SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 312
A Privacy Preserving Three-Layer Cloud Storage Scheme Based
On Computational Intelligence in Fog Computing
Lakshmi Prasad1
, Ajeesh S2
,Smita C Thomas3
1
(P G Scholar, Department of Computer Science and Engineering,Mount Zion College of Engineering, Kadammanitta
Email: lakshmiprsd24@gmail.com)
2
(Assistant Professor, Department of CSE, Mount Zion College Of Engineering, Kadammanitta)
3
(Research Scholar, Vels University,Chennai
Email: smitabejoy@gmail.com)
----------------------------------------************************----------------------------------
Abstract:
Distributed computing and capacity gives clients to store and procedure their information in server
farms. At the point when an association chooses to store information in cloud, it loses its entitlement to
access to servers facilitating its data. Along these lines there is an opportunity of insider assaults. Existing
security insurance systems are typically founded on encryption innovation, yet these sorts of techniques
can't viably oppose assault from the cloud. To determine this issue, here proposes a three-layer stockpiling
structure which depends on haze registering. The proposed engineering can both exploit distributed
storage and secure the protection of information. In addition, Hash-Solomon code calculation is intended
to partition information into sections. At that point, we can place a little piece of information in
neighborhood machine and haze server so as to ensure the security and other in cloud. Additionally, in
light of computational knowledge, this calculation can figure the dissemination extent put away in cloud,
haze, and neighborhood machine, separately. By the hypothetical security investigation and trials, the
possibility of our plan has been approved, which is actually a successful outcome to existing distributed
storage plot.
Keywords —Cloud computing, cloud storage, fog computing, privacy protection
----------------------------------------************************----------------------------------
I. INTRODUCTION
Cloud is only a gathering of servers and
datacenters that are set at better places and these
servers and datacenters are liable for giving on
request administration to its clients with the
assistance of web. The administration gave by
cloud is absent on client's PC. Client needs to get
to these administrations with assistance of web
association through buying in them. The
fundamental favorable position of Cloud figuring
is that it takes out the requirement for client to be
in same area where equipment, programming and
extra room is truly present[2]. Cloud makes it
RESEARCH ARTICLE OPEN ACCESS
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 313
conceivable to store and access your information
from anyplace whenever without agonizing over
support. All the administrations are given to the
client less expense. Client needs to pay as per the
extra room utilized.
Distributed computing is a technique for
conveying data innovation administrations in
which assets are gotten from the Internet through
online instruments and applications, rather than an
immediate association with a server. It's called
distributed computing in light of the fact that the
data being gotten to is found in the cloud and
doesn't require a client to be in a particular spot to
access it. Distributed computing is turning out to
be increasingly famous. It is utilized in numerous
zones. So as to pull in most extreme clients, it
needs to offer great quality types of assistance
which ought to be secure and solid. Security turns
into a major issue when any one stores its data to
a stage which isn't straightforwardly constrained
by client.
The utilization of cloud is straightforward,
so everybody is moving information and
application programming to cloud server farms.
The Cloud Service Provider (CSP) ought to give
security, uprightness, accessibility and privacy. In
any case, CSP isn't giving. proper information
administrations to client and put away information.
The issues identified with distributed storage are
information robbery, inaccessibility of
information and information breaks. An
information break happens when a programmer
takes, uses, or discharges delicate data.
Information is put away in the cloud shared by a
huge number. The information is portable, that it
very well may be moved starting with one area
then onto the next. The cloud clients may not
know about the information area. The private data
is put away from the proprietor, it expands its
powerlessness. The protection of cloud can't be
ensured.
A noxious insider is a current or previous
representative, contractual worker, or accomplice
who has the privilege to get to organization
information, and takes or harms the information.
Protection depends on secure procedures, for
example, solid access control, consistent checking
forms and examines activities that lie beyond
adequate capacities.
Conventional secure distributed storage
