SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4329
Effective Privacy based Distributed Storage Structure
Ranjana Manohar Nayak1, Radhakrishna Dodmane2
1Department of Computer Science and Engineering, NMAMIT, Nitte, Karnataka, India
2Professor, Department of Computer Science and Engineering, NMAMIT, Nitte, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Appropriated figuring is to an incredible degree
of vital reaction for some individual clients and affiliations. It
can give various organizations reliant on different necessities
and essentials. The various issues link to the customer data
that ought to be watched out while using disseminated
processing. Most basic issues that link to these are: data
proprietorship, information security, and data limit. Then
again, they may be concerned over Illegal contact to their
confidential or secret data. A coupleofanswersfortheseissues
were proposed in the composition, anyway, they
predominantly increase the cost and dealing with time since
they depend after encoding the whole data. This paper
exhibiting an appropriatedprocessingstructurethatdescribes
the data reliant on their importance. By the day's end,
progressively crucial information encoded with continuously
sheltered encryption and greater key sizes. This procedure is
extraordinarily helpful in reducing the expense and
multifaceted nature of data amassing and control. Sincethere
is no necessity to relate the comparable refined encryption
frameworks to the whole customer's information. Thedelayed
consequences of handling the proposed structure show the
enlargement and capability over other prevailing structures.
Key Words: Cloud Computing, Cryptography,
Information Security.
1. INTRODUCTION
Mechanized data are of enormous motivating force to the
two people and associations and it can't be remained to lose
huge information. Thusly, there are extending solicitation to
anchor these information. Appropriated data limit
associations are considered as a reaction for this issue and
their reputation is developing quickly since they store and
accordingly back up self-definitive information in
propensities that are viewed as financiallyshrewd,simple to
utilize and open. Moreover it is Easy to Sharing and
synchronizing the data’s betweentwodifferentclientsor the
customer. Everything considered customers (particularly
associations) are restless about the likelihood that
appropriated capacity authority associations may lose
power over their information and reevaluate before passing
on it to them. Excluding that, the latest viable attacks on
conveyed stockpiling organizations have escalated these
stresses. To encourage this condition,somegameplanswere
accessible and captured to monitor customers' information
sheltered. This paper proposes a unfailing cloud structure
that:
• Make available mystery and uprightness of information in
both transmission and limit.
• Lessens the dealing with time taken in scrambling
information.
• Proposals superior use for exchange speed by way of
gathering the informationasdemonstrated bythedimension
of mystery.
Customers reliably have stressed over exchanging delicate
data to the cloud master association servers. They remain
not absolutely without inquiry that those servers are totally
guaranteed spots to mass their information as they may be
shown to different dangers in addition to modernized
strikes. As such, numerous master centers offered answers
to monitor customers' data security and encryptionsystems
are not all that terrible system to remain the date on the
cloud structures. In any case, using comparable encryption
counts with a comparable key size to encode the complete
customer's information isn't the finest tactic to deal with
grapple it. Several basic statistics that require additional
security added to others. In the proposed method proposing
a successful and secure structure for circulated figuring
condition.
The structure perceives the data reliant on stage. Then
mastermind the information into three sorts liable upon
their hugeness, it has been decided to choose the correct
encryption computation with the fitting key size to give the
necessary level. Thus it reduces thecostandthemultifaceted
nature and curtails the phase expected to mass information
firmly. Figure demonstrate the working of the cloud
architecture.
Fig -1: cloud storage architecture diagram
1. The client starts the call for servers for information
