These journals serve as a vital platform for disseminating research, fostering collaboration, and advancing the field of computer science. In this article, we'll explore the world of computer science journals, discussing their importance, types, and how to navigate this vast landscape as a researcher.
ISSN 2395-650X
IJLBPS provides an inclusive environment for researchers to share original research, reviews, case studies, and technical notes across a broad spectrum of life sciences, biotechnology, and pharmaceutical sciences.
Enterprise IT is transitioning from the use of traditional on-premise data centers to hybrid cloud environments. As a result, weβre experiencing a paradigm shift in the way we must think about and manage enterprise security. From Four Walls to No Walls Until now, the conventional view on IT security has been that applications and data are safe because theyβre physically housed within the confines of a companyβs data center walls using company-owned equipment. So, itβs not surprising that many decision makers perceive greater risks as they trade physical assets for cloud-based solutions.
Through our partnerships with leading cloud providers, we are able to offer hybrid, private and public cloud solutions. At Epoch Universal, we supply cloud the way you want it with deep control, extreme performance, and broad customization capabilities. When you join the Epoch Universal fold, you take back the keys to your kingdom. Reign as supreme commander in chief of your cloud. No compromises. No exceptions.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Β
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
ISSN 2395-650X
IJLBPS provides an inclusive environment for researchers to share original research, reviews, case studies, and technical notes across a broad spectrum of life sciences, biotechnology, and pharmaceutical sciences.
Enterprise IT is transitioning from the use of traditional on-premise data centers to hybrid cloud environments. As a result, weβre experiencing a paradigm shift in the way we must think about and manage enterprise security. From Four Walls to No Walls Until now, the conventional view on IT security has been that applications and data are safe because theyβre physically housed within the confines of a companyβs data center walls using company-owned equipment. So, itβs not surprising that many decision makers perceive greater risks as they trade physical assets for cloud-based solutions.
Through our partnerships with leading cloud providers, we are able to offer hybrid, private and public cloud solutions. At Epoch Universal, we supply cloud the way you want it with deep control, extreme performance, and broad customization capabilities. When you join the Epoch Universal fold, you take back the keys to your kingdom. Reign as supreme commander in chief of your cloud. No compromises. No exceptions.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Β
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
Β
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This research analysis will go over the various encryption methods and summarize the previous research in encryption that has been done to this point. The advantages of Symmetric and Asymmetric Encryption will be discussed in terms of security and efficiency. As encryption becomes more advanced, so the need for proper key management increases as well. This paper will conclude with a look at what could be the future of cloud encryption, Homomorphic Encryption.
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
Β
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
In this study, survey questions were sent to different non-profit and government organizations, which
assisted in collecting fundamental information. The data was acquired by conducting surveys in OpenStack
Company to identify the critical vulnerabilities in the cloud computing platform in order to provide the
recommended solutions.
So, analysis will be made on how the cloudβs characteristics such as the nature of the architecture,
attractiveness, as well as, vulnerability are tightly related to privacy and security issues. Privacy and
security are complex issues for which there is no standard and the relationship between them is necessarily
complicated. The study also highlight on the inherent challenge to data privacy because it typically results
in data to be presented in an encryption from the data owner. Thus, the study aimed at obtaining a common
goal to provide a comprehensive review of the existing security and privacy issues in cloud environments,
and identify and describe the most representative of the security and privacy attributes and present a
relationship among them.
Finally, in order to ensure that the standard measure of validity is achieved, validity test was conducted in
order to ensure that the study is free from errors. Various recommendations were provided. The study also
explored various areas that require future directions for each attribute, which comprise of multi-domain
policy integration and a secure service composition to design a comprehensive policy-based management
framework in the cloud environments.
Lastly, the recommendations will provide the potential for security and privacy approaches that can be
implemented to improve the cloud computing environment to ensure that a level of trust is achieved
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
Β
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Β
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Β
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
Β
ABSTRACT : Currently, cloud-based application is so very famous, but preserving the confidentiality of the userβs data is a huge task to accomplish. Keeping this need in mind, here a solution is proposed which will preserve the data confidentiality & integrity in cloud environment. For providing data confidentiality we will use AES algorithms, by virtue of which the secret data will be converted to cipher text and it becomes very difficult for the user to get the meaningful plain text. Here the basic emphasis is also on the data integrity so that the userβs data canβt be duplicated or copied.Keywords:Data Confidentiality, Data Integrity, AES algorithm
Cloud computing is a distributed computing system that offers managed, scalable and secured and high available computation resources and software as a service. Mobile computing is the combination of the heterogeneous domains like Mobile computing, Cloud computing & wireless networks.This paper mainly discusses the literature review on Cloud and the Mobile cloud computing. Here in this paper we analyse existing security challenges and issues involved in the cloud computing and Mobile cloud environment. This paper identifies key issues, which are believed to have long-term significance in cloud computing & mobile cloud security and privacy, based on documented problems and exhibited weaknesses.
