This document discusses a proposed system for secure multi-cloud data storage using cryptographic techniques. The key aspects are:
1) The system splits user files into multiple encrypted chunks and stores each chunk in different private or public clouds. This prevents any single entity from accessing the full file.
2) Encryption is performed on the file chunks before storage using a symmetric encryption algorithm (AES is proposed) with an encryption key only known to the user.
3) During access, the encrypted chunks are retrieved, decrypted and merged to reconstruct the original file.
Providing Secure Cloud for College Campusvivatechijri
In colleges data stored on the server can be access by any college staff, student or professor. Data is
very important and should not be altered or accessed without permission of its owner. But in these type of medium
scale organizations server can be access by anyone. A better approach to maintain the data security and
sustainable storage is cloud. Cloud provides user management for authentication and authorized access of stored
data. Since data is upload in cloud through network therefore its security during this phase is very important.
For this, encryption algorithms can be used to protect it from hacker. It provides efficient way to carryout
operations such as uploading and downloading data. An efficient use of storage should be a primary concern for
which data deduplication technique can be applied. Using this technique uploading of duplicate files can be
avoided.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
In cloud computing outsourcing group resource among cloud users is a major challenge, so cloud computing provides a low-cost and well-organized solution. Due to frequent change of membership, sharing data in a multi-owner manner to an untrusted cloud is still its challenging issue. In this paper we proposed a secure multi-owner data sharing scheme for dynamic group in public cloud. By providing AES encryption with convergent key while uploading the data, any cloud user can securely share data with others. Meanwhile, the storage overhead and encryption computation cost of the scheme are independent with the number of revoked users. In addition, I analyze the security of this scheme with rigorous proofs. One-Time Password is one of the easiest and most popular forms of authentication that can be used for securing access to accounts. One-Time Passwords are often referred to as secure and stronger forms of authentication in multi-owner manner. Extensive security and performance analysis shows that our proposed scheme is highly efficient and satisfies the security requirements for public cloud based secure group sharing.
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Providing Secure Cloud for College Campusvivatechijri
In colleges data stored on the server can be access by any college staff, student or professor. Data is
very important and should not be altered or accessed without permission of its owner. But in these type of medium
scale organizations server can be access by anyone. A better approach to maintain the data security and
sustainable storage is cloud. Cloud provides user management for authentication and authorized access of stored
data. Since data is upload in cloud through network therefore its security during this phase is very important.
For this, encryption algorithms can be used to protect it from hacker. It provides efficient way to carryout
operations such as uploading and downloading data. An efficient use of storage should be a primary concern for
which data deduplication technique can be applied. Using this technique uploading of duplicate files can be
avoided.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
In cloud computing outsourcing group resource among cloud users is a major challenge, so cloud computing provides a low-cost and well-organized solution. Due to frequent change of membership, sharing data in a multi-owner manner to an untrusted cloud is still its challenging issue. In this paper we proposed a secure multi-owner data sharing scheme for dynamic group in public cloud. By providing AES encryption with convergent key while uploading the data, any cloud user can securely share data with others. Meanwhile, the storage overhead and encryption computation cost of the scheme are independent with the number of revoked users. In addition, I analyze the security of this scheme with rigorous proofs. One-Time Password is one of the easiest and most popular forms of authentication that can be used for securing access to accounts. One-Time Passwords are often referred to as secure and stronger forms of authentication in multi-owner manner. Extensive security and performance analysis shows that our proposed scheme is highly efficient and satisfies the security requirements for public cloud based secure group sharing.
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A secure anti collusion data sharing scheme for dynamic groups in the cloud1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloudijsrd.com
The data is stored in the cloud. Storing data should be risky. Cloud provider should be trustful because the data is confidentential. The Group manager keeps the record of group members. The key distribution is done to the group of each department. The Group members can access the stored data from cloud. The encryption-decryption technique is used to store the data. Any cloud user can anonymously share data with others by providing group signature and dynamic broadcast encryption techniques. When new member joined in the group, new granted users can directly decrypt data files uploaded without contacting with data owners. Proposing a new model for Sharing Secure Data in the Cloud for the Multiuser Group.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud.