stockpiling
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4330
2. As the server gets the call from client, it speakswith
the third party auditor for client confirmation
3. The third party auditor sends the confirmation
message to the client. When the client is confirmed
to be bona fide, the clients are furnished with the
servers that is accessible and could be utilized for
capacity.
4. As the client gets the list of accessible servers,
information is exchanged to the servers.
5. AES encryption happens at the client side as and
when the information enters the system. This
decreases the likelihood of gatecrashers infiltrating
into the system and undermining the information.
6. The encoded information is put away intheservers.
At the point when the client ask for information,the
information is exchanged to the client and the
unscrambling happens at the client side.
2. LITERATURE REVIEW
As a developing innovation and business worldview, Cloud
Computing has surprised business handling with design,
indoctrination, accessing info, and dimensions welfaresthat
don't necessitate end-user knowledge of the physical area
and arrangement of the structure that expresses the admins
[3].
Distributed cloud computing gives simple access to the
organization's with a capacity framework through web
administrations and gives enormous adaptability, 99.999%
dependability, superior, and specifiable configurability with
this distributed computing and the point is to conceal the
unpredictability of the IT foundation the board from its
clients. These capacities are given at generally low costs
contrasted withcommittedframeworks.Itshieldsthecrucial
innovations in Cloud Computing and in the Cloud Storage
and has a few unique kinds of mists benefits [4]. It depicts
the focal points and difficulties of Cloud Storage after the
presentation of the Cloud Storage orientation display.
Distributed computing has been envisioned as thefrontline
designing of IT endeavor [3]. Distributed computing moves
the solicitation indoctrination and data bases towards the
significant server farms, where the organization of the data
and organizations maynot betotally dependable.Thisstance
numerous challenges that include security and privacy
which have not been completely actualized [10].
In this paper, the major work relies on angles forgiving
security to information stockpiling in the cloud, also
information stockpiling that are actualized by other
specialist organizations sellers in the cloud, key focuses for
demonstrating security for information stockpiling [4-6].
Considering the issues of building a secured distributed
storage administration in excess of an uncluttered cloud
structure. In the abnormal state, a couple of models that
solidify later and non-standard cryptographic natives so as
to accomplish our objective [5-8]. Reviewing the benefits of
such designing would be given to the two customers and
master communities thus giving a graph of continuous
advances in cryptography persuaded explicitly by
distributed storage.
Distributed computing is drawing nearertomanufacturethe
farthest point or incorporate limits incredible completely
without including every one of the assets into another
structure, allowing new programming. In a couple of years,
distributed computing has created from being a promising
business thought to thecloudcomputingadvancementin the
IT business [10].. In any case, as increasingly as
progressively a large portion of the data'sandaffiliationsare
established in the cloud, concerns arestartingtomakeabout
decisively how safe a condition it is.
In spite of all the promotion including the cloud, venture
consumers are until now unenthusiastic to permit on their
trade in the cloud. But security is theonething whichlessens
the improvement of distributed computing and
inconveniences with data insurance and data confirmation
continue tormenting in the market. The methodology of an
impelled model should not counsel with the necessary
functionalities and dimensions of the existent model [5], [7]
and [15]. One more approach concentrating on refining
features of a present model must not compromiseadditional
vital features of the present model. The designing of the
cloud positions such a peril to the security of the present
headways when sent in a cloud situation [5] and [6]. Cloud
organization customers ought to be wary in understanding
