SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1998
ANONYMOUS DATA SHARING IN CLOUD USING PACK ALGORITHM
Suresh Fakira Chaudhari1, Pramod Gosavi2
1Student, Dept of Comp. Engg, GCOE,Jalgaon, Maharashtra,India
2H.O.D,Dept Comp.Engg, GCOE,Jalgaon, Maharashtra,India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The paper focuses on implementing the system
which will make data transmission server more secure. The
author aims to implement system which will also reduce
redundancy in data transmission. This means the frequently
requested data from the server will be identifiedandserved by
the middleware instead of the server itself. This means server
will be offloaded from this redundant task and will only
respond to the unique queries. This project provides traffic
redundancy solution which helps to eliminate redundant
traffic from the network. In more technical words it is also
called as the predictive acknowledgement for reducing traffic
in the system. The algorithm implemented in thisprojecthelps
server to separate unique and redundant request for the data
.It helps to reduce cost for the cloud servers thussystemshould
be integrated in the cloud based systems.
Key Words: traffic - redundancy, chunk, predictive
acknowledgement, cloud.
1. INTRODUCTION
In this era of information data is the real asset of any
institution. We come to know that the data privacy is real
concern now days. Keeping this in mind this system is built
in such a way that the sender will be kept hidden from the
receiver. The server won't be traced by the receiver because
the data from server will not bedirectlycommunicatingwith
the receiver [1]. The sender will push data to the
middleware's virtual queue. Receiver will pull the data from
this virtual queue. In simple words this is sharing the data
while maintaining anonymity. Even if intruder tries to trace
[2] the sender he will be only hitting on the middleware's
virtual location which will do no harm to our server.
Let me introduce you to the next feature of theproject which
is eliminating redundancy from the network. The process of
redundancy implies implementinga artificial decisionmaker
which will think about whether this request is unique or
redundant and will push the data accordingly to the server.
Recently the all the web based applications are being
deployed to the cloud platform for performance and scaling
benefits. But the service providers which provide service
using cloud infrastructure have to pay the huge bills for the
data consumption done by users. So to reduce the cost of
providing the service we analysed the traffic of public
network and learned the following facts
In the public network wherepeopleusewifi/public internet
it certainly degrades the performancewhenpeopleusemore
data intensive applications like video streaming or email
application. The network congestion[10] occurs due to
frequently watching same videos on the internet or
frequently downloading same attachment from the mail
servers like Gmail, yahoo etc.
Current infrastructures don't identify redundant and non
redundant data request so it does not bother to partially or
fully cache such data to client side to improve performance.
2. IMPLEMENTATION
This project blends the two features in the environment
secure data sharing and reducing the traffic redundancy.Let
us discuss how we can maintain anonymity well in general
scenarios the server communicates with client and serves
the data asked by the user. We have introduced the middle
layer between client and server. This middleware will
communicate with both client as well as receiver. This is
done by implementing the java messaging system (JMS) it
includes components publisher subscriber and queue.
2.1. Publisher:
Here middleware [13] system acts as the publisher it will be
programmed[5] to work in sync with the server. Whenever
server sends some data the publisher will listen for the
incoming data capture it and put it across the queue.
2.2. Receiver:
The receiver will be provided with logical connection
endpoint by the JMS provider. Receiver actively listens for
the data asynchronously. As soonasthenewdata isavailable
in the system it takes off the data.
2.3. JMS Infrastructure:
Create the logical destination and make it accessible to both
client and the server.
Make sure the connection is durable and available all the
time. Connection should be persistent.
2.4. TRE implementation using PACK
How to implement prediction[3] based cloud bandwidth