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
Unit 3 -Data storage and cloud computingMonishaNehkal
Data storage
Cloud storage
Cloud storage from LANs to WANs
Cloud computing services
Cloud computing at work
File system
Data management
Management services
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing
Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated
infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application
Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage,
Account, Service, Traffic Hijacking and Unknown Risk Profile
A secure anti collusion data sharing scheme for dynamic groups in the cloudKamal Spring
Benefited from cloud computing, users can achieve an effective and economical approach for data sharing among group members in the cloud with the characters of low maintenance and little management cost. Meanwhile, we must provide security guarantees for the sharing data files since they are outsourced. Unfortunately, because of the frequent change of the membership, sharing data while providing privacy-preserving is still a challenging issue, especially for an untrusted cloud due to the collusion attack. Moreover, for existing schemes, the security of key distribution is based on the secure communication channel, however, to have such channel is a strong assumption and is difficult for practice. In this paper, we propose a secure data sharing scheme for dynamic members. Firstly, we propose a secure way for key distribution without any secure communication channels, and the users can securely obtain their private keys from group manager. Secondly, our scheme can achieve fine-grained access control, any user in the group can use the source in the cloud and revoked users cannot access the cloud again after they are revoked. Thirdly, we can protect the scheme from collusion attack, which means that revoked users cannot get the original data file even if they conspire with the untrusted cloud. In our approach, by leveraging polynomial function, we can achieve a secure user revocation scheme. Finally, our scheme can achieve fine efficiency, which means previous users need not to update their private keys for the situation either a new user joins in the group or a user is revoked from the group.
High security mechanism: Fragmentation and replication in the cloud with auto...CSITiaesprime
Cloud computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of files is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology.
A secure anti collusion data sharing scheme for dynamic groups in the cloud1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
SMONA: Secure Multi Owner Data Sharing for Dynamic Groups in the Cloudijsrd.com
The data is stored in the cloud. Storing data should be risky. Cloud provider should be trustful because the data is confidentential. The Group manager keeps the record of group members. The key distribution is done to the group of each department. The Group members can access the stored data from cloud. The encryption-decryption technique is used to store the data. Any cloud user can anonymously share data with others by providing group signature and dynamic broadcast encryption techniques. When new member joined in the group, new granted users can directly decrypt data files uploaded without contacting with data owners. Proposing a new model for Sharing Secure Data in the Cloud for the Multiuser Group.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud.
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
Unit 3 -Data storage and cloud computingMonishaNehkal
Data storage
Cloud storage
Cloud storage from LANs to WANs
Cloud computing services
Cloud computing at work
File system
Data management
Management services
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing
Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated
infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application
Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage,
Account, Service, Traffic Hijacking and Unknown Risk Profile
A secure anti collusion data sharing scheme for dynamic groups in the cloudKamal Spring
Benefited from cloud computing, users can achieve an effective and economical approach for data sharing among group members in the cloud with the characters of low maintenance and little management cost. Meanwhile, we must provide security guarantees for the sharing data files since they are outsourced. Unfortunately, because of the frequent change of the membership, sharing data while providing privacy-preserving is still a challenging issue, especially for an untrusted cloud due to the collusion attack. Moreover, for existing schemes, the security of key distribution is based on the secure communication channel, however, to have such channel is a strong assumption and is difficult for practice. In this paper, we propose a secure data sharing scheme for dynamic members. Firstly, we propose a secure way for key distribution without any secure communication channels, and the users can securely obtain their private keys from group manager. Secondly, our scheme can achieve fine-grained access control, any user in the group can use the source in the cloud and revoked users cannot access the cloud again after they are revoked. Thirdly, we can protect the scheme from collusion attack, which means that revoked users cannot get the original data file even if they conspire with the untrusted cloud. In our approach, by leveraging polynomial function, we can achieve a secure user revocation scheme. Finally, our scheme can achieve fine efficiency, which means previous users need not to update their private keys for the situation either a new user joins in the group or a user is revoked from the group.