the perils of information breaks in this new condition.
In this paper, an investigation of the actual safety threats
that express to a hazard to the cloud is shown. This paper is
an outline of the unique security issues that istransmittedas
a result of the possibility in the organization transport
models of distributed processing frame work [11].
3. PROPOSED CONFIDENTIALITY- BASED CLOUD
STORAGE FRAMEWORK
3.1 ADVANCED ENCRYPTION STANDARD (AES)
Advanced Encryption Standard is a private/ symmetric-key
square scrambling figuring with settled square size of 128-
bits and key sizes of 128-bits, 192-bits, or 256-bits .AES was
utilized rather than Data Encryption Standard (DES) as an
approach for encryption by the U.S. government and it is
viewed as a standard for scrambling and unscrambling
sorted out information. AES deals with various fundamental
highlights like overall access, tied down information, no
costs, just lone encryption and ciphering key is essential and
straight forward use. Main four task operation in AES
includes Sub Bytes, Shift Rows,MixColumns,andAddRound
Key. The majority of the bytesandkeysarerestrictedground
parts and not numbers for logical methodology inside these
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4331
errands. The compelled field of size 28 has 256 parts. AES
key: 10 rounds for 128- bit keys, 12 rounds for 192-bit keys,
and 14 rounds for 256-bit keys. All rounds play out a near
four errands; with the exception of the last one where it
evades the Mix Columns movement.
3.2 TRNSPORT LAYETR SECURITY (TLS)
Transport Layer Securityensurescorrespondenceinsurance
among clients on web. TLS warranties that there will be no
hindrance communication from outsider.
The TLS Record Protocol and the TLS Handshake Protocol
are the two layers that shape TLS. The TLS Record Protocol
deals sheltered affiliations. . It is generally used with
encryption such as DES and can be used without encryption
in the same way. The TLS Handshake Protocol invigorates
check among server and the customer and empowers them
to talk about and pick figure and cryptographic keys before
interchange of information. It relies upon Netscape'sSSL3.0
tradition, at any rate, TLS. The TLS tradition comprises a
system that stipends TLS usage to pull back to SSL 3.
3.3 SECURITY HASH ALORITHM (SHA)
U.S agency SHA- 2 organized a lot of hash limits: SHA- 224,
SHA- 256, SHA- 384, and SHA- 512. The hash work is an
assumption that data segments change over a subjective
course of action, such as changing to a hash or a motivating
force with a static span over a substance record. The hash
consideration is later recycled to show the decency of the
primary replicas of the information without allowing any
person to obtain the leading information. This implies thatif
hash consideration is used for qualified causes, it can be
secured plus energetically passed on. SHA-2 has four hash
limits for surveys and is 224, 256 , 384 or 512 bits.
3.4 FRAMEWORK DETAILS
The three main dimensions include:fundamental,secretand
very private. Below are the definition of these dimensions:
Level 1: Fundamental
These are essential for encoding general kind ofinformation
that needn't bother with abnormal state of security, for
example: sound records and photographs. Regularly, all are
using HTTPS and TLS to ensure correspondence security
among customers.
Level 2: Secret
These are utilized to anchor information which requires a
standard dimension of secrecy, for example: individual
information’s and beaks. In this encryption calculation
dimension used is AES-128.
Level 3: Very Private
These dimensions are used when the information is
especially essential and should be guaranteed by using the
most grounded techniques possible.
4. PERFORMANCE EVALUATION
The proposed framework was copied to obtain the output
considered for the purpose of adequacy. Crypto SIM test
framework was made and it was used to check theexecution
part of the symmetric encryption. Theestimationofchanged
encryption figuring's at various settings like assorted data
sizes and key size. These preliminaries, encoding is assorted
to archive sizes ranges from52147 MB' to 10485lMB.
All proliferation tests were driven on the Intel(R) Core(TM)
i3-5005U CPU @ 2 GHz 2 GHz focus machine. To reproduce
Triple DES, AES-128 and AES-256 in the system and the
Microsoft. Net security library.
Execution of symmetric counts including AES-128,AES-256,