reduction system for the cloud infrastructure. Before this
systems used to communicate with the huge exchange of
SYN-ACK packets.Insteadwewill useselectiveSYN-ACK[12].
When transmitting the data packets these packets will be
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1999
grouped into chunks [8] and stored in the sender buffer and
then sent to the client. These chunks will have the chunk
begin and end markers.
2.5. Algorithm
2.5.1. For sender:
1. Calculate the data size.
2. Pass data to chunkgenerator module.
3. Chunkgenerator will generateN chunkswitheach
chunk having START and END.
4.for i=0 to n step 1
5.sendChunk(chunkStore.get(i));
6.Send chunksequence and SYN.
6.END
2.5.2. For Receiver:
1.Receiver chunks
2.For i=0 to n{
3.ReceiveChunk()
4.Inspect chunk START and END.
5.Take off the payload of packets.
6.while not MSG_END
7.repeat step2 to step6.
8.if MSG_END}
9.END.
3. EVALUATION
Proposed algorithm harness the combination if both the
algorithms it uses pack along with anonymous data sharing.
3.1. Sender Dominated system: In this system the
sender will play the role of computation of
chunking the data and delivering the user.
Checking whether the data request was unique or
computational task.
role of accountant they took off the computational
task. Provided that the system which acts as
receiver should be with enough computational
power.
Fig 1: Comparison of old and new system
3.3. Synchronization between sender and
receiver
When the synchronization between the two
participating entities exists it eliminates the need of the
three-way handshake. It eliminates unnecessary
overhead of verifying the sender and receiver’s identity
[9].
4. Conclusion
We learned that how redundant traffic may slow down your
network. Thus eliminating this traffic would improve
network performance a lot.. SoPACKcaneliminatethetraffic
based on the type of content being sent by the sender. Cloud
based solution can integrate end to end TRE [9] solutions to
eliminate redundant traffic.
ACKNOWLEDGEMENT
Author would like to thank his mentors Mr. Pramod Gosavi
Sir and Mr. Gaikwad sir for their valuable suggestions.
Because of their guidelines this project served the purpose
and achieved the best results.
REFERENCES
[1] Sarbanes–OxleyActof2002, Title 29, Code of Federal
Regulations,Part1980,2003.
[2] White Paper—The Essential Guide to Web Analytics
Vendor
Selection,IBM[Online].Available:http://measure.corem
etrics.com/corem/get-form/reg/wp-evaluation-guide
[3] A. Shamir, “How to share a secret,” Commun. ACM,
vol.22, no.11,pp.612–613,1979.
[4] A. Friedman, R. Wolff, and A. Schuster, “Providing k-
anonymity in data mining, ”VLDB
Journal,vol.17,no.4,pp.789–804,Jul.2008.
3.2. Receiver Dominated System: The receiver play
not. This makes server occupied with
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2000
[5] F.Baiardi,A.Falleni,R.Granchi,F.Martinelli,M.Petrocchi,a
ndA.Vaccarelli,“Seas,a secure e-voting protocol :Design
and implementa-
tion,”Comput.Security,vol.24,no.8,pp.642–
652,Nov.2005.
[6] D. Chaum ,“Untraceable electronic mail, returnaddress
and digital
pseudonyms,”Commun.ACM,vol.24,no.2,pp.84–
88,Feb.1981.
[7] Q.XieandU.Hengartner, “Privacy-preserving match
making formo-bile social networking secure against
malicious users,”inProc.9thAnn.IEEEConf.Privacy,
Security and Trust, Jul. 2011,pp. 252–259
[8] R.Williams,“ Method for partitioning a block of data in
to sub blocks and for storing and communicating such
sub blocks, ”US Patent 5990810,Nov.1999.
[9] Juniper Networks, Sunny vale, CA ,USA, “Application
acceleration,” 1996[Online].
Available:http://www.juniper.net/us/en/products-
services/application-acceleration/
[10] Blue Coat Systems, Sunnyvale,CA,USA,“MACH5,”1996
[Online]. Available:
http://www.bluecoat.com/products/mach5
[11] Expand Networks, Riverbed Technology,SanFrancisco,
CA, USA, “Application acceleration and WAN
optimization,”1998 [Online].
Available:http://www.expand.com/technology/applica
tion-acceleration.aspx
[12] F5, Seattle, WA, USA, “WAN
optimization,”1996[Online].Available:
http://www.f5.com/solutions/acceleration/wan-
optimization/
[13] A. Flint , “The next work place revolution, ”Nov.2012
[Online]. Available:
http://m.theatlanticcities.com/jobs-and
economy/2012/11/nextwork place-revolution/3904/
BIOGRAPHIES
Mr. Suresh Chaudhari
Currently pursuing M.E in
Computer Engineering,
GCOE, Jalgaon
Mr.Pramod Gosavi
Head of Department
(Computer Engineering),
GCOE Jalgaon