answers for the above issues are normally
concentrating on limitations to access or
encryption of the information. These strategies
can resolve a large portion of the issues. Be that
as it may, the entirety of the arrangements can't
tackle the assaults well, despite the fact that the
calculation improves. Hence, here proposes a TLS
conspire which depends on haze figuring model
and structure a Hash-Solomon code dependent on
Reed-Solomon code. Haze figuring is an all-
inclusive processing model dependent on
distributed computing which is made out of a
great deal of hubs. These hubs have a specific
stockpiling limit and preparing capacity.
In this plan, split client's information into
three sections and each part is spared in the cloud
server, the mist server and the client's
neighborhood machine. Additionally, contingent
upon the property of the Hash-Solomon code, the
plan can guarantee the first information can't be
recouped by halfway information. Utilizing Hash-
Solomon code will deliver a piece of excess
information squares which will be utilized in
translating. Expanding the quantity of excess
squares can build the unwavering quality of the
capacity, however it likewise brings about extra
information stockpiling. By fitting designation of
the information, our plan can truly ensure the
security of client's information. The Hash-
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 314
Solomon code needs complex estimation, which
is done dependent on computational knowledge.
II. LITERATURE SURVEY
The significance part of security in distributed
storage has pulled in a great deal of consideration
regardless of for a solitary client or industry.
There are a ton of explores about secure
distributed storage models as of late. To
understand the security issue in distributed
computing, paper [1] proposed a protection saving
and duplicate discouragement CBIR conspire
utilizing encryption and watermarking strategies.
This plan can secure the picture substance and
picture highlights from the semi-legit cloud
server, and deflect the picture client from illicitly
appropriating the recovered pictures. Shen et al.
think cloud is semi-trusted and propose a system
for urban information sharing by misusing the
quality based cryptography. The plan they
proposed is make sure about and can oppose
potential assaults [2]. Fu et al. propose a
substance mindful inquiry plot, which can make
semantic hunt more brilliant. The tests results
show that their plan is productive [3].
In paper [4], Hou, Pu and Fan think about that
in customary circumstance, client's information is
put away through CSP, regardless of whether CSP
is dependable, aggressors can even now get
client's information on the off chance that they
control the distributed storage the executives hub.
To maintain a strategic distance from this issue,
they propose an encoded file structure dependent
on a deviated challenge-reaction validation
instrument. At the point when client demands
information from cloud server, the client sends a
secret key to the server for recognizable proof.
Thinking about it that the secret key might be
captured, the structure utilizes unbalanced
reaction mode. Hou, Wu, Zhen and Yang call
attention to that the safe center of distributed
storage is security and protection in conveyed
framework. So they propose a safe virtual
insurance plot dependent on SSL and Daoli in
paper [5], [6]. By moving information over SSL
and conveying Daoli on the cloud server, the
framework encodes information before it is
composed into the hard plate. In paper [7], Feng
brings up that in paper [5], the weight of server
will increment and information may spill during
transmission in cloud servers.
Feng proposes a more concise scheme:
encrypting data in closed cloud environment.
Besides, it can achieve multi-point secure storage
with one time encrypting. However, these
encryption make search in cloud more difficult.
Currently, searchable encryption is a hot topic in
the field of cloud computing. Paper [8]–[10] give
different solutions to this problem. Each of them
achieves high accuracy, security and efficient.
III. EXISTING SYSTEM
In the existing model there is an authentication
process for each user. The whole data is encrypted
before storing to the cloud.
Authentication
User saves the data using username and password.
By this unauthorized users cannot access the data.
This has less security that the username and
password can be hacked.
Encryption
In cryptography, encryption is the method by
which plaintext or any other type of data is
converted from a readable form to an encoded
version that can be decoded using the key. It is
one of the most important methods for providing
security. The encryption process helps securing
data even from providers.In the existing system
XOR mechanism is used for encryption. This
mechanism is very easy to hack because the
length of the plain text and key size is same. So it
is easy to find the key. Thus the encryption
becomes useless.
IV. SECURE STORAGE USING FOG
COMPUTING