and 3-DES and also assessment relies upon the time
expected to encode information impedes with dimensions
diverse among 2 GB and 10 GB. To make sure outcomes'
constancy and authenticity, examinations stoodplayedouta
couple of times. Fig 1 demonstrates the execution of these
estimations. As the figure, it is totally apparent thatAES-128
has outmaneuvered interchange estimations to the extent
speed in scrambling data impedes as it has the most
insignificant taking care of time diverged from various
counts. Regardless, we ought to recall that AES-256 is
progressively safe once differentiated and remaining other
two counts.
Fig. -2: Encryption representation of: 3-DES, AES-128, and
AES-256
5. CONCLUSION
This paper proposes a successful security based
disseminated stockpiling structure that enhances the taking
care of time and ensures privacy and reliability over
information order and use of Transport Layer Security,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4332
Advanced EncryptionStandard,andSecuredHashAlgorithm
subject to the kind of characterized data. The viability of the
proposed structure has been showed up through
coordinating reenactments. The reenactment consequences
appearance that our structure accomplishes better dealing
with time while ensuring data arrangement and
genuineness. Our upcoming work istoupgradethestructure
by thinking about different perspective. This incorporates
programed information arrangement and utilization of
various cryptographic calculations with high level secrecy
and security.
REFERENCES
1. P. Mell and T. Grance, “The NIST definition of cloud
computing,” Computer Security Division,
Information Technology Laboratory, National
InstituteofStandardsandTechnologyGaithersburg,
Tech. Rep., 2011.
2. V. Guzhov, K. Bazhenov, S. Ilinykh, and A. Vagizov,
“Cloud computing security issues,” in The 2-nd
Indo-Russian Joint Workshop on Computational
Intelligence and Modern Heuristics in Automation
and Robotics, 2011, pp. 128–133.
3. F. Ogigau˘-Neamt¸iu, “Cloud computing security
issues,” Journal of Defense Resources Management
(JoDRM), no. 02, pp. 141–148, 2012.
4. J. Wu, L. Ping, X. Ge, Y. Wang, and J. Fu, “Cloud
storage as the infrastructureofcloudcomputing,”in
Intelligent Computing and Cognitive Informatics
(ICICCI), 2010 International Conference on. IEEE,
2010, pp. 380–383.
5. T. Brindha, R. Shaji, and G. Rajesh, “A survey on the
architectures of data security in cloud storage
infrastructure,” Engineering andTechnology(IJET),
vol. 5, pp. 1108–1114, 2013.
6. S. Kamara and K. Lauter, “Cryptographic cloud
storage,” in Financial Cryptography and Data
Security. Springer, 2010, pp. 136–149.
7. Y. Wei, Z. Jianpeng, Z. Junmao, Z. Wei, and Y. Xinlei,
“Design and implementation of security cloud
storage framework,” in Instrumentation,
Measurement, Computer, Communication and
Control (IMCCC), 2012 Second International
Conference on. IEEE, 2012, pp. 323–326.
8. M. Borgmann and M. Waidner, On the security of
cloud storage services. Fraunhofer-Verlag, 2012.
9. R. L. Grossman, “The case for cloud computing,” IT
professional, vol. 11, no. 2, pp. 23–27, 2009.
10. A. Rindos, M. Vouk, and Y. Jararweh, “The virtual
computing lab (vcl): an open source cloud
computing solution designed specifically for
education and research,” International Journal of
Service Science, Management, Engineering, and
Technology (IJSSMET), vol.5,no.2,pp.51–63,2014.
11. A. Darabseh, M. Al-Ayyoub, Y. Jararweh, E.
Benkhelifa, M. Vouk, and A. Rindos, “Storage: a
software-defined storage experimental frame-
work,” in 2015 IEEE International Conference on
Cloud Engineering (IC2E). IEEE, 2015,pp.341–346.
12. M. A.-A. AlaDarabseh, Y. Jararweh, E. Benkhelifa,
M. Vouk, and. Rindos, “Security:Asoftware-defined
security experimental framework,” in IEEE ICC
2014 Workshop on Cloud Computing Systems,
Networks, and Applications (CCSNA), 2015.
13. L. M. Kaufman, “Data security in the world of cloud
computing,” Security & Privacy, IEEE, vol. 7, no. 4,
pp. 61–64, 2009.
14. Y. Jararweh, L. Tawalbeh, F. Ababneh, and F. Dosari,
“Resource efficientmobilecomputingusingcloudlet
infrastructure,” in Mobile Ad-hoc and Sensor
Networks (MSN), 2013 IEEE Ninth International
Conference on. IEEE, 2013, pp. 373–377.
15. Akhil KM, Kumar MP, Pushpa BR. Enhanced cloud
data security using AES algorithm. In2017
International Conference on Intelligent Computing
and Control (I2C2) 2017 Jun 23 (pp. 1-5). IEEE.