More Related Content

What's hot

DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENT
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENTDYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENT
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENTIJCNCJournal
 
A Clustering Method for Wireless Sensors Networks
A Clustering Method for Wireless Sensors NetworksA Clustering Method for Wireless Sensors Networks
A Clustering Method for Wireless Sensors NetworksIRJET Journal
 
A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time IJECEIAES
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...IJCNCJournal
 
Dynamic Cloud Partitioning and Load Balancing in Cloud
Dynamic Cloud Partitioning and Load Balancing in Cloud Dynamic Cloud Partitioning and Load Balancing in Cloud
Dynamic Cloud Partitioning and Load Balancing in Cloud Shyam Hajare
 
An Efficient Cloud based Approach for Service Crawling
An Efficient Cloud based Approach for Service CrawlingAn Efficient Cloud based Approach for Service Crawling
An Efficient Cloud based Approach for Service CrawlingIDES Editor
 
Intelligent Placement of Datacenter for Internet Services
Intelligent Placement of Datacenter for Internet Services Intelligent Placement of Datacenter for Internet Services
Intelligent Placement of Datacenter for Internet Services Arinto Murdopo
 
Ieeepro techno solutions ieee java project -scalable distributed service int...
Ieeepro techno solutions  ieee java project -scalable distributed service int...Ieeepro techno solutions  ieee java project -scalable distributed service int...
Ieeepro techno solutions ieee java project -scalable distributed service int...hemanthbbc
 
A Review on Scheduling in Cloud Computing
A Review on Scheduling in Cloud ComputingA Review on Scheduling in Cloud Computing
A Review on Scheduling in Cloud Computingijujournal
 
Application of selective algorithm for effective resource provisioning in clo...
Application of selective algorithm for effective resource provisioning in clo...Application of selective algorithm for effective resource provisioning in clo...
Application of selective algorithm for effective resource provisioning in clo...ijccsa
 
IRJET - Efficient Load Balancing in a Distributed Environment
IRJET -  	  Efficient Load Balancing in a Distributed EnvironmentIRJET -  	  Efficient Load Balancing in a Distributed Environment
IRJET - Efficient Load Balancing in a Distributed EnvironmentIRJET Journal
 
Comparative study of Different Time synchronization Techniques in WSN
Comparative study of Different Time synchronization Techniques in WSNComparative study of Different Time synchronization Techniques in WSN
Comparative study of Different Time synchronization Techniques in WSNIRJET Journal
 
Web Service QoS Prediction Approach in Mobile Internet Environments
Web Service QoS Prediction Approach in Mobile Internet EnvironmentsWeb Service QoS Prediction Approach in Mobile Internet Environments
Web Service QoS Prediction Approach in Mobile Internet Environmentsjins0618
 
Improved Max-Min Scheduling Algorithm
Improved Max-Min Scheduling AlgorithmImproved Max-Min Scheduling Algorithm
Improved Max-Min Scheduling Algorithmiosrjce
 
Review on Green Networking Solutions
Review on Green Networking SolutionsReview on Green Networking Solutions
Review on Green Networking Solutionsiosrjce
 