Survey on Security in Cloud Hosted Service & Self Hosted Servicesijtsrd
Β
As more and more organizations consider moving their applications and data from dedicated hosting infrastructure, which they own and operate, to shared infrastructure leased from `the cloud', security remains a key sticking point. Tenants of cloud hosting providers have substantially less control over the construction, operation, and auditing of infrastructure they lease than infrastructure they own. Because cloud-hosted infrastructure is shared, attackers can exploit the proximity that comes from becoming a tenant of the same cloud hosting provider. As a result, some have argued that that cloud-hosted infrastructure is inherently less secure than the self-hosted infrastructure, and that it will never be appropriate for high-stakes applications such as health care or financial transaction processing. We strive to present a more balanced treatment of the potential security impacts of transitioning to cloud-hosted infrastructure, surveying both the security costs and security benefits of doing so. The costs include exposure to new threats, some of which are technological, but many others of which are contractual, jurisdictional, and organizational. We also survey potential countermeasures to address these threats, which are also as likely to be contractual or procedural as technological. Transitioning to a cloud-hosted infrastructure may also have security benefits; some security measures have high up-front costs, may become affordable when amortized at cloud scale, and impact threats common to both cloud- and self-hosted infrastructures. Surbhi Khare | Dr. Uday Kumar"Survey on Security in Cloud Hosted Service & Self Hosted Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15941.pdf http://www.ijtsrd.com/computer-science/computer-network/15941/survey-on-security-in-cloud-hosted-service-and-self-hosted-services/surbhi-khare
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
Β
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
Β
Cloud computing is one of today's most exciting technologies due to its ability to reduce cost associated with computing. This technology worldwide used to improve the business infrastructure and performance. The major threat that the cloud is facing now is security. So, the user authentication is very important step in cloud environment. The traditional authentication user name and static password or PIN code can be easily broken by the skillful attacker. An Unauthorized user can easily enter into the system if he knows the user credentials. Encryption algorithms play a main role in information security systems. Efficient password generation for user authentication is an important problem in secure Cloud communications. In the paper, the One Time Password OTP approach is used to authenticate the cloud users. The generated OPT is encrypted by RSA public key encryption to be more secure for the cloud user authentication. So the third party is not required to generate OPT in the proposed paper. This paper can help to solve the user authentication problem in Cloud environment. Kyaw Swar Hlaing | Nay Aung Aung "Secure One Time Password (OTP) Generation for user Authentication in Cloud Environment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd28037.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/28037/secure-one-time-password-otp-generation-for-user-authentication-in-cloud-environment/kyaw-swar-hlaing
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
Β
Cloud computing is a model for enabling for on demand network access to shared
configurable computing resources (e.g. networks, servers, storage, applications, and services).It is
based on virtualization and distributed computing technologies. Cloud Data storage systems enable
user to store data efficiently on server without any trouble of data resources. User can easily store
and retrieve their data remotely. The two biggest concerns about cloud data storage are reliability and
security. Clients arenβt like to entrust their data to another third party or companies without a
guarantee that they will be able to access therein formations whenever they want. In the existing
system, the data are stored in the cloud using dynamic data operation with computation which makes
the user need to make a copy for further updating and verification of the data loss. Different
distributed storing auditing techniques are used for overcoming the problem of data loss. Recent
work of this paper has show that data partitioning technique used for data storage by providing
Digital signature to every partitioning data and user .this technique allow user to upload or retrieve
the data with matching the digital signatures provided to them. This method ensures high cloud
storage integrity, enhanced error localization and easy identification of misbehaving server and
unauthorized access to the cloud server. Hence this work aims to store the data securely in reduced
space with less time and computational cost.
Ph.D. research publications are a critical part of your academic and professional journey, providing a platform to share your discoveries, build your reputation, and contribute to the advancement of knowledge.
Medical journals play a crucial role in the field of healthcare and medicine. They serve as a cornerstone for disseminating new research findings, sharing clinical experiences, and promoting evidence-based practices.
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
Β
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This research analysis will go over the various encryption methods and summarize the previous research in encryption that has been done to this point. The advantages of Symmetric and Asymmetric Encryption will be discussed in terms of security and efficiency. As encryption becomes more advanced, so the need for proper key management increases as well. This paper will conclude with a look at what could be the future of cloud encryption, Homomorphic Encryption.
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
Β
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
In this study, survey questions were sent to different non-profit and government organizations, which
assisted in collecting fundamental information. The data was acquired by conducting surveys in OpenStack
Company to identify the critical vulnerabilities in the cloud computing platform in order to provide the
recommended solutions.
So, analysis will be made on how the cloudβs characteristics such as the nature of the architecture,
attractiveness, as well as, vulnerability are tightly related to privacy and security issues. Privacy and
security are complex issues for which there is no standard and the relationship between them is necessarily
complicated. The study also highlight on the inherent challenge to data privacy because it typically results
in data to be presented in an encryption from the data owner. Thus, the study aimed at obtaining a common
goal to provide a comprehensive review of the existing security and privacy issues in cloud environments,
and identify and describe the most representative of the security and privacy attributes and present a
relationship among them.
Finally, in order to ensure that the standard measure of validity is achieved, validity test was conducted in
order to ensure that the study is free from errors. Various recommendations were provided. The study also
explored various areas that require future directions for each attribute, which comprise of multi-domain
policy integration and a secure service composition to design a comprehensive policy-based management
framework in the cloud environments.