More Related Content

What's hot

Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...IRJET Journal
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...iosrjce
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET Journal
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...IRJET Journal
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paperjagan339
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
 
Cisco Secure Enclaves Architecture
Cisco Secure Enclaves ArchitectureCisco Secure Enclaves Architecture
Cisco Secure Enclaves ArchitectureCisco Russia
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
 

What's hot (18)

Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
V04405122126
V04405122126V04405122126
V04405122126
 
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on CloudIRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
[IJCT-V3I3P2] Authors: Prithvipal Singh, Sunny Sharma, Amritpal Singh, Karand...
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
 
50120140507005 2
50120140507005 250120140507005 2
50120140507005 2
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paper
 
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
 
Cisco Secure Enclaves Architecture
Cisco Secure Enclaves ArchitectureCisco Secure Enclaves Architecture
Cisco Secure Enclaves Architecture
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 

Similar to IRJET- Effective Privacy based Distributed Storage Structure

IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET Journal
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageIRJET Journal
 
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive AnalysisThe Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive AnalysisIRJET Journal
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAIRJET Journal
 
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET-  	  Cloud Computing: Security Issues Challenges and SolutionIRJET-  	  Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and SolutionIRJET Journal
 
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...IRJET Journal
 
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...IRJET Journal
 
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET Journal
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and AdoptionTransforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoptionijtsrd
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.IRJET Journal
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET Journal
 
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...IRJET Journal
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overviewshraddhaudage
 

Similar to IRJET- Effective Privacy based Distributed Storage Structure (20)

IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
IRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud ComputingIRJET- Efficient and Secure Data Storage in Cloud Computing
IRJET- Efficient and Secure Data Storage in Cloud Computing
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive AnalysisThe Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
The Impact of Cloud Computing in the field of Finance: A Comprehensive Analysis
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
Data Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHAData Security Approach in Cloud computing using SHA
Data Security Approach in Cloud computing using SHA
 
IRJET- Cloud Computing: Security Issues Challenges and Solution
IRJET-  	  Cloud Computing: Security Issues Challenges and SolutionIRJET-  	  Cloud Computing: Security Issues Challenges and Solution
IRJET- Cloud Computing: Security Issues Challenges and Solution
 
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...IRJET-  	  Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
 
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
 
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Transforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and AdoptionTransforming the Data into Virtual Set Up Segmented usage and Adoption
Transforming the Data into Virtual Set Up Segmented usage and Adoption
 
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
Comprehensive Study on Deployment Models and Service Models in Cloud Computing.
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
 
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
 
Cloud computing-overview
Cloud computing-overviewCloud computing-overview
Cloud computing-overview
 
Cloud Computing Overview | Torry Harris Whitepaper
Cloud Computing Overview | Torry Harris WhitepaperCloud Computing Overview | Torry Harris Whitepaper
Cloud Computing Overview | Torry Harris Whitepaper
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 

Recently uploaded (20)