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 315
So as to ensure client's security, we
propose a TLS system dependent on haze
registering model. The TSL system can give client
a specific intensity of the executives and
successfully ensure client's protection. As
referenced, the inside assault is hard to stand up to.
Conventional methodologies function admirably
in understanding outside assault, however when
CSP itself has issues, customary ways are for the
most part invalid. Not quite the same as the
conventional methodologies, in our plan, client's
information is isolated into three distinctive size
parts with encoding innovation. Every one of
them will come up short on a piece of key data for
secrecy. Consolidating with the mist processing
model, the three pieces of information will be put
away in the cloud server, the mist server and
client's nearby machine as indicated by the
request from huge to little.
By this method, the attacker cannot
recover the user’s original data even if he gets all
the data from a certain server. As for the CSP,
they also cannot get any useful information
without the data stored in the fog server and local
machine because both of the fog server and local
machine are controlled by users.
As appeared in Figure the TLS structure
utilizes mist server's stockpiling and information
handling capacity. The engineering incorporates
three layers, the cloud server, the haze server and
the nearby machine. Every server spares a specific
piece of information, the capacity extent is
dictated by clients' distribution procedure. Right
off the bat, client's information will be encoded on
client's neighborhood machine. At that point, for
instance, let 1%encoded information be put away
in the machine. At that point transfer the rest of
information to the mist server. Also, on the haze
server, we do comparable activities to the
information which originates from client's
machine. There will be about 4% information put
away in the mist server and afterward transfer the
rest of to the cloud server. The above tasks
depend on Hash-Solomon code. Hash-Solomon
code is a sort of coding strategies dependent on
Reed-Solomon code. In the wake of being
encoded by Hash-Solomon code, the information
will be separated into k parts and creates m
repetitive information. Hash-Solomon code has
such property, in these k+m parts of information,
in the event that somebody has at any rate k parts,
he can recoup the total information. In other word,
it's not possible for anyone to recoup the total
information with not as much as k parts of
information. As indicated by this property of
Hash-Solomon code, in our plan, we let close to
k-1 pieces of information be put away in higher
server which has bigger capacity limit and left the
rest of put away in the lower server. Along these
lines, the stealer can't recuperate the total
information regardless of whether one of the three
layers' information was taken. Accordingly we
can guarantee the security of client's information.
Invalid Ratioisthe ratio of the number of
failure data blocks to the number of data blocks
which will be used in encoding. In other words,
the ratio of the number of data blocks stored in
lower server to the number of data blocks stored
in the upper server. For example, the ratio of the
number of data blocks stored in the local machine
to the number of data blocks stored in the fog
server. In the same way, the ratio of the number of
data blocks stored in the fog server to the number
of data blocks stored in the cloud server.
Maximal Invalid Ratioisthe maximal
invalid ratio is the ratio of the number of invalid
data to the number of all data blocks when the
upper server can just recover the complete data by
the data blocks stored in them. If there was one
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 316
more invalid data blocks, the upper server can’t
recover the complete data anymore.
In Hash-Solomon code, the Maximal
Invalid Ratio can be expressed as m÷k+m . For
convenience, we just consider two layers situation.
Assuming that there is x MB data which is
prepared to save. After encoding, there will be
﴾k+m)÷m *x data. We prepare to save r% in the
lower server. In order to avoid the upper server
recovers the data, the value of k, m and r must
satisfy the relationship:
m÷﴾k + m﴿≤ ﴾k + m﴿÷k* r
(1)
Through functional transformation, the
relationship between k m and r can be expressed
as formula (2). We can see that if the parameter r
is determined, the parameter k can be expressed
by m. So we can only consider the ratio and the
number of data blocks when we use our scheme.
k =(m − 2mr) +√(2mr − m)2
− 4m2
r2
/2r
(2)
The parameter k is the number of blocks
after data being divided, the parameter m is the
number of redundant data blocks and the
parameter r is the storage ratio of different servers.
Besides, the fog server includes Computational
Intelligence which can help the system with
calculating the results of the values of k and m,