Lastly, the recommendations will provide the potential for security and privacy approaches that can be
implemented to improve the cloud computing environment to ensure that a level of trust is achieved
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
Β
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Β
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Β
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
Β
ABSTRACT : Currently, cloud-based application is so very famous, but preserving the confidentiality of the userβs data is a huge task to accomplish. Keeping this need in mind, here a solution is proposed which will preserve the data confidentiality & integrity in cloud environment. For providing data confidentiality we will use AES algorithms, by virtue of which the secret data will be converted to cipher text and it becomes very difficult for the user to get the meaningful plain text. Here the basic emphasis is also on the data integrity so that the userβs data canβt be duplicated or copied.Keywords:Data Confidentiality, Data Integrity, AES algorithm
Cloud computing is a distributed computing system that offers managed, scalable and secured and high available computation resources and software as a service. Mobile computing is the combination of the heterogeneous domains like Mobile computing, Cloud computing & wireless networks.This paper mainly discusses the literature review on Cloud and the Mobile cloud computing. Here in this paper we analyse existing security challenges and issues involved in the cloud computing and Mobile cloud environment. This paper identifies key issues, which are believed to have long-term significance in cloud computing & mobile cloud security and privacy, based on documented problems and exhibited weaknesses.
Survey on Security in Cloud Hosted Service & Self Hosted Servicesijtsrd
Β
As more and more organizations consider moving their applications and data from dedicated hosting infrastructure, which they own and operate, to shared infrastructure leased from `the cloud', security remains a key sticking point. Tenants of cloud hosting providers have substantially less control over the construction, operation, and auditing of infrastructure they lease than infrastructure they own. Because cloud-hosted infrastructure is shared, attackers can exploit the proximity that comes from becoming a tenant of the same cloud hosting provider. As a result, some have argued that that cloud-hosted infrastructure is inherently less secure than the self-hosted infrastructure, and that it will never be appropriate for high-stakes applications such as health care or financial transaction processing. We strive to present a more balanced treatment of the potential security impacts of transitioning to cloud-hosted infrastructure, surveying both the security costs and security benefits of doing so. The costs include exposure to new threats, some of which are technological, but many others of which are contractual, jurisdictional, and organizational. We also survey potential countermeasures to address these threats, which are also as likely to be contractual or procedural as technological. Transitioning to a cloud-hosted infrastructure may also have security benefits; some security measures have high up-front costs, may become affordable when amortized at cloud scale, and impact threats common to both cloud- and self-hosted infrastructures. Surbhi Khare | Dr. Uday Kumar"Survey on Security in Cloud Hosted Service & Self Hosted Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15941.pdf http://www.ijtsrd.com/computer-science/computer-network/15941/survey-on-security-in-cloud-hosted-service-and-self-hosted-services/surbhi-khare
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
Β
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
Β
Cloud computing is one of today's most exciting technologies due to its ability to reduce cost associated with computing. This technology worldwide used to improve the business infrastructure and performance. The major threat that the cloud is facing now is security. So, the user authentication is very important step in cloud environment. The traditional authentication user name and static password or PIN code can be easily broken by the skillful attacker. An Unauthorized user can easily enter into the system if he knows the user credentials. Encryption algorithms play a main role in information security systems. Efficient password generation for user authentication is an important problem in secure Cloud communications. In the paper, the One Time Password OTP approach is used to authenticate the cloud users. The generated OPT is encrypted by RSA public key encryption to be more secure for the cloud user authentication. So the third party is not required to generate OPT in the proposed paper. This paper can help to solve the user authentication problem in Cloud environment. Kyaw Swar Hlaing | Nay Aung Aung "Secure One Time Password (OTP) Generation for user Authentication in Cloud Environment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd28037.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/28037/secure-one-time-password-otp-generation-for-user-authentication-in-cloud-environment/kyaw-swar-hlaing
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
Β
Cloud computing is a model for enabling for on demand network access to shared
configurable computing resources (e.g. networks, servers, storage, applications, and services).It is
based on virtualization and distributed computing technologies. Cloud Data storage systems enable
user to store data efficiently on server without any trouble of data resources. User can easily store
and retrieve their data remotely. The two biggest concerns about cloud data storage are reliability and
security. Clients arenβt like to entrust their data to another third party or companies without a
guarantee that they will be able to access therein formations whenever they want. In the existing
system, the data are stored in the cloud using dynamic data operation with computation which makes
the user need to make a copy for further updating and verification of the data loss. Different
distributed storing auditing techniques are used for overcoming the problem of data loss. Recent
work of this paper has show that data partitioning technique used for data storage by providing
Digital signature to every partitioning data and user .this technique allow user to upload or retrieve
the data with matching the digital signatures provided to them. This method ensures high cloud
storage integrity, enhanced error localization and easy identification of misbehaving server and
unauthorized access to the cloud server. Hence this work aims to store the data securely in reduced
space with less time and computational cost.
Ph.D. research publications are a critical part of your academic and professional journey, providing a platform to share your discoveries, build your reputation, and contribute to the advancement of knowledge.
Medical journals play a crucial role in the field of healthcare and medicine. They serve as a cornerstone for disseminating new research findings, sharing clinical experiences, and promoting evidence-based practices.