High security mechanism: Fragmentation and replication in the cloud with auto...CSITiaesprime
Cloud computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of files is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud.
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
Cloud works as an online storage servers and provides long term storage services over the internet. It is like a third party in whom we can store a data so they need data confidentiality, robustness and functionality. Encryption and encoding methods are used to solve such problems. After that divide proxy re-encryption scheme and integrating it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure, robust data storage and retrieval but also lets the user forward his data to another user without retrieving the data. A concept of backup in same server allows users to retrieve failure data successfully in the storage server and also forward to another user without retrieving the data back. This is an attempt to provide light-weight approach which protects data access in distributed storage servers. User can implement all important concept i.e. Confidentiality for security, Robustness for healthy data, Reliability for flexible data, Availability for compulsory data will be achieved to another user which is store in cloud and easily overcome problem of “Securely data forwarding and maintaining, reliability of data in cloud computing “using different type of Methodology and Technology.
Dynamic Resource Allocation and Data Security for CloudAM Publications
Cloud computing is the next generation of IT organization. Cloud computing moves the software and
databases to the large centres where the management of services and data may not be fully trusted. In this system, we
focus on cloud data storage security, which has been an important aspect of quality of services. To ensure the
correctness of user’s data in the cloud, we propose an effective scheme with Advanced Encryption Standard and MD5
algorithm. Extensive security and performance analysis shows that the proposed scheme is highly efficient. In
proposed work we have developed efficient parallel data processing in clouds and present our research project for
parallel security. Parallel security is the data processing framework to explicitly exploit the dynamic storage along with
data security. We have proposed a strong, formal model for data security on cloud and corruption detection.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
A novel cloud storage system with support of sensitive data applicationijmnct
Most users are willing to store their data in the c
loud storage system and use many facilities of clou
d. But
their sensitive data applications faces with potent
ial serious security threats. In this paper, securi
ty
requirements of sensitive data application in the c
loud are analyzed and improved structure for the ty
pical
cloud storage system architecture is proposed. The
hardware USB-Key is used in the proposed architectu
re
for purpose of enhancing security of user identity
and interaction security between the users and the
cloud
storage system. Moreover, drawn from the idea of da
ta active protection, a data security container is
introduced in the system to enhance the security of
the data transmission process; by encapsulating th
e
encrypted data, increasing appropriate access contr
ol and data management functions. The static data
blocks are replaced with a dynamic executable data
security container. Then, an enhanced security
architecture for software of cloud storage terminal
is proposed for more adaptation with the user's sp
ecific
requirements, and its functions and components can
be customizable. Moreover, the proposed architectur
e
have capability of detecting whether the execution
environment is according with the pre-defined
environment requirements.
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less
secure because data remain under a single data mart. This can lead to data loss due to different causes like
hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud
provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and
outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious
employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat
concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on
biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption,
replication and storage of data
Improving Efficiency of Security in Multi-CloudIJTET Journal
Abstract--Due to risk in service availability failure and the possibilities of malicious insiders in the single cloud, a movement towards “Multi-clouds” has emerged recently. In general a multi-cloud security system there is a possibility for third party to access the user files. Ensuring security in this stage has become tedious since, most of the activities are done in network. In this paper, an enhanced security methodology has been introduced in order to make the data stored in cloud more secure. Duple authentication process introduced in this concept defends malicious insiders and shields the private data. Various disadvantages in traditional systems like unauthorized access, hacking have been overcome in this proposed system and a comparison made with the traditional systems in terms of performance and computational time have shown better results.
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
cloud computing is also facing many challenges that, if not well resolved, may impede its fast growth. Data security, as it exists in many other applications, is among these challenges that would raise great concerns from users when they store sensitive information on cloud servers. These concerns originate from the fact that cloud servers are usually operated by commercial providers which are very likely to be outside of the trusted domain of the users. Data confidential against cloud servers is hence frequently desired when users outsource data for storage in the cloud.