because of the nodes in the fog server having its
own computing power.
V. EFFICIENCY ANALYSIS
In past area, we have talked about the
relationship of k and m. We find that the
proportion of k and m is chosen once the capacity
proportion is chosen. It implies that in the event
that we set the capacity proportion as 20%, k =
3m. At that point we set k = 3, m = 1. In the
genuine situation, information squares can't be put
away halfway. In the above model, the lower
server must store at any rate 2 squares, so the
genuine stockpiling proportion is half, which is a
long way from the 20%. So as to lessen mistake,
we can leave k or m alone an enormous number.
In any case, with the expanding of k, the encoding
and disentangling proficiency will diminish,
which will be demonstrated by tests in the
following area. In this area, we will talk about
how to adjust the capacity effectiveness and the
coding proficiency. Finally, we propose an
exhaustive record of the entire productivity of the
plan.
The storage efficiency is an important
index for a storage related algorithm. A good
system with high storage efficiency can save
storage capacity as much as possible. Storage
Industry Networking Association defines the
storage efficiency as:
StorageEfficiency= DataSpace÷DataSpace +
CheckSpace
In the scheme, storage efficiency can be
expressed as Es =k ÷ k+m . Then we can get the
following formulas (4, 5).We can see that the
storage efficiency will increase with the increment
to the ratio of k and m. When the ratio of k and m
increase, the number of data blocks (k) also
increase, which influences the coding efficiency.
START
SELECTFIL
E
ENCODING
L
O
C
A
L
M
A
C
H
I
N
E
99% DATA
ENCODIG
INFO
1% DATA
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 317
VI. ADVANTAGES AND
DISADVANTAGES OF PROPOSED SYSTEM
The proposed system effectively protects user’s
privacy. The Fog server and local machine is
controlled by user. It is worth noting that Hash-
Solomon code has the following properties: in the
k+m data blocks, if we have at least k data blocks,
we can recover the original data combining with
the encoding matrix. But once the number of data
blocks is less than k, it cannot be recovered. The
Hash transform and encoding improves the
privacy of the user.
Data loss can be occurred in local machine
that includes 1% of data. Accessing of the data
will be difficult from other locations. Encoding
and decoding time is high for large data.
VII. CONCLUSION
The improvement of distributed computing
presents to us a ton of advantages. Distributed
storage is an advantageous innovation which
causes clients to grow their capacity limit.
Notwithstanding, distributed storage likewise
causes a progression of secure issues. When
utilizing distributed storage, clients don't really
control the physical stockpiling of their
information and it brings about the partition of
possession and the board of information. So as to
take care of the issue of security insurance in
distributed storage, we propose a TLS system
dependent on mist registering model and plan a
Hash-Solomon calculation. Through the
hypothetical security examination, the plan is end
up being plausible. By apportioning the
proportion of information squares put away in
various servers sensibly, we can guarantee the
security of information in every server. On
another hand, splitting the encoding framework is
outlandish hypothetically. In addition, utilizing
hash change can secure the fragmentary data.
Through the analysis test, this plan can
productively finish encoding and interpreting
without impact of the distributed storage
effectiveness. Moreover, we plan a sensible
complete effectiveness record, so as to
accomplish the most extreme proficiency, and we
additionally find that the Cauchy grid is
increasingly productive in coding process.
REFERENCES
[1]. P. Mell and T. Grance, “The NIST definition of cloud
computing,” Nat.Inst. Stand. Technol., vol. 53, no. 6, pp. 50–50,
2009.
[2]. H. T. Dinh, C. Lee, D. Niyato, and P. Wang, “A survey of
mobile cloud computing: Architecture, applications, and
approaches,” Wireless Commun. Mobile Comput., vol. 13, no.
18, pp. 1587–1611, 2013.
[3]. J. Chase, R. Kaewpuang, W. Yonggang, and D. Niyato, “Joint
virtual machine and bandwidth allocation in software defined
network (sdn) and cloud computing environments,” in Proc.
IEEE Int. Conf. Commun., 2014,pp. 2969–2974.
[4]. H. Li, W. Sun, F. Li, and B. Wang, “Secure and privacy-
preserving data storage service in public cloud,” J. Comput.
Res. Develop., vol. 51, no. 7,pp. 1397–1409, 2014.
[5]. Y. Li, T.Wang, G.Wang, J. Liang, and H. Chen, “Efficient data
collection in sensor-cloud system with multiple mobile sinks,”
in Proc. Adv. Serv.Comput., 10th Asia-Pac. Serv. Comput.
Conf., 2016, pp. 130–143.
[6]. L. Xiao, Q. Li, and J. Liu, “Survey on secure cloud storage,” J.
Data Acquis. Process., vol. 31, no. 3, pp. 464–472, 2016.
[7]. R. J. McEliece and D. V. Sarwate, “On sharing secrets and reed-
solomon codes,” Commun. ACM, vol. 24, no. 9, pp. 583–584,
1981.