young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 

IRJET- Effective Privacy based Distributed Storage Structure

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4329 Effective Privacy based Distributed Storage Structure Ranjana Manohar Nayak1, Radhakrishna Dodmane2 1Department of Computer Science and Engineering, NMAMIT, Nitte, Karnataka, India 2Professor, Department of Computer Science and Engineering, NMAMIT, Nitte, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Appropriated figuring is to an incredible degree of vital reaction for some individual clients and affiliations. It can give various organizations reliant on different necessities and essentials. The various issues link to the customer data that ought to be watched out while using disseminated processing. Most basic issues that link to these are: data proprietorship, information security, and data limit. Then again, they may be concerned over Illegal contact to their confidential or secret data. A coupleofanswersfortheseissues were proposed in the composition, anyway, they predominantly increase the cost and dealing with time since they depend after encoding the whole data. This paper exhibiting an appropriatedprocessingstructurethatdescribes the data reliant on their importance. By the day's end, progressively crucial information encoded with continuously sheltered encryption and greater key sizes. This procedure is extraordinarily helpful in reducing the expense and multifaceted nature of data amassing and control. Sincethere is no necessity to relate the comparable refined encryption frameworks to the whole customer's information. Thedelayed consequences of handling the proposed structure show the enlargement and capability over other prevailing structures. Key Words: Cloud Computing, Cryptography, Information Security. 1. INTRODUCTION Mechanized data are of enormous motivating force to the two people and associations and it can't be remained to lose huge information. Thusly, there are extending solicitation to anchor these information. Appropriated data limit associations are considered as a reaction for this issue and their reputation is developing quickly since they store and accordingly back up self-definitive information in propensities that are viewed as financiallyshrewd,simple to utilize and open. Moreover it is Easy to Sharing and synchronizing the data’s betweentwodifferentclientsor the customer. Everything considered customers (particularly associations) are restless about the likelihood that appropriated capacity authority associations may lose power over their information and reevaluate before passing on it to them. Excluding that, the latest viable attacks on conveyed stockpiling organizations have escalated these stresses. To encourage this condition,somegameplanswere accessible and captured to monitor customers' information sheltered. This paper proposes a unfailing cloud structure that: • Make available mystery and uprightness of information in both transmission and limit. • Lessens the dealing with time taken in scrambling information. • Proposals superior use for exchange speed by way of gathering the informationasdemonstrated bythedimension of mystery. Customers reliably have stressed over exchanging delicate data to the cloud master association servers. They remain not absolutely without inquiry that those servers are totally guaranteed spots to mass their information as they may be shown to different dangers in addition to modernized strikes. As such, numerous master centers offered answers to monitor customers' data security and encryptionsystems are not all that terrible system to remain the date on the cloud structures. In any case, using comparable encryption counts with a comparable key size to encode the complete customer's information isn't the finest tactic to deal with grapple it. Several basic statistics that require additional security added to others. In the proposed method proposing a successful and secure structure for circulated figuring condition. The structure perceives the data reliant on stage. Then mastermind the information into three sorts liable upon their hugeness, it has been decided to choose the correct encryption computation with the fitting key size to give the necessary level. Thus it reduces thecostandthemultifaceted nature and curtails the phase expected to mass information firmly. Figure demonstrate the working of the cloud architecture. Fig -1: cloud storage architecture diagram 1. The client starts the call for servers for information stockpiling
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4330 2. As the server gets the call from client, it speakswith the third party auditor for client confirmation 3. The third party auditor sends the confirmation message to the client. When the client is confirmed to be bona fide, the clients are furnished with the servers that is accessible and could be utilized for capacity. 4. As the client gets the list of accessible servers, information is exchanged to the servers. 5. AES encryption happens at the client side as and when the information enters the system. This decreases the likelihood of gatecrashers infiltrating into the system and undermining the information. 