INSTANCE BASED MULTI CRITERIA DECISION MODEL FOR CLOUD SERVICE SELECTION USI...
 INSTANCE BASED MULTI CRITERIA DECISION MODEL FOR CLOUD SERVICE SELECTION USI... INSTANCE BASED MULTI CRITERIA DECISION MODEL FOR CLOUD SERVICE SELECTION USI...
INSTANCE BASED MULTI CRITERIA DECISION MODEL FOR CLOUD SERVICE SELECTION USI...IAEME Publication
 

What's hot (20)

DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENT
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENTDYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENT
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENT
 
20120140504025
2012014050402520120140504025
20120140504025
 
A Clustering Method for Wireless Sensors Networks
A Clustering Method for Wireless Sensors NetworksA Clustering Method for Wireless Sensors Networks
A Clustering Method for Wireless Sensors Networks
 
A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time A Prolific Scheme for Load Balancing Relying on Task Completion Time
A Prolific Scheme for Load Balancing Relying on Task Completion Time
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
 
Dynamic Cloud Partitioning and Load Balancing in Cloud
Dynamic Cloud Partitioning and Load Balancing in Cloud Dynamic Cloud Partitioning and Load Balancing in Cloud
Dynamic Cloud Partitioning and Load Balancing in Cloud
 
An Efficient Cloud based Approach for Service Crawling
An Efficient Cloud based Approach for Service CrawlingAn Efficient Cloud based Approach for Service Crawling
An Efficient Cloud based Approach for Service Crawling
 
Cloud Computing and PSo
Cloud Computing and PSoCloud Computing and PSo
Cloud Computing and PSo
 
Intelligent Placement of Datacenter for Internet Services
Intelligent Placement of Datacenter for Internet Services Intelligent Placement of Datacenter for Internet Services
Intelligent Placement of Datacenter for Internet Services
 
Ieeepro techno solutions ieee java project -scalable distributed service int...
Ieeepro techno solutions  ieee java project -scalable distributed service int...Ieeepro techno solutions  ieee java project -scalable distributed service int...
Ieeepro techno solutions ieee java project -scalable distributed service int...
 
A Review on Scheduling in Cloud Computing
A Review on Scheduling in Cloud ComputingA Review on Scheduling in Cloud Computing
A Review on Scheduling in Cloud Computing
 
Application of selective algorithm for effective resource provisioning in clo...
Application of selective algorithm for effective resource provisioning in clo...Application of selective algorithm for effective resource provisioning in clo...
Application of selective algorithm for effective resource provisioning in clo...
 
IRJET - Efficient Load Balancing in a Distributed Environment
IRJET -  	  Efficient Load Balancing in a Distributed EnvironmentIRJET -  	  Efficient Load Balancing in a Distributed Environment
IRJET - Efficient Load Balancing in a Distributed Environment
 
G216063
G216063G216063
G216063
 
Comparative study of Different Time synchronization Techniques in WSN
Comparative study of Different Time synchronization Techniques in WSNComparative study of Different Time synchronization Techniques in WSN
Comparative study of Different Time synchronization Techniques in WSN
 
Web Service QoS Prediction Approach in Mobile Internet Environments
Web Service QoS Prediction Approach in Mobile Internet EnvironmentsWeb Service QoS Prediction Approach in Mobile Internet Environments
Web Service QoS Prediction Approach in Mobile Internet Environments
 
06425531
0642553106425531
06425531
 
Improved Max-Min Scheduling Algorithm
Improved Max-Min Scheduling AlgorithmImproved Max-Min Scheduling Algorithm
Improved Max-Min Scheduling Algorithm
 
Review on Green Networking Solutions
Review on Green Networking SolutionsReview on Green Networking Solutions
Review on Green Networking Solutions
 
INSTANCE BASED MULTI CRITERIA DECISION MODEL FOR CLOUD SERVICE SELECTION USI...
 INSTANCE BASED MULTI CRITERIA DECISION MODEL FOR CLOUD SERVICE SELECTION USI... INSTANCE BASED MULTI CRITERIA DECISION MODEL FOR CLOUD SERVICE SELECTION USI...
INSTANCE BASED MULTI CRITERIA DECISION MODEL FOR CLOUD SERVICE SELECTION USI...
 