More Related Content

What's hot

Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageIRJET Journal
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Journals
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In CloudTwo Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloudtheijes
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paperLuisa Francisco
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilityPvrtechnologies Nellore
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qcIAESIJEECS
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMijsrd.com
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...eSAT Journals
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...eSAT Publishing House
 
IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNRIRJET Journal
 

What's hot (20)

Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
C017421624
C017421624C017421624
C017421624
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
Two Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In CloudTwo Level Auditing Architecture to Maintain Consistent In Cloud
Two Level Auditing Architecture to Maintain Consistent In Cloud
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
 
El35782786
El35782786El35782786
El35782786
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...Secret keys and the packets transportation for privacy data forwarding method...
Secret keys and the packets transportation for privacy data forwarding method...
 
IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNR
 

Similar to A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational Intelligence in Fog Computing

Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureeSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with siceSAT Publishing House
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesIOSR Journals
 
Science international journal
Science international journalScience international journal
Science international journalSarita30844
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageIRJET Journal
 
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...IRJET Journal
 
S.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage servicesS.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage serviceskalaiselvanresearch
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationIJCERT
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
 

Similar to A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational Intelligence in Fog Computing (20)

Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
I017225966
I017225966I017225966
I017225966
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 
Science international journal
Science international journalScience international journal
Science international journal
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
IRJET- A Novel Approach for Privacy Security in Cloud Storage Plan with Three...
 
S.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage servicesS.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage services
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
 
J0423066069
J0423066069J0423066069
J0423066069
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 

More from IJSRED

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security SystemIJSRED
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityIJSRED
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseIJSRED
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesIJSRED
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by FranceIJSRED
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition SystemIJSRED
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPIJSRED
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. AmaraIJSRED
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsIJSRED
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cartIJSRED
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...IJSRED
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen ManagementIJSRED
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsIJSRED
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionIJSRED
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...IJSRED
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemIJSRED
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistantIJSRED
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaIJSRED
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....IJSRED
 

More from IJSRED (20)

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
 

Recently uploaded

microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational Intelligence in Fog Computing