Publishing research is a crucial aspect of the academic journey, especially for Ph.D. students. Not only does it contribute to the body of knowledge in a particular field, but it also enhances one's academic reputation and career prospects
top journal" is a testament to a publication's excellence, impact, and its role as a cornerstone of academic and scientific discourse within a particular field. Researchers aspire to publish in these journals to gain recognition, advance their careers, and contribute to the advancement of knowledge in their respective disciplines.
Research journals are the lifeblood of the academic world. They are the gatekeepers of knowledge, repositories of groundbreaking discoveries, and the platform through which scholars share their insights with the global community. In this blog post, we will delve into the fascinating world of research journals, exploring what they are, why they matter, and how you can make the most of them in your academic journey.
science journals is essential for staying informed about the latest developments in your field of interest. The journals mentioned above are among the best in their respective disciplines, offering valuable insights and research findings. Remember that the choice of journal should align with your specific research area and goals, so it's essential to explore the journals that best serve your needs and interests.
best" publication may vary from person to person, depending on their interests and needs. The key is to explore different publications within your area of interest and find the ones that resonate with you the most. Each of these publications offers a unique perspective and a commitment to excellence in its respective genre, making them worthy of exploration.
The Evolution and Impact of Medical Science Journals in Advancing Healthcaresana473753
Β
Medical science journals have evolved into essential tools for advancing healthcare by disseminating research findings, promoting evidence-based practices, and fostering collaboration. Their historical significance, role in evidence-based medicine, and adaptability to the digital age make them indispensable in the quest for improved healthcare outcomes. As they continue to evolve, medical science journals will play a vital role in shaping the future of medicine and healthcare worldwide.
Journal publications play a pivotal role in the academic and scientific world. They are not only a means of sharing research findings but also a significant measure of a researcher's contribution to their field. Navigating the world of journal publications can be both exciting and challenging. This comprehensive guide aims to demystify the process and provide insights into how to successfully publish in reputable journals.
"journals" refer to academic or professional publications that contain articles and research papers related to various aspects of the medical field. These journals serve as a platform for the dissemination of new medical knowledge, research findings, clinical studies, and expert opinions. They play a crucial role in advancing medical science, sharing best practices, and keeping healthcare professionals, researchers, and students informed about the latest developments in medicine and related disciplines.
UGC Care Journals have emerged as a critical tool in elevating the quality and impact of academic research in India. By maintaining a curated list of reputable journals, the University Grants Commission aims to foster a culture of high-quality research and global recognition. For Indian researchers, these journals provide an essential avenue to showcase their work to a global audience, furthering the country's standing in the international academic community. While challenges remain, the overall impact of UGC Care Journals on India's research landscape is undeniably positive.
Publishing your research as a Ph.D. student is a challenging but rewarding endeavor. It not only disseminates your findings to the broader scientific community but also plays a crucial role in establishing your academic career. By starting early, selecting the right outlets, and continuously improving your research and writing skills, you can navigate the complex world of Ph.D. research publications with confidence and success. Remember that perseverance and a commitment to excellence are key to making a lasting impact in your chosen field.
Thomson Reuters indexing, now managed by Clarivate Analytics, has become an integral part of the academic publishing landscape. For journals, being indexed can bring increased visibility, credibility, and recognition. However, it's essential to recognize the limitations and criticisms associated with this system. As the landscape of scholarly publishing continues to evolve, researchers and institutions must consider various factors when evaluating the significance of Thomson Reuters indexing for their work.
Pharmaceutical journals are essential components of the medical and healthcare landscape. They serve as vehicles for the sharing of knowledge, the validation of research, and the advancement of medical science. These journals play a crucial role in shaping the future of healthcare by facilitating collaboration, innovation, and the dissemination of life-saving information. As technology continues to evolve, pharmaceutical journals remain steadfast in their commitment to improving the well-being of individuals and communities around the world.
Peer-reviewed journals are the backbone of scientific communication and the pursuit of knowledge. They provide a systematic and rigorous process for evaluating and disseminating research, ensuring that the information presented is accurate, reliable, and worthy of the scientific community's trust. Researchers, academics, and readers alike rely on peer-reviewed journals to stay informed, make informed decisions, and contribute to the advancement of their respective fields.
the ranking and importance of journals can vary significantly depending on your specific field of study or interest. It's crucial to consult with academic advisors, professors, and experts in your field to identify the most relevant and respected journals for your research. Additionally, you should always check the latest impact factors and rankings for the most up-to-date information.
Earning a Diploma in Digital Marketing provides a comprehensive understanding of the core principles and concepts of digital marketing. This includes topics like search engine optimization (SEO), social media marketing, email marketing, content marketing, and pay-per-click (PPC) advertising. A solid foundation in these areas is essential for anyone looking to excel in digital marketing.
Research publications are the lifeblood of academia. They are how scholars communicate their discoveries, insights, and innovations to the wider scientific community. Your Ph.D. research publications will be a critical factor in your academic and professional success. They showcase your expertise, build your reputation, and open doors to opportunities in academia and industry
Selecting the best digital marketing course is a crucial step towards building a successful career in the digital marketing field. By defining your goals, considering accreditation, evaluating course content, and assessing other factors like instructors and flexibility, you can make an informed choice that aligns with your aspirations. Keep in mind that continuous learning is key to staying ahead in the ever-changing world of digital marketing.