Similar to Anonymous Data Sharing in Cloud using Pack Algorithm

Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...IRJET Journal
 
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmCloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmIRJET Journal
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET Journal
 
LOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTINGLOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTINGIRJET Journal
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...IRJET Journal
 
An Enhanced Throttled Load Balancing Approach for Cloud Environment
An Enhanced Throttled Load Balancing Approach for Cloud EnvironmentAn Enhanced Throttled Load Balancing Approach for Cloud Environment
An Enhanced Throttled Load Balancing Approach for Cloud EnvironmentIRJET Journal
 
IRJET- Efficient Data Access Control for Multi-authority Cloud Storage
IRJET-  	  Efficient Data Access Control for Multi-authority Cloud StorageIRJET-  	  Efficient Data Access Control for Multi-authority Cloud Storage
IRJET- Efficient Data Access Control for Multi-authority Cloud StorageIRJET Journal
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET Journal
 
Energy-Efficient Task Scheduling in Cloud Environment
Energy-Efficient Task Scheduling in Cloud EnvironmentEnergy-Efficient Task Scheduling in Cloud Environment
Energy-Efficient Task Scheduling in Cloud EnvironmentIRJET Journal
 
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...IRJET Journal
 
Review and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud ComputingReview and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud ComputingIRJET Journal
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingIRJET Journal
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONIRJET Journal
 
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET Journal
 
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...IRJET Journal
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET Journal
 
IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...
IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...
IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...IRJET Journal
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAIRJET Journal
 

Similar to Anonymous Data Sharing in Cloud using Pack Algorithm (20)

Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
Increasing Energy Productivity in Multiple Access Channel by Utilizing Packet...
 
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmCloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
 
LOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTINGLOAD BALANCING IN CLOUD COMPUTING
LOAD BALANCING IN CLOUD COMPUTING
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
 
An Enhanced Throttled Load Balancing Approach for Cloud Environment
An Enhanced Throttled Load Balancing Approach for Cloud EnvironmentAn Enhanced Throttled Load Balancing Approach for Cloud Environment
An Enhanced Throttled Load Balancing Approach for Cloud Environment
 
IRJET- Efficient Data Access Control for Multi-authority Cloud Storage
IRJET-  	  Efficient Data Access Control for Multi-authority Cloud StorageIRJET-  	  Efficient Data Access Control for Multi-authority Cloud Storage
IRJET- Efficient Data Access Control for Multi-authority Cloud Storage
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
Energy-Efficient Task Scheduling in Cloud Environment
Energy-Efficient Task Scheduling in Cloud EnvironmentEnergy-Efficient Task Scheduling in Cloud Environment
Energy-Efficient Task Scheduling in Cloud Environment
 
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
 
Review and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud ComputingReview and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud Computing
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
 
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
IRJET- An Adaptive Scheduling based VM with Random Key Authentication on Clou...
 
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...Development of Effective Audit Service to Maintain Integrity of Migrated Data...
Development of Effective Audit Service to Maintain Integrity of Migrated Data...
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
 
IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...
IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...
IRJET- In Cloud Computing Resource Allotment by using Resource Provisioning A...
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