  • 1. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 312 A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational Intelligence in Fog Computing Lakshmi Prasad1 , Ajeesh S2 ,Smita C Thomas3 1 (P G Scholar, Department of Computer Science and Engineering,Mount Zion College of Engineering, Kadammanitta Email: lakshmiprsd24@gmail.com) 2 (Assistant Professor, Department of CSE, Mount Zion College Of Engineering, Kadammanitta) 3 (Research Scholar, Vels University,Chennai Email: smitabejoy@gmail.com) ----------------------------------------************************---------------------------------- Abstract: Distributed computing and capacity gives clients to store and procedure their information in server farms. At the point when an association chooses to store information in cloud, it loses its entitlement to access to servers facilitating its data. Along these lines there is an opportunity of insider assaults. Existing security insurance systems are typically founded on encryption innovation, yet these sorts of techniques can't viably oppose assault from the cloud. To determine this issue, here proposes a three-layer stockpiling structure which depends on haze registering. The proposed engineering can both exploit distributed storage and secure the protection of information. In addition, Hash-Solomon code calculation is intended to partition information into sections. At that point, we can place a little piece of information in neighborhood machine and haze server so as to ensure the security and other in cloud. Additionally, in light of computational knowledge, this calculation can figure the dissemination extent put away in cloud, haze, and neighborhood machine, separately. By the hypothetical security investigation and trials, the possibility of our plan has been approved, which is actually a successful outcome to existing distributed storage plot. Keywords —Cloud computing, cloud storage, fog computing, privacy protection ----------------------------------------************************---------------------------------- I. INTRODUCTION Cloud is only a gathering of servers and datacenters that are set at better places and these servers and datacenters are liable for giving on request administration to its clients with the assistance of web. The administration gave by cloud is absent on client's PC. Client needs to get to these administrations with assistance of web association through buying in them. The fundamental favorable position of Cloud figuring is that it takes out the requirement for client to be in same area where equipment, programming and extra room is truly present[2]. Cloud makes it RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 313 conceivable to store and access your information from anyplace whenever without agonizing over support. All the administrations are given to the client less expense. Client needs to pay as per the extra room utilized. Distributed computing is a technique for conveying data innovation administrations in which assets are gotten from the Internet through online instruments and applications, rather than an immediate association with a server. It's called distributed computing in light of the fact that the data being gotten to is found in the cloud and doesn't require a client to be in a particular spot to access it. Distributed computing is turning out to be increasingly famous. It is utilized in numerous zones. So as to pull in most extreme clients, it needs to offer great quality types of assistance which ought to be secure and solid. Security turns into a major issue when any one stores its data to a stage which isn't straightforwardly constrained by client. The utilization of cloud is straightforward, so everybody is moving information and application programming to cloud server farms. The Cloud Service Provider (CSP) ought to give security, uprightness, accessibility and privacy. In any case, CSP isn't giving. proper information administrations to client and put away information. The issues identified with distributed storage are information robbery, inaccessibility of information and information breaks. An information break happens when a programmer takes, uses, or discharges delicate data. Information is put away in the cloud shared by a huge number. The information is portable, that it very well may be moved starting with one area then onto the next. The cloud clients may not know about the information area. The private data is put away from the proprietor, it expands its powerlessness. The protection of cloud can't be ensured. A noxious insider is a current or previous representative, contractual worker, or accomplice who has the privilege to get to organization information, and takes or harms the information. Protection depends on secure procedures, for example, solid access control, consistent checking forms and examines activities that lie beyond adequate capacities. Conventional secure distributed storage answers for the above issues are normally concentrating on limitations to access or encryption of the information. These strategies can resolve a large portion of the issues. Be that as it may, the entirety of the arrangements can't tackle the assaults well, despite the fact that the calculation improves. Hence, here proposes a TLS conspire which depends on haze figuring model and structure a Hash-Solomon code dependent on Reed-Solomon code. Haze figuring is an all- inclusive processing model dependent on distributed computing which is made out of a great deal of hubs. These hubs have a specific stockpiling limit and preparing capacity. In this plan, split client's information into three sections and each part is spared in the cloud server, the mist server and the client's neighborhood machine. Additionally, contingent upon the property of the Hash-Solomon code, the plan can guarantee the first information can't be recouped by halfway information. Utilizing Hash- Solomon code will deliver a piece of excess information squares which will be utilized in translating. Expanding the quantity of excess squares can build the unwavering quality of the capacity, however it likewise brings about extra information stockpiling. By fitting designation of the information, our plan can truly ensure the security of client's information. The Hash-