Multi-part Dynamic Key Generation For Secure Data EncryptionCSCJournals
Storage of user or application-generated user-specific private, confidential data on a third party storage provider comes with its own set of challenges. Although such data is usually encrypted while in transit, securely storing such data at rest presents unique security challenges. The first challenge is the generation of encryption keys to implement the desired threat containment. The second challenge is secure storage and management of these keys. This can be accomplished in several ways. A naive approach can be to trust the boundaries of a secure network and store the keys within these bounds in plain text. A more sophisticated method can be devised to calculate or infer the encryption key without explicitly storing it. This paper focuses on the latter approach. Additionally, the paper also describes the implementation of a system that in addition to exposing a set of REST APIs for secure CRUD operations also provides a means for sharing the data among specific users.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
block diagram and signal flow graph representation
Paper id 712019116
1. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
484
Multi-Cloud Secure Data storage using Cryptographic
Techniques
Manoj V. Bramhe, Dr. Milind V. Sarode, Dr. Meenakshi S. Arya
Phd Research Scholar, Professor and Head, Associate Prof. & Head
Department of Computer Science & Engineering, Department of Computer Engineering ,
G.H. Raisoni College of Engineering, Nagpur
Government Polytechnic,
Yavatmal
G.H. Raisoni College of Engineering, Nagpur
manoj_bramhe@yahoo.com
Abstract: Cloud computing is becoming popular paradigm for storage and computing purpose for big and small organizations.
Even though cloud supports pay-as-you-go model with saving on infrastructure, hardware and software cost of organizations it
has disadvantages like various vulnerabilities and threats to user’s information . File access mechanism is an technique to
guarantee the file safety in the cloud. On the other hand, due to file farm out and untrusted cloud servers the file access
mechanism develops security concerns in cloud storage systems. Malicious system administrator at cloud storage is becoming
most difficult attack to stop as he has full access to the user data. In proposed system, we have implemented secure cloud
storage for multi-cloud environment where instead of keeping user's data in single cloud environment it can be fragmented into
different chunks and these chunks can be encrypted and stored in multiple cloud along with metadata which can be used during
access of the files.
Keywords: Multi-Clouds, Cryptography, FTP
1. INTRODUCTION
Cloud computing provides on-demand and pay -per-usage
access to scalable resources over the Internet. It saves
operational and infrastructure based expenses for
organizations.
Cloud computing as defined by NIST model is classified
into three types of services as Software-as-a-Service ,
Platform-as-a-Service, and Infrastructure -as-a-Service.
Cloud models has four categories as Private, Public,
Hybrid and Community depending upon the nature of
storage services. Public cloud is maintained by third party
service provider which distributes their resources among
clients and charge them as per their usage . Private cloud is
used by big organizations for storing security critical
information at private hosting place . Hybrid cloud uses
both public and private cloud resources for data storage
where general information is stored in public cloud
whereas critical information is maintained in private cloud.
Community cloud is used for specific purpose like
education, insurance, healthcare services. Organizations
hesitate to put their critical information on public cloud
storage as most of them either maintains users data in plain
text format or they may used encryption techniques on
their own transparent to the user. This encryption
algorithm and security keys are maintained by cloud
system administrators who can use them for malicious
activity so there is need of system where data must be
uploaded on cloud in secured manner and user must
maintain critical security information with them.
Our proposed system will provide multi-cloud
based secured storage where user will split the data into
multiple parts, storing each one of them on various private/
public cloud hence none of the entity will ever get
complete set of the data at any time , improving trust and
reliability of cloud services. Security of data in our system
is improved as user will encrypt the data before uploading
and will have all security related information stored in
local application server thus removing the possibilities of
system administrator attacks.
2. RELATED WORK
Research was carried on cloud storage system and
various defense methodologies were proposed for handling
cloud threats and vulnerabilities. NIST has discussed cloud
security issues and challenges in their draft of cloud
computing synopsis and recommendations [1]. Cloud
security alliance has provided detailed guidance for focus
areas in cloud as mentioned in [2]. They have discussed
various security domains like identity management,
encryption & key management, application level security
for data security out of which encryption and identity
management is widely by researchers.