Anonymous Data Sharing in Cloud using Pack Algorithm

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1998 ANONYMOUS DATA SHARING IN CLOUD USING PACK ALGORITHM Suresh Fakira Chaudhari1, Pramod Gosavi2 1Student, Dept of Comp. Engg, GCOE,Jalgaon, Maharashtra,India 2H.O.D,Dept Comp.Engg, GCOE,Jalgaon, Maharashtra,India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The paper focuses on implementing the system which will make data transmission server more secure. The author aims to implement system which will also reduce redundancy in data transmission. This means the frequently requested data from the server will be identifiedandserved by the middleware instead of the server itself. This means server will be offloaded from this redundant task and will only respond to the unique queries. This project provides traffic redundancy solution which helps to eliminate redundant traffic from the network. In more technical words it is also called as the predictive acknowledgement for reducing traffic in the system. The algorithm implemented in thisprojecthelps server to separate unique and redundant request for the data .It helps to reduce cost for the cloud servers thussystemshould be integrated in the cloud based systems. Key Words: traffic - redundancy, chunk, predictive acknowledgement, cloud. 1. INTRODUCTION In this era of information data is the real asset of any institution. We come to know that the data privacy is real concern now days. Keeping this in mind this system is built in such a way that the sender will be kept hidden from the receiver. The server won't be traced by the receiver because the data from server will not bedirectlycommunicatingwith the receiver [1]. The sender will push data to the middleware's virtual queue. Receiver will pull the data from this virtual queue. In simple words this is sharing the data while maintaining anonymity. Even if intruder tries to trace [2] the sender he will be only hitting on the middleware's virtual location which will do no harm to our server. Let me introduce you to the next feature of theproject which is eliminating redundancy from the network. The process of redundancy implies implementinga artificial decisionmaker which will think about whether this request is unique or redundant and will push the data accordingly to the server. Recently the all the web based applications are being deployed to the cloud platform for performance and scaling benefits. But the service providers which provide service using cloud infrastructure have to pay the huge bills for the data consumption done by users. So to reduce the cost of providing the service we analysed the traffic of public network and learned the following facts In the public network wherepeopleusewifi/public internet it certainly degrades the performancewhenpeopleusemore data intensive applications like video streaming or email application. The network congestion[10] occurs due to frequently watching same videos on the internet or frequently downloading same attachment from the mail servers like Gmail, yahoo etc. Current infrastructures don't identify redundant and non redundant data request so it does not bother to partially or fully cache such data to client side to improve performance. 2. IMPLEMENTATION This project blends the two features in the environment secure data sharing and reducing the traffic redundancy.Let us discuss how we can maintain anonymity well in general scenarios the server communicates with client and serves the data asked by the user. We have introduced the middle layer between client and server. This middleware will communicate with both client as well as receiver. This is done by implementing the java messaging system (JMS) it includes components publisher subscriber and queue. 2.1. Publisher: Here middleware [13] system acts as the publisher it will be programmed[5] to work in sync with the server. Whenever server sends some data the publisher will listen for the incoming data capture it and put it across the queue. 2.2. Receiver: The receiver will be provided with logical connection endpoint by the JMS provider. Receiver actively listens for the data asynchronously. As soonasthenewdata isavailable in the system it takes off the data. 2.3. JMS Infrastructure: Create the logical destination and make it accessible to both client and the server. Make sure the connection is durable and available all the time. Connection should be persistent. 2.4. TRE implementation using PACK How to implement prediction[3] based cloud bandwidth reduction system for the cloud infrastructure. Before this systems used to communicate with the huge exchange of SYN-ACK packets.Insteadwewill useselectiveSYN-ACK[12]. When transmitting the data packets these packets will be