  • 3. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 314 Solomon code needs complex estimation, which is done dependent on computational knowledge. II. LITERATURE SURVEY The significance part of security in distributed storage has pulled in a great deal of consideration regardless of for a solitary client or industry. There are a ton of explores about secure distributed storage models as of late. To understand the security issue in distributed computing, paper [1] proposed a protection saving and duplicate discouragement CBIR conspire utilizing encryption and watermarking strategies. This plan can secure the picture substance and picture highlights from the semi-legit cloud server, and deflect the picture client from illicitly appropriating the recovered pictures. Shen et al. think cloud is semi-trusted and propose a system for urban information sharing by misusing the quality based cryptography. The plan they proposed is make sure about and can oppose potential assaults [2]. Fu et al. propose a substance mindful inquiry plot, which can make semantic hunt more brilliant. The tests results show that their plan is productive [3]. In paper [4], Hou, Pu and Fan think about that in customary circumstance, client's information is put away through CSP, regardless of whether CSP is dependable, aggressors can even now get client's information on the off chance that they control the distributed storage the executives hub. To maintain a strategic distance from this issue, they propose an encoded file structure dependent on a deviated challenge-reaction validation instrument. At the point when client demands information from cloud server, the client sends a secret key to the server for recognizable proof. Thinking about it that the secret key might be captured, the structure utilizes unbalanced reaction mode. Hou, Wu, Zhen and Yang call attention to that the safe center of distributed storage is security and protection in conveyed framework. So they propose a safe virtual insurance plot dependent on SSL and Daoli in paper [5], [6]. By moving information over SSL and conveying Daoli on the cloud server, the framework encodes information before it is composed into the hard plate. In paper [7], Feng brings up that in paper [5], the weight of server will increment and information may spill during transmission in cloud servers. Feng proposes a more concise scheme: encrypting data in closed cloud environment. Besides, it can achieve multi-point secure storage with one time encrypting. However, these encryption make search in cloud more difficult. Currently, searchable encryption is a hot topic in the field of cloud computing. Paper [8]–[10] give different solutions to this problem. Each of them achieves high accuracy, security and efficient. III. EXISTING SYSTEM In the existing model there is an authentication process for each user. The whole data is encrypted before storing to the cloud. Authentication User saves the data using username and password. By this unauthorized users cannot access the data. This has less security that the username and password can be hacked. Encryption In cryptography, encryption is the method by which plaintext or any other type of data is converted from a readable form to an encoded version that can be decoded using the key. It is one of the most important methods for providing security. The encryption process helps securing data even from providers.In the existing system XOR mechanism is used for encryption. This mechanism is very easy to hack because the length of the plain text and key size is same. So it is easy to find the key. Thus the encryption becomes useless. IV. SECURE STORAGE USING FOG COMPUTING
  • 4. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 315 So as to ensure client's security, we propose a TLS system dependent on haze registering model. The TSL system can give client a specific intensity of the executives and successfully ensure client's protection. As referenced, the inside assault is hard to stand up to. Conventional methodologies function admirably in understanding outside assault, however when CSP itself has issues, customary ways are for the most part invalid. Not quite the same as the conventional methodologies, in our plan, client's information is isolated into three distinctive size parts with encoding innovation. Every one of them will come up short on a piece of key data for secrecy. Consolidating with the mist processing model, the three pieces of information will be put away in the cloud server, the mist server and client's nearby machine as indicated by the request from huge to little. By this method, the attacker cannot recover the user’s original data even if he gets all the data from a certain server. As for the CSP, they also cannot get any useful information without the data stored in the fog server and local machine because both of the fog server and local machine are controlled by users. As appeared in Figure the TLS structure utilizes mist server's stockpiling and information handling capacity. The engineering incorporates three layers, the cloud server, the haze server and the nearby machine. Every server spares a specific piece of information, the capacity extent is dictated by clients' distribution procedure. Right off the bat, client's information will be encoded on client's neighborhood machine. At that point, for instance, let 1%encoded information be put away in the machine. At that point transfer the rest of information to the mist server. Also, on the haze server, we do comparable activities to the information which originates from client's machine. There will be about 4% information put away in the mist server and afterward transfer the rest of to the cloud server. The above tasks depend on Hash-Solomon code. Hash-Solomon code is a sort of coding strategies dependent on Reed-Solomon code. In the wake of being encoded by Hash-Solomon code, the information will be separated into k parts and creates m repetitive information. Hash-Solomon code has such property, in these k+m parts of information, in the event that somebody has at any rate k parts, he can recoup the total information. In other word, it's not possible for anyone to recoup the total information with not as much as k parts of information. As indicated by this property of Hash-Solomon code, in our plan, we let close to k-1 pieces of information be put away in higher server which has bigger capacity limit and left the rest of put away in the lower server. Along these lines, the stealer can't recuperate the total information regardless of whether one of the three layers' information was taken. Accordingly we can guarantee the security of client's information. Invalid Ratioisthe ratio of the number of failure data blocks to the number of data blocks which will be used in encoding. In other words, the ratio of the number of data blocks stored in lower server to the number of data blocks stored in the upper server. For example, the ratio of the number of data blocks stored in the local machine to the number of data blocks stored in the fog server. In the same way, the ratio of the number of data blocks stored in the fog server to the number of data blocks stored in the cloud server. Maximal Invalid Ratioisthe maximal invalid ratio is the ratio of the number of invalid data to the number of all data blocks when the upper server can just recover the complete data by the data blocks stored in them. If there was one