Learn about Inspect Edge, the leading platform for efficient inspections, featuring the advanced NSPIRE Inspection Application for seamless property assessments. Discover how the NSPIRE Inspection Application by Inspect Edge revolutionizes property inspections with advanced features and seamless integration.
Experience the breathtaking beauty of a Waikiki sunset aboard the MAITAI Catamaran. Sail along the stunning coastline as the sun dips below the horizon, casting vibrant hues across the sky. Enjoy the gentle ocean breeze, refreshing drinks, and a relaxed atmosphere. This unforgettable voyage offers panoramic views of Diamond Head and the Waikiki skyline, making it the perfect way to end your day in paradise. Join us for a memorable sunset cruise you won't forget. Please visit our website: https://www.maitaicatamaran.net/ and call us at 808-922-5665 for additional information.
Comprehensive Water Damage Restoration Serviceskleenupdisaster
Β
Find out how Disaster Kleenup's professional water damage restoration services can quickly and efficiently restore your property. Find more about our advanced techniques and quick action plans. Visit here: https://iddk.com/disaster-cleanup-services/flood-damage/
Elevate Your Brand with Digital Marketing for Fashion IndustryMatebiz Pvt. Ltd
Β
Matebiz Pvt. Ltd. specializes in providing cutting-edge digital marketing for Fashion Industry. Our comprehensive strategies ensure that your brand stands out in the competitive fashion landscape. From targeted social media campaigns to search engine optimization tailored for fashion keywords, we cover it all. With a deep understanding of industry trends and consumer behavior, we craft compelling content and engaging visuals to enhance your online presence. Trust Matebiz Pvt. Ltd. to elevate your fashion brand through strategic digital marketing initiatives.
Looking for the Reliable Logistics Solutions in India? Discover unparalleled efficiency and reliability with our top-rated logistics services. We specialize in streamlining supply chains, ensuring timely deliveries, and providing cutting-edge tracking solutions. Our platform caters to businesses of all sizes, offering customizable logistics solutions to meet your unique needs. With a focus on innovation and customer satisfaction, we are your trusted partner in navigating the complexities of logistics in India. Choose us for seamless, cost-effective, and scalable logistics solutions. Experience the best in Indian logistics with our expert team by your side.
Colors of Wall Paint and Their Mentally Properties.pptxBrendon Jonathan
Β
Discover how different wall paint colors can influence your mood and mental well-being. Learn the psychological effects of colors and find the perfect hue for every room in your home.
Get your dream bridal look with top North Indian makeup artist - Pallavi KadalePallavi Makeup Artist
Β
Achieve your dream wedding day look with renowned North Indian bridal makeup artist, Pallavi Kadale. With years of experience, her expert techniques and skills will leave you looking flawless and radiant. Book today for your perfect bridal makeover.
Courier & Package Tracking System Actually WorksIn Targos
Β
In the world of modern logistics, the courier and package tracking system stands as a pivotal tool, offering transparency and efficiency throughout the shipping process. Letβs delve into the intricacies of courier and package tracking systems and explore how INTARGOS plays a key role in this domain.
BEst VASHIKARAN SPECIALIST 9463629203 in UK Baba ji Love Marriage problem sol...gitapress3
Β
TOP No AsTro 1 black magic SpecialiSt UK baba ji +91-9463629203 VashIkaRan blaCk maGiC specialist in uSA Uk England Luxembourg CanAdA America BEst VASHIKARAN SPECIALIST 9463629203 in UK Baba ji Love Marriage problem solution Uk USA america england LonDon Divorce problem solution astroloGer
Earth moving equipment refers to heavy-duty machines used in construction, mining, agriculture, and other industries to move large amounts of earth, soil, and other materials. These machines include excavators, bulldozers, loaders, and backhoes, which are essential for tasks such as digging, grading, and leveling land.
Earthmovers is a leading brand in the industry, known for providing reliable and high-performance earth moving equipment. Their machines are designed to handle the toughest jobs with efficiency and precision, ensuring optimal productivity on any project.
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...RNayak3
Β
Explore how a risk-based approach to Enhanced Due Diligence can deliver effective Anti-Money Laundering (AML) compliance and monitoring in banking and financial services.
Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia ...gitapress3
Β
Top Best Astrologer +91-9463629203 LoVe Problem SolUtion specialist In InDia Love ProBlem asTroloGer +91-9463629203 love problem solution astrologer
best love problem solution astrologer
online love problem solution astrologer
love problem solution astrologer in india
love problem solution astrologer in kolkata
love problem solution astrologer near me
love problem solution astrologer in ludhiana
love problem solution astrologer acharya ji
love problem solution astrologer in delhi
love problem solution astrologer amritsar
astrologer love problem solution
astrologer for love problem
astrology love problem solution
love solution astrologer
love problem solution specialist astrologer
love problem solution by astrologer
astrology love problem solution baba ji
love problem solve astrologer
love problem solution usa
love problem solution expert astrologer
astrologer for love marriage problem solution
love problem solution astrologer in mumbai
love problem solution muslim astrologer
love marriage specialist astrologer problem solution
famous love astrologer
love problem solution astrologer specialist
love problem solution astrologer baba ji
Don't Wait Until It's Too Late! 5-Signs Your Garage Door Needs ReplacingCR Garage Doors
Β
This infographic unveils the 5 telltale signs your garage door needs a replacement. Avoid costly repairs and upgrade to a modern, secure, and silent entryway. Visit our website for more information about garage door replacement.