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1999 grouped into chunks [8] and stored in the sender buffer and then sent to the client. These chunks will have the chunk begin and end markers. 2.5. Algorithm 2.5.1. For sender: 1. Calculate the data size. 2. Pass data to chunkgenerator module. 3. Chunkgenerator will generateN chunkswitheach chunk having START and END. 4.for i=0 to n step 1 5.sendChunk(chunkStore.get(i)); 6.Send chunksequence and SYN. 6.END 2.5.2. For Receiver: 1.Receiver chunks 2.For i=0 to n{ 3.ReceiveChunk() 4.Inspect chunk START and END. 5.Take off the payload of packets. 6.while not MSG_END 7.repeat step2 to step6. 8.if MSG_END} 9.END. 3. EVALUATION Proposed algorithm harness the combination if both the algorithms it uses pack along with anonymous data sharing. 3.1. Sender Dominated system: In this system the sender will play the role of computation of chunking the data and delivering the user. Checking whether the data request was unique or computational task. role of accountant they took off the computational task. Provided that the system which acts as receiver should be with enough computational power. Fig 1: Comparison of old and new system 3.3. Synchronization between sender and receiver When the synchronization between the two participating entities exists it eliminates the need of the three-way handshake. It eliminates unnecessary overhead of verifying the sender and receiver’s identity [9]. 4. Conclusion We learned that how redundant traffic may slow down your network. Thus eliminating this traffic would improve network performance a lot.. SoPACKcaneliminatethetraffic based on the type of content being sent by the sender. Cloud based solution can integrate end to end TRE [9] solutions to eliminate redundant traffic. ACKNOWLEDGEMENT Author would like to thank his mentors Mr. Pramod Gosavi Sir and Mr. Gaikwad sir for their valuable suggestions. Because of their guidelines this project served the purpose and achieved the best results. REFERENCES [1] Sarbanes–OxleyActof2002, Title 29, Code of Federal Regulations,Part1980,2003. [2] White Paper—The Essential Guide to Web Analytics Vendor Selection,IBM[Online].Available:http://measure.corem etrics.com/corem/get-form/reg/wp-evaluation-guide [3] A. Shamir, “How to share a secret,” Commun. ACM, vol.22, no.11,pp.612–613,1979. [4] A. Friedman, R. Wolff, and A. Schuster, “Providing k- anonymity in data mining, ”VLDB Journal,vol.17,no.4,pp.789–804,Jul.2008. 3.2. Receiver Dominated System: The receiver play not. This makes server occupied with
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 08 | Aug -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2000 [5] F.Baiardi,A.Falleni,R.Granchi,F.Martinelli,M.Petrocchi,a ndA.Vaccarelli,“Seas,a secure e-voting protocol :Design and implementa- tion,”Comput.Security,vol.24,no.8,pp.642– 652,Nov.2005. [6] D. Chaum ,“Untraceable electronic mail, returnaddress and digital pseudonyms,”Commun.ACM,vol.24,no.2,pp.84– 88,Feb.1981. [7] Q.XieandU.Hengartner, “Privacy-preserving match making formo-bile social networking secure against malicious users,”inProc.9thAnn.IEEEConf.Privacy, Security and Trust, Jul. 2011,pp. 252–259 [8] R.Williams,“ Method for partitioning a block of data in to sub blocks and for storing and communicating such sub blocks, ”US Patent 5990810,Nov.1999. [9] Juniper Networks, Sunny vale, CA ,USA, “Application acceleration,” 1996[Online]. Available:http://www.juniper.net/us/en/products- services/application-acceleration/ [10] Blue Coat Systems, Sunnyvale,CA,USA,“MACH5,”1996 [Online]. Available: http://www.bluecoat.com/products/mach5 [11] Expand Networks, Riverbed Technology,SanFrancisco, CA, USA, “Application acceleration and WAN optimization,”1998 [Online]. Available:http://www.expand.com/technology/applica tion-acceleration.aspx [12] F5, Seattle, WA, USA, “WAN optimization,”1996[Online].Available: http://www.f5.com/solutions/acceleration/wan- optimization/ [13] A. Flint , “The next work place revolution, ”Nov.2012 [Online]. Available: http://m.theatlanticcities.com/jobs-and economy/2012/11/nextwork place-revolution/3904/ BIOGRAPHIES Mr. Suresh Chaudhari Currently pursuing M.E in Computer Engineering, GCOE, Jalgaon Mr.Pramod Gosavi Head of Department (Computer Engineering), GCOE Jalgaon