  • 5. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 316 more invalid data blocks, the upper server can’t recover the complete data anymore. In Hash-Solomon code, the Maximal Invalid Ratio can be expressed as m÷k+m . For convenience, we just consider two layers situation. Assuming that there is x MB data which is prepared to save. After encoding, there will be ﴾k+m)÷m *x data. We prepare to save r% in the lower server. In order to avoid the upper server recovers the data, the value of k, m and r must satisfy the relationship: m÷﴾k + m﴿≤ ﴾k + m﴿÷k* r (1) Through functional transformation, the relationship between k m and r can be expressed as formula (2). We can see that if the parameter r is determined, the parameter k can be expressed by m. So we can only consider the ratio and the number of data blocks when we use our scheme. k =(m − 2mr) +√(2mr − m)2 − 4m2 r2 /2r (2) The parameter k is the number of blocks after data being divided, the parameter m is the number of redundant data blocks and the parameter r is the storage ratio of different servers. Besides, the fog server includes Computational Intelligence which can help the system with calculating the results of the values of k and m, because of the nodes in the fog server having its own computing power. V. EFFICIENCY ANALYSIS In past area, we have talked about the relationship of k and m. We find that the proportion of k and m is chosen once the capacity proportion is chosen. It implies that in the event that we set the capacity proportion as 20%, k = 3m. At that point we set k = 3, m = 1. In the genuine situation, information squares can't be put away halfway. In the above model, the lower server must store at any rate 2 squares, so the genuine stockpiling proportion is half, which is a long way from the 20%. So as to lessen mistake, we can leave k or m alone an enormous number. In any case, with the expanding of k, the encoding and disentangling proficiency will diminish, which will be demonstrated by tests in the following area. In this area, we will talk about how to adjust the capacity effectiveness and the coding proficiency. Finally, we propose an exhaustive record of the entire productivity of the plan. The storage efficiency is an important index for a storage related algorithm. A good system with high storage efficiency can save storage capacity as much as possible. Storage Industry Networking Association defines the storage efficiency as: StorageEfficiency= DataSpace÷DataSpace + CheckSpace In the scheme, storage efficiency can be expressed as Es =k ÷ k+m . Then we can get the following formulas (4, 5).We can see that the storage efficiency will increase with the increment to the ratio of k and m. When the ratio of k and m increase, the number of data blocks (k) also increase, which influences the coding efficiency. START SELECTFIL E ENCODING L O C A L M A C H I N E 99% DATA ENCODIG INFO 1% DATA
  • 6. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 317 VI. ADVANTAGES AND DISADVANTAGES OF PROPOSED SYSTEM The proposed system effectively protects user’s privacy. The Fog server and local machine is controlled by user. It is worth noting that Hash- Solomon code has the following properties: in the k+m data blocks, if we have at least k data blocks, we can recover the original data combining with the encoding matrix. But once the number of data blocks is less than k, it cannot be recovered. The Hash transform and encoding improves the privacy of the user. Data loss can be occurred in local machine that includes 1% of data. Accessing of the data will be difficult from other locations. Encoding and decoding time is high for large data. VII. CONCLUSION The improvement of distributed computing presents to us a ton of advantages. Distributed storage is an advantageous innovation which causes clients to grow their capacity limit. Notwithstanding, distributed storage likewise causes a progression of secure issues. When utilizing distributed storage, clients don't really control the physical stockpiling of their information and it brings about the partition of possession and the board of information. So as to take care of the issue of security insurance in distributed storage, we propose a TLS system dependent on mist registering model and plan a Hash-Solomon calculation. Through the hypothetical security examination, the plan is end up being plausible. By apportioning the proportion of information squares put away in various servers sensibly, we can guarantee the security of information in every server. On another hand, splitting the encoding framework is outlandish hypothetically. In addition, utilizing hash change can secure the fragmentary data. Through the analysis test, this plan can productively finish encoding and interpreting without impact of the distributed storage effectiveness. Moreover, we plan a sensible complete effectiveness record, so as to accomplish the most extreme proficiency, and we additionally find that the Cauchy grid is increasingly productive in coding process. REFERENCES [1]. P. Mell and T. Grance, “The NIST definition of cloud computing,” Nat.Inst. Stand. Technol., vol. 53, no. 6, pp. 50–50, 2009. [2]. H. T. Dinh, C. Lee, D. Niyato, and P. Wang, “A survey of mobile cloud computing: Architecture, applications, and approaches,” Wireless Commun. Mobile Comput., vol. 13, no. 18, pp. 1587–1611, 2013. [3]. J. Chase, R. Kaewpuang, W. Yonggang, and D. Niyato, “Joint virtual machine and bandwidth allocation in software defined network (sdn) and cloud computing environments,” in Proc. IEEE Int. Conf. Commun., 2014,pp. 2969–2974. [4]. H. Li, W. Sun, F. Li, and B. Wang, “Secure and privacy- preserving data storage service in public cloud,” J. Comput. Res. Develop., vol. 51, no. 7,pp. 1397–1409, 2014. [5]. Y. Li, T.Wang, G.Wang, J. Liang, and H. Chen, “Efficient data collection in sensor-cloud system with multiple mobile sinks,” in Proc. Adv. Serv.Comput., 10th Asia-Pac. Serv. Comput. Conf., 2016, pp. 130–143. [6]. L. Xiao, Q. Li, and J. Liu, “Survey on secure cloud storage,” J. Data Acquis. Process., vol. 31, no. 3, pp. 464–472, 2016. [7]. R. J. McEliece and D. V. Sarwate, “On sharing secrets and reed- solomon codes,” Commun. ACM, vol. 24, no. 9, pp. 583–584, 1981.