6. The encoded information is put away intheservers. At the point when the client ask for information,the information is exchanged to the client and the unscrambling happens at the client side. 2. LITERATURE REVIEW As a developing innovation and business worldview, Cloud Computing has surprised business handling with design, indoctrination, accessing info, and dimensions welfaresthat don't necessitate end-user knowledge of the physical area and arrangement of the structure that expresses the admins [3]. Distributed cloud computing gives simple access to the organization's with a capacity framework through web administrations and gives enormous adaptability, 99.999% dependability, superior, and specifiable configurability with this distributed computing and the point is to conceal the unpredictability of the IT foundation the board from its clients. These capacities are given at generally low costs contrasted withcommittedframeworks.Itshieldsthecrucial innovations in Cloud Computing and in the Cloud Storage and has a few unique kinds of mists benefits [4]. It depicts the focal points and difficulties of Cloud Storage after the presentation of the Cloud Storage orientation display. Distributed computing has been envisioned as thefrontline designing of IT endeavor [3]. Distributed computing moves the solicitation indoctrination and data bases towards the significant server farms, where the organization of the data and organizations maynot betotally dependable.Thisstance numerous challenges that include security and privacy which have not been completely actualized [10]. In this paper, the major work relies on angles forgiving security to information stockpiling in the cloud, also information stockpiling that are actualized by other specialist organizations sellers in the cloud, key focuses for demonstrating security for information stockpiling [4-6]. Considering the issues of building a secured distributed storage administration in excess of an uncluttered cloud structure. In the abnormal state, a couple of models that solidify later and non-standard cryptographic natives so as to accomplish our objective [5-8]. Reviewing the benefits of such designing would be given to the two customers and master communities thus giving a graph of continuous advances in cryptography persuaded explicitly by distributed storage. Distributed computing is drawing nearertomanufacturethe farthest point or incorporate limits incredible completely without including every one of the assets into another structure, allowing new programming. In a couple of years, distributed computing has created from being a promising business thought to thecloudcomputingadvancementin the IT business [10].. In any case, as increasingly as progressively a large portion of the data'sandaffiliationsare established in the cloud, concerns arestartingtomakeabout decisively how safe a condition it is. In spite of all the promotion including the cloud, venture consumers are until now unenthusiastic to permit on their trade in the cloud. But security is theonething whichlessens the improvement of distributed computing and inconveniences with data insurance and data confirmation continue tormenting in the market. The methodology of an impelled model should not counsel with the necessary functionalities and dimensions of the existent model [5], [7] and [15]. One more approach concentrating on refining features of a present model must not compromiseadditional vital features of the present model. The designing of the cloud positions such a peril to the security of the present headways when sent in a cloud situation [5] and [6]. Cloud organization customers ought to be wary in understanding the perils of information breaks in this new condition. In this paper, an investigation of the actual safety threats that express to a hazard to the cloud is shown. This paper is an outline of the unique security issues that istransmittedas a result of the possibility in the organization transport models of distributed processing frame work [11]. 3. PROPOSED CONFIDENTIALITY- BASED CLOUD STORAGE FRAMEWORK 3.1 ADVANCED ENCRYPTION STANDARD (AES) Advanced Encryption Standard is a private/ symmetric-key square scrambling figuring with settled square size of 128- bits and key sizes of 128-bits, 192-bits, or 256-bits .AES was utilized rather than Data Encryption Standard (DES) as an approach for encryption by the U.S. government and it is viewed as a standard for scrambling and unscrambling sorted out information. AES deals with various fundamental highlights like overall access, tied down information, no costs, just lone encryption and ciphering key is essential and straight forward use. Main four task operation in AES includes Sub Bytes, Shift Rows,MixColumns,andAddRound Key. The majority of the bytesandkeysarerestrictedground parts and not numbers for logical methodology inside these
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4331 errands. The compelled field of size 28 has 256 parts. AES key: 10 rounds for 128- bit keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit keys. All rounds play out a near four errands; with the exception of the last one where it evades the Mix Columns movement. 3.2 TRNSPORT LAYETR SECURITY (TLS) Transport Layer Securityensurescorrespondenceinsurance among clients on web. TLS warranties that there will be no hindrance communication from outsider. The TLS Record Protocol and the TLS Handshake Protocol are the two layers that shape TLS. The TLS Record Protocol deals sheltered affiliations. . It is generally used with encryption such as DES and can be used without encryption in the same way. The TLS Handshake Protocol invigorates check among server and the customer and empowers them to talk about and pick figure and cryptographic keys before interchange of information. It relies upon Netscape'sSSL3.0 tradition, at any rate, TLS. The TLS tradition comprises a system that stipends TLS usage to pull back to SSL 3. 