Website-> https://cr-garagedoors.com/
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier. Come to our Trophy Shop today and check out all our variety of Trophies available. We have the widest range of Trophies in Malaysia. Our team is always ready to greet your needs and discuss with you on your custom Trophy for your event. Rest assured, you will be with the best Trophy Supplier in Malaysia. The official Trophy Malaysia. Thank you for your support.
Delightful Finds: Unveiling the Power of Gifts Under 100JoyTree Global
Β
Stretch your budget and spread joy! This guide explores the world of gifts under 100, proving thoughtful gestures don't require a hefty price tag. Discover unique and practical options for birthdays, holidays, or simply showing someone you care. Find inspiration for every occasion within your budget!
Are Seamless Gutters Worth It? Explore nowacadiaborton
Β
Seamless gutters live up to their name: they are uncomplicated gutters that flow freely without needless joins or seams. They do have seams, but they are limited to the downspouts and corners. Painted metal is used to make seamless gutters. If you're wondering why seamless gutters could be preferable to traditional ones, keep reading this ppt for the advantages.
DOJO Training Center - Empowering Workforce ExcellenceHimanshu
Β
The document delves into DOJO training, an immersive offline training concept designed to educate both new hires and existing staff. This method follows an organized eight-step process within a simulated work setting. The steps encompass safety protocols, behavioral coaching, product familiarity, production guidelines, and procedural understanding. Trainees acquire skills through hands-on simulations and rehearsal prior to transitioning to actual shop floor duties under supervision. The primary aim is to minimize accidents and defects by ensuring employees undergo comprehensive training, preparing them effectively for their job roles.
Unlock the potential of Ruby on Rails for your next project. Hire RoR Developers from Semiosis for scalable and efficient web solutions. With expertise in RoR development, our team crafts robust applications to meet your business goals. Dial +1 9177322215 to collaborate with us and elevate your online presence.
1. CTMJ | traditionalmedicinejournals.com Chinese Traditional Medicine Journal | 2023 | Vol 6 |Issue 2
Chinese Traditional Medical Journal
A Fog-centric secure cloud storage scheme
PU Wenyuan, ZHOU Chunxiang
Department of Biology, Guangβ²anmen Hospital,
China Academy of Chinese Medical Sciences ,
Abstract:
The ever-increasing computing and storage capacity of these devices need a cost-effective and environmentally
friendly method of storing data. However, there are various hazards and constraints associated with cloud
computing, such as those relating to data access control and security as well as efficiency concerns as well as
bandwidth. Checking the integrity of data stored in many cloud services using a unique model: CPABE, IDP
(identification principally based proxy). A variety of well-known symmetric algorithms, such as Identity-based
cryptography and Proxy public key cryptography, were put to the test in real time on a variety of handheld devices
in order to determine which cryptographic approach could provide the most efficient and reliable safety mechanism
for recoring data. Fog-centric comfort is the focus of its design. Data is protected from illegal access, alteration, and
deletion by storing it in the cloud. The suggested technique uses a fresh new approach Xor Combination to disguise
data to prevent unauthorised access. As an additional safeguard against fraudulent data retrieval and data loss, Block
Management outsources the results of Xor Combination. resilience of the proposed strategy. Tests show that the
suggested approach is superior in terms of processing time compared to other cutting-edge alternatives.
Keywords: Anonymity-based cryptography, Proxy public key cryptographic-ABE (fog server), Xor-Combination
(CRH), privacy.
Introduction:
There are many advantages of cloud
computing, but one of them is that it
eliminates the need for a customer to
manage his or her own computer
infrastructure. It refers to the majority of
time spent painting server farms that may
be accessed by a large number of clients. It
is common for large organisations to have
capacity distributed throughout certain
locations by focused personnel. If you have
a close relationship with the buyer, you will
almost certainly be allocated a facet
employee.
Some mists can only be found in a single
affiliation venture, while others may be
found in the public cloud of several
institutions. In order to achieve scalability
and reliability, distributed computing
2. CTMJ | traditionalmedicinejournals.com Chinese Traditional Medicine Journal | 2023 | Vol 6 |Issue 2
depends on the sharing of property.
Because of dispersed computing, public and
half-breed organisations may avoid or limit
upfront IT foundation costs. Defendants
also guarantee that allotted computing
allows companies to get their programmes
ready for action faster, with stepped
forward reasonability and less protection,
and that IT companies can all more quickly
change assets to meet fluctuating and
capricious need, giving the burst processing
capacity: high registering strength at
specific times of peak interest.
The expanding amount of data necessitates
a more extensive use of distributed
computing and distributed storage, both of
which have several advantages. With the
rise of company transmission capabilities,
the volume of client's statistics has
increased significantly. Every time I go on
to the internet, there's a lot going
on.customer has a designated parking space
that spans from GBs to TBs. The nearby
ability fails to meet this substantial
stockpiling requirement by itself.
