges compared to classic cluster setups. The major challenge we see is the cloud’s opaqueness with prospect to exploiting data locality. For security reasons clouds often incorporate network virtualization techniques which can hamper the inference process, in particular when based on latency measurements. To provide efficient parallel data processing for resource allocation we need to consider greater security while resources being allocated, data loss prevention and efficient allocation of cloud storage resources. Many cloud infrastructures are facing problems in parallel processing of data. Such problems may encounter due to hacking methodologies. IV.NEED OF WORK • To provide secure cloud storage for registered clients. • To provide security against data hacking / server hacking • To provide way for administrator to maintain user profiles and data profiles. • To provide security for files through encryption concept. • To provide multi-server facility for data storage i.e. to make multi-parts of client files. • To allocate resources / files based upon storage capacity. • To recover infected or corrupted resources /files. V. PROPOSED WORK To provide parallel data allocation and data security we have stored data on multiple cloud nodes and in case if any data/part of file is missing or virus infected then we can able to recover data/resources. For recovery purpose we have implemented self-derived algorithm which collectively work with MD5, dynamic data allocation approach and logical addresses of file. We aim to recover data 100% which is not possible with existing systems. In our proposed system client can be able to register with cloud service provider. Registered client have to login to upload file which he/she want to store on cloud. Here client expects higher level of security for his/her resources. In this system server receives resources uploaded by client. Server reviews received resource to filter banned data/documentation. The main server receives resources uploaded by client. Consider user have upload “test.txt” file proposed algorithm encrypts the file and splits into number of data chunks. These splitted data chunks parallelly processed to store on auxiliary cloud server-1 and auxiliary cloud server-2 shown in figure 1. This system provides more security for data and there will not be any direct access to user to auxiliary server’s data. We have implemented MD5 algorithm to check all files are stored as it is or any files are modified due to impact of any mishap. In case of data corruption or missing file part, we can recover original data from cloud server by using MD5 hash value. A. Client Registration Facility for New Clients & Login Facility for Existing Clients We have developed client registration and login window. This will register new user with system to avail system facility. In this module existing client can log-in to upload his/her data file. If user is registered then he/she gets ID & password. At the time of login user has to provide correct ID & password. Then system checks the user ID & password if both are correct then user logged into the system. Unauthorized person cannot be able to login into the system.
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com __________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -274 Figure 1: System Architecture B. File Encryption and Upload In this module, when user is registered he/she uploads file on main server and the main server encrypts the file and stored on server. Figure 2: AES Encryption The Advanced Encryption Standard (AES) algorithm is implemented for encryption of the data shown in figure 2. The main server receives files uploaded by client. Then file is splitted into number of data chunks. The AES algorithm will encrypt the splitted file parts. These data will be parallelly processed to store on nodes. C. File Decryption and Download In this module, user can download the files from server. The main server decrypts the file using AES algorithm and gives to the user. The AES algorithm is also implemented for decryption of the data. This will provide more security for data and there will not be any direct access of user to auxiliary server’s data. D. Dynamic Resource Allocation In this module, we have created virtual nodes for allocating different servers for storage. In our project, we have created nodes for storing the files shown in figure 3. Suppose file is encrypted and stored on different nodes. When we are trying to download file then file parts are collected from various nodes. We have presented a system that uses virtualization technology to store data resources (file) dynamically and support green computing by optimizing the number of servers in use. We have combined different types of workloads (storage) nicely and improved the overall utilization of server resources. We have developed a set of heuristics that prevent overload in the system effectively while saving energy used.
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com __________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -275 Figure 3: Node Information E. File Corruption Detection and Recovery In this module, we have implemented MD5 algorithm. User’s file is splitted and encrypted using AES algorithm. That file parts are stored on different nodes. By using MD5, we have calculated hash value and stored on database. When user wants to download his/her file then again hash value of current file is calculated and verified with old hash value. If both hash values are matched then user gets his original file. If hash values are not same then we can say that file parts are corrupted or infected. When we know that file is corrupted then we can recover this file. VI.RESULTS TABLE I File & Fragmentation size for 2 Node File size Fragment sizeF1 50KB 25KB F2 50MB 25MB F3 500MB 250MB F4 1GB 512MB Table I shows the file size and fragment size. We are using two nodes for storage then file is splitted into two parts. TABLE II Comparison of Encryption Algorithms File Average Encryption time (Milliseconds) AES128 AES256 DES F1 0.00055 0.0008 0.00135 F2 0.0006 0.00095 0.00155 F3 0.0007 0.0012 0.0018 F4 0.00095 0.0014 0.0020 Table II shows the file and time required for encryption. We have taken three different algorithms for comparison viz. Advanced Encryption Standard (128bits), AES (256bits) and Data Encryption Standard.
  • 5. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com __________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page -276 Figure 4: Comparison of three encryption algorithms Figure (4) shows the result of comparison of different encryption algorithms such as Advanced Encryption Standard (AES128 & AES256) and Data Encryption Standard (DES). The obtained results from different encryption algorithms are used to analyze the result of proposed system. The obtained results from encryption algorithms are compared & after comparing the obtained results it shows the AES128 is efficient algorithm for encryption and decryption. VII. CONCLUSION We have implemented the system to provide data security and ensure the correctness of user’s data in cloud. Security is provided through the encryption and decryption technique. Also system is implemented for parallel processing of data. We provide dynamic resource allocation by creating virtual nodes and data recovery in cloud computing. So user can recover his/her data if infected or corrupted. ACKNOWLEDGEMENT I would like to thanks my guide Prof.A.B.Rajmane for his valuable and constructive comments. I would also like to thanks Prof. Mrs. A.N. Mulla, HOD Computer Science & Engineering Department, Annasaheb Dange College of Engineering & Technology, Ashta for her valuable support. REFERENCES [1] Amazon.com. Amazon simple storage service (Amazon S3), 2009. [2] Cong Wang, Qian Wang, Kui Ren and Wenjing Lou “Ensuring Data Storage Security in Cloud Computing” ,IEEE 2009. [3] Daniel Warneke, Member, IEEE, and Odej Kao. Dynamic resource allocation for efficient parallel data processing in cloud, 2011. [4] D. Warneke and O. Kao, “Nephele: Efficient Parallel Data Processing in the Cloud,” Proc. Second Workshop Many- Task Computing on Grids and Supercomputers (MTAGS ’09), pp. 1-10, 2009. [5] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song. Provable data possession at untrusted stores. In 14th ACM CCS, pages 598–609, 2007. [6] J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: Fast and secure message authentication. In CRYPTO, volume 1666 of LNCS, pages 216–233, 1999. [7] K. D. Bowers, A. Juels, and A Oprea: A high-availability and integrity layer for cloud storage, 2008. IACR ePrint manuscript 2008/489. [8] K. D. Bowers, A. Juels, and A Oprea. Proofs of retrievability: Theory and implementation, 2008. IACR ePrint manuscript 2008/175. [9] D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L.Youseff, and D.Zagorodnov, “Eucalyptus: A Technical Report on an Elastic Utility Computing Architecture Linking Your Programs to Useful Systems,” technical report, Univ. of California, Santa Barbara, 2008.