3.3 SECURITY HASH ALORITHM (SHA) U.S agency SHA- 2 organized a lot of hash limits: SHA- 224, SHA- 256, SHA- 384, and SHA- 512. The hash work is an assumption that data segments change over a subjective course of action, such as changing to a hash or a motivating force with a static span over a substance record. The hash consideration is later recycled to show the decency of the primary replicas of the information without allowing any person to obtain the leading information. This implies thatif hash consideration is used for qualified causes, it can be secured plus energetically passed on. SHA-2 has four hash limits for surveys and is 224, 256 , 384 or 512 bits. 3.4 FRAMEWORK DETAILS The three main dimensions include:fundamental,secretand very private. Below are the definition of these dimensions: Level 1: Fundamental These are essential for encoding general kind ofinformation that needn't bother with abnormal state of security, for example: sound records and photographs. Regularly, all are using HTTPS and TLS to ensure correspondence security among customers. Level 2: Secret These are utilized to anchor information which requires a standard dimension of secrecy, for example: individual information’s and beaks. In this encryption calculation dimension used is AES-128. Level 3: Very Private These dimensions are used when the information is especially essential and should be guaranteed by using the most grounded techniques possible. 4. PERFORMANCE EVALUATION The proposed framework was copied to obtain the output considered for the purpose of adequacy. Crypto SIM test framework was made and it was used to check theexecution part of the symmetric encryption. Theestimationofchanged encryption figuring's at various settings like assorted data sizes and key size. These preliminaries, encoding is assorted to archive sizes ranges from52147 MB' to 10485lMB. All proliferation tests were driven on the Intel(R) Core(TM) i3-5005U CPU @ 2 GHz 2 GHz focus machine. To reproduce Triple DES, AES-128 and AES-256 in the system and the Microsoft. Net security library. Execution of symmetric counts including AES-128,AES-256, and 3-DES and also assessment relies upon the time expected to encode information impedes with dimensions diverse among 2 GB and 10 GB. To make sure outcomes' constancy and authenticity, examinations stoodplayedouta couple of times. Fig 1 demonstrates the execution of these estimations. As the figure, it is totally apparent thatAES-128 has outmaneuvered interchange estimations to the extent speed in scrambling data impedes as it has the most insignificant taking care of time diverged from various counts. Regardless, we ought to recall that AES-256 is progressively safe once differentiated and remaining other two counts. Fig. -2: Encryption representation of: 3-DES, AES-128, and AES-256 5. CONCLUSION This paper proposes a successful security based disseminated stockpiling structure that enhances the taking care of time and ensures privacy and reliability over information order and use of Transport Layer Security,
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4332 Advanced EncryptionStandard,andSecuredHashAlgorithm subject to the kind of characterized data. The viability of the proposed structure has been showed up through coordinating reenactments. The reenactment consequences appearance that our structure accomplishes better dealing with time while ensuring data arrangement and genuineness. Our upcoming work istoupgradethestructure by thinking about different perspective. This incorporates programed information arrangement and utilization of various cryptographic calculations with high level secrecy and security. REFERENCES 1. P. Mell and T. Grance, “The NIST definition of cloud computing,” Computer Security Division, Information Technology Laboratory, National InstituteofStandardsandTechnologyGaithersburg, Tech. Rep., 2011. 2. V. Guzhov, K. Bazhenov, S. Ilinykh, and A. Vagizov, “Cloud computing security issues,” in The 2-nd Indo-Russian Joint Workshop on Computational Intelligence and Modern Heuristics in Automation and Robotics, 2011, pp. 128–133. 3. F. Ogigau˘-Neamt¸iu, “Cloud computing security issues,” Journal of Defense Resources Management (JoDRM), no. 02, pp. 141–148, 2012. 4. J. Wu, L. Ping, X. Ge, Y. Wang, and J. Fu, “Cloud storage as the infrastructureofcloudcomputing,”in Intelligent Computing and Cognitive Informatics (ICICCI), 2010 International Conference on. IEEE, 2010, pp. 380–383. 5. T. Brindha, R. Shaji, and G. Rajesh, “A survey on the architectures of data security in cloud storage infrastructure,” Engineering andTechnology(IJET), vol. 5, pp. 1108–1114, 2013. 6. S. Kamara and K. Lauter, “Cryptographic cloud storage,” in Financial Cryptography and Data Security. Springer, 2010, pp. 136–149. 7. Y. Wei, Z. Jianpeng, Z. Junmao, Z. Wei, and Y. Xinlei, “Design and implementation of security cloud storage framework,” in Instrumentation, Measurement, Computer, Communication and Control (IMCCC), 2012 Second International Conference on. IEEE, 2012, pp. 323–326. 8. M. Borgmann and M. Waidner, On the security of cloud storage services. Fraunhofer-Verlag, 2012. 9. R. L. Grossman, “The case for cloud computing,” IT professional, vol. 11, no. 2, pp. 23–27, 2009. 10. A. Rindos, M. Vouk, and Y. Jararweh, “The virtual computing lab (vcl): an open source cloud computing solution designed specifically for education and research,” International Journal of Service Science, Management, Engineering, and Technology (IJSSMET), vol.5,no.2,pp.51–63,2014. 11. A. Darabseh, M. Al-Ayyoub, Y. Jararweh, E. Benkhelifa, M. Vouk, and A. Rindos, “Storage: a software-defined storage experimental frame- work,” in 2015 IEEE International Conference on Cloud Engineering (IC2E). IEEE, 2015,pp.341–346. 12. M. A.-A. AlaDarabseh, Y. Jararweh, E. Benkhelifa, M. Vouk, and. Rindos, “Security:Asoftware-defined security experimental framework,” in IEEE ICC 2014 Workshop on Cloud Computing Systems, Networks, and Applications (CCSNA), 2015. 13. L. M. Kaufman, “Data security in the world of cloud computing,” Security & Privacy, IEEE, vol. 7, no. 4, pp. 61–64, 2009. 14. Y. Jararweh, L. Tawalbeh, F. Ababneh, and F. Dosari, “Resource efficientmobilecomputingusingcloudlet infrastructure,” in Mobile Ad-hoc and Sensor Networks (MSN), 2013 IEEE Ninth International Conference on. IEEE, 2013, pp. 373–377. 15. Akhil KM, Kumar MP, Pushpa BR. Enhanced cloud data security using AES algorithm. In2017 International Conference on Intelligent Computing and Control (I2C2) 2017 Jun 23 (pp. 1-5). IEEE.