Individuals, above all, have a natural need
to be able to access their data at any time.
As a result, people are looking for
innovative ways to preserve their
information. A rising number of customers
are shifting to cloud storage because of the
ground-breaking hoarding limitation. They
even want to keep their personal
information in the cloud. Using a
commercial company public cloud
employee to store documents may become a
common practise in the future. Several
companies, including as Dropbox, Google
Drive, iCloud, and Baidu cloud, are now
offering a variety of capabilities services to
their customers after being spurred by
reality. Even yet, the advantages of
dispersed storage are accompanied with a
slew of digital hazards. Security is a major
concern, but there are many others, such as
a lack of data, spiteful change, and worker
failure. For example, in 2013, programmers
leaked three billion records from Yahoo,
and in 2014, Apple's iCloud spilled private
photos of Hollywood stars. In 2016,
Dropbox data security was breached, and in
2017, Yahoo's three billion records were
leaked again, this time by programmers.
We recommend a method known as Xor
Combination, which divides the data into
squares, uses Xor hobby to join several
squares, and then adapts the resulting
squares to various cloud/mist persons. In
order to prevent any cloud worker from
improving a particular set of data, the
suggested method is designed. Each block
of data is stored by a cloud employee
selected by management. Defense and
recovery of information are aided by Xor
and Block management, respectively.
There are a lot of different sources, even
though certain squares are missing.
Collision Resolving, a good hashing
feature, is also recommended. A hashing
interest that is reliant on a standard hash
computation that is resistant to a crash in
hashing and shows the importance of
3. CTMJ | traditionalmedicinejournals.com Chinese Traditional Medicine Journal | 2023 | Vol 6 |Issue 2
security.
Relative Study:
1. T. Wang et al., "Fog-based storage technologyto fight
with cyber threat,β:
Disbursed computing has had a significant impact on everyone's
understanding of base systems, data transfer and specialised
aspects. When it comes to computationally important services,
they are increasingly being moved to the cloud and accessed
through a customer's mobile phone thanks to the advent of both
mobile firms and dispersed computing. However, digital threats
are also becoming more advanced and sophisticated, putting the
privacy of consumers' personal information at risk. Customers
lose control of their data and are exposed to virtual hazards such
as information loss and vengeful manipulation while using
standard support mode, which stores client statistics entirely in
the cloud.
Second, "A Three-Layer Privacy Preserving Cloud Storage
Scheme Based on Computational Intelligence in Fog
Computing,": by T. Wang,
Three-layer stockpiling devices based on mist figures are
recommended. The suggested structure is capable of both
ensuring the safety of data and making the most widespread
storage possible. In addition, the Hash-Solomon code
computation is designed to separate statistics into several
components... As soon as that happens, we may place a touch
piece of information in a nearby gadget and spray an employee
to ensure their safety. In addition, in light of This calculation is
able to deal with the flow amount in cloud, mist, and near-by
devices one at a time, thanks to the power of computing. The
feasibility of our strategy has been confirmed by hypothetical
security investigation and check assessment, which is a
significant improvement over the present allocated garage
conspire.
By mixing cloud and fog computing, "Secure data storage and
searching for industrial IoT":
We examine the emerging issues in the IoT areas of information
handling, safe data storage, effective data healing, and dynamic
record collection. At that time, we'll devise a flexible financial
framework that incorporates cloud computing and distributed
computing to address the challenges raised above. Threshold
workers or cloud workers process and store gathered data in
accordance with the time inaction requirements. Brink workers
first analyse the raw data, then apply and store time-sensitive
information locally, which is done within a few minutes.
Implementation:
With the only goal of ensuring cloud data, we suggested a cloud
data storage approach based on haze modelling. The purchaser's
stability is presumed by the conspirators in the form of a mist
employee who has been given some processing, stockpiling, and
communication skills. Using appropriate verification, access
control, and interruption reputation, haze registering may be
done reliably. Having a haze system in close proximity to the
consumer enhances its credibility as a covered location.
Registration framework. There are several methods
recommended for use in addition to haze processing, including
their own Xor - Combination, Block - Block
Management and Collision Resistant Hashing (CRH) to
safeguard security, assure recoverability, and to choose records
adjustment for the information sent inside the distributed garage.
Client, mist worker, and cloud employee make up our
framework paradigm. These chemicals have varying levels of
trustworthiness. Preparation for the future includes thinking
about the components' constant quality:
Data is owned by the user. This paper's primary goal is to
protect, recover from disasters, and relocate customer data in the
event of an emergency.
Fog Server: Patrons may rely on a Fog employee. Mist
employee and his information are relied upon by the client.
Heave employees' dependability is bolstered by the proximity of
haze devices to the consumer, full-life genuine security,
authentic validation and cosy communication.
Server in the cloud: A cloud employee is seen to be sincere and
enquisitive. However, cloud workers are expected to investigate
their clients' data in accordance with their service level
agreement. Cloud employees, on the other hand, may claim to be
acceptable regardless of how close they get to being able to
perform.
Two tuples are returned as output: a block tag and a fixed length
block for each tuple. In each set, there are a certain number of
tuples to be found. Splits input into numbers of data blocks with
a predetermined size upon receiving padded data. Code called
Xor Combination separates and combines any number of
successive blocks in order to maintain privacy and allow for data
recovery if anything goes wrong.
Input: Data as block of bytes.
Output: Two sets of tuples.
Procedure: Receive data that has been padded;
Set2 ; / Set the value to null.
Initialize Set3 with null.
the n-th term is |data| |L|
4. CTMJ | traditionalmedicinejournals.com Chinese Traditional Medicine Journal | 2023 | Vol 6 |Issue 2
If you want to know how many percentage points you have to
add to get to the next percentage point, you need to know how
many percentage points you have to add to go to the next
percentage point.
Assume that Set3 U is equal to the product of Set2 U and Set3
U.
B((i percent n)+2) percent n >; End of;
Input Set2 andSet3 and return;
End Procedure;
ο· CRH.ver
ification
Input:
πππππππππππ
ππ₯π‘Output:
true or false.
Procedure:
Get the appropriate R, OriginalDigest, and RandomDigest
from the database.
VerifyDigest = hash (VerifiableText) is computed.
And π πππππππππππ¦π·ππππ π‘ = πππ π (π ||
ππππππππππππ₯π‘);
Assuming that (OriginalDigest == VerifiableDigest and that
A random digest is equal to a verifiable random digest
ReturnR, the originalDigest, and the randomDigest;
End procedure;
Collision Resolving Hashing
Resolving a Collision Regardless of whether or not there is an
effect, hashing is an efficient method for determining the
integrity of a data set. The hash evaluation of Original content
is protected to differentiate any toxic substitute, and the hash
digest of Modified content is identical to that of the original
text. CRH can still distinguish between the original and
modified versions of a text notwithstanding a crash. Using
random condensation units and irregular values, you will
increase the risk of area. It is necessary for us to use random
evaluation and a single set of non-smooth numbers given the
popular crash safe hash work.
RESULTS AND DISCUSSIONS:
Admin Login Page
5. CTMJ | traditionalmedicinejournals.com Chinese Traditional Medicine Journal | 2023 | Vol 6 |Issue 2
Data User Registration Page:
]
View file request:
View File:
Admin login page:
Cloud server and Fog server:
File Upload:
CONCLUSION:
The storage service is excellent, but customers are entrusting
the cloud storage server with their private information.
6. CTMJ | traditionalmedicinejournals.com Chinese Traditional Medicine Journal | 2023 | Vol 6 |Issue 2
Complete access to and control of the cloud server
As soon as statistics are outsourced to the cloud, people's
information may be manipulated. It has the ability to look up
and investigate a person's history. Information is also
vulnerable to several cyberattacks, and cloud hardware or
software failure might entirely wipe out the data on the cloud.
A three-layer fog-based structure is an appropriate solution
for a secure cloud storage facility that can withstand cyber
assaults. Preventive sports are performed on a trusted fog
server, while the real data is sent to several cloud servers in a
twisted architecture. This research recommends Xor as a
preventative strategy s.
Combination, CRH, and Block Management strategies. Xor
Combination splits and mixes a dataset into blocks of fixed
period length in order to make it ready for outsourcing.
REFERENCES:
[1] A Fog-centric Secure Cloud Storage
Scheme by M A Manazir Ahsan, Ihsan Ali,
and Muhammad Imran was published in
IEEE Transactions on Sustainable
Computing on May 6, 2019, pp. 2377-3782.
[2] [2] "A Three-Layer Privacy Preserving
Cloud Storage Scheme Based on
Computational Intelligence in Fog
Computing," IEEE Transactions on
Emerging Topics in Computational
Intelligence, vol. 2, no. 1, 2018, pp. 3-12.
[3] S. Basu and his colleagues, "Cloud
computing security issues and solutions,"
appeared in Computing and Communication
Workshop and Conference (CCWC), the
2018 IEEE 8th Annual, 2018. pp. 347β356:
IEEE.
[4] Future Generation Computer Systems,
"Fog-based storage technique to combat
cyber danger," 2018.
[5] IEEE Transactions on Dependable and
Secure Computing, 2017. [5] Yang, X. Liu,
and R. Deng, "Multi-user Multi-Keyword
Rank Search over Encrypted Data in
Arbitrary Language," 2017.
[6] IEEE, "The fog computing paradigm:
Scenarios and security challenges," 2014
Federated Conference on Computer Science
and Information Systems (FedCSIS), pp. 1-
8, I. Stojmenovic and S.
[7] Arora, Parashar, and Transforming,
"Secure user data in cloud computing
utilising e-ncryption algorithms,"
International journal of engineering
research and applications, vol. 3, no. 4, pp.
1922-1926, 2013.
[8] Cloud computing security: a review by
David Zissis and Dimitris Lekkas, Future
Generation computer systems, volume 28,
number 3, pages 583-592, 2012.
[9] "Privacy preserving public auditing for
data storage security in cloud computing,"
by C. Wang, Q. Wang, K. Ren, and W. Lou,
appeared in Infocom, 2010 Proceedings
IEEE (pp. 1-9). Ieee.com.
[10] Distributed computing systems
workshops (ICDCSW), 2010 IEEE 30th
International Conference on, pp. 26-31:
IEEE, 2010.