Most of the cloud storage research is carried out
for single cloud environment which stores complete set of
data at one place thus creating vulnerabilities like system
administrator attack, data integrity issues, data losses due
to vendor lock-in problems so further solution was
provided for multi-cloud environment as mentioned in [4]
where performance is improved by distributing trust, and
2. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
485
security among various clouds. They have discussed many
multi-cloud based systems like RACS, DepSky, HAIL
with their advantages and disadvantages. Distributed file
system (DFS) is used by all such systems to share and store
users files in distributed network. Authors have discussed
popular DFS in [5] and [6]. Paval Bozh in [7] had
discussed reliability and performance improvement in DFS
by distributing data and metadata parts of file separately on
the server. RACS system discussed in [8] is based on
creating redundant array of cloud storage which focused
only on the economic failures and of the data. Our system
is similar to DepSky model[10] where confidentiality,
integrity cloud outage whereas HAIL system [9] works for
maintaining integrity and availability parameters for
maintaining security and privacy will be implemented.
Authors have discussed multi cloud based system in [14]
and [15] mainly for cost effectiveness and failure
management.
3. PROPOSED METHODOLOGY
System Architecture:
Architecture of our proposed system is discussed below.
User application layer receives and transfer user
commands to API of our distributed file system which will
communicate to system modules through DFS methods.
Encryption module will be used for encryption and
decryption of the data for maintaining the security. De-
construction module is used for splitting of files during
writing data to multi-clouds whereas merging of files is
done during reading the data from the clouds. File
Transport module will be useful for writing and reading of
files to the multi-clouds. Users data will be written to
private / public clouds. System implementation is
discussed below in detail.
Figure 1: Proposed System Architecture
Implementation:
Our proposed system modules are explained in
this section. We have user registration & login module,
FTP setting module, File upload and download module,
encryption and decryption module & file splitting and
merging modules.
Step 1: Registration & Login Module
This module will be used for user registration and
login purpose. User has to perform one time registration to
the system by providing user credentials like username,
password and personal details. Random verification code
will be generated and forwarded to the registered mobile
number which will be used for user verification during
login to the system. This step will enhance user
authentication. Once sign in user can use various system
modules.
Step 2: FTP Management Module
This module will be used for managing FTP
services used for writing and reading the data to multiple
clouds. FTP service will be utilized by our distributed file
system for communicating with distributed network. Our
system divides and store user files among multiple clouds
.Normally three clouds are used for storage and recovery
purpose .First location used to store first part of our file is
our local application server which is also used as storage
server. Next two locations will be public clouds where
second and third parts of the file will be stored. This
module is used by the user application as FTP client for
connecting , writing and reading various files to storage
server.
Step 3: Upload and Download Module
Upload:
This module will be used by the end user to write
users data into multiple clouds using web interface. User
can choose any types of file from local storage. All the
files uploaded by the user will be listed in user specific
directory along with file details .File upload function will
be used to upload file and server map function will be used
to get server path for uploading data.
Download:
This module will be used by the end user for reading
the required file from cloud storage. User will select file
already uploaded using directory listing . System has
mapping table where file parts stored are mapped with
respective cloud storages. System will get first path from
mapping table to get first part of the file stored on local
storage Using FTP details and server path stored in
mapping table system will get 2nd and 3rd parts of the file
stored in public cloud storage . Merge function of the
system combines all the parts of file in temporary buffer
and stored it.
Step 4: File Encryption and Decryption Module
This module will be used for file security purpose.
Symmetric cryptographic techniques will be used for
securing files where encryption is used during upload
process and decryption is used during download process.
Users can perform encryption on complete file before
splitting into parts or perform encryption after splitting the
3. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
486
file . System will provide randomly generated security key
to the user which will be used for encryption and
decryption. Using the key, encrypted file parts will be
generated and uploaded to the
cloud storage.
Download process uses decryption module to
decrypt the merged parts of the user file using the security
key provided by the user. Once user credentials and
security key are matched then process is executed
successfully to download the requested file .
Step 5: File Split and Merge Module
This module will be used for splitting the user file
into various parts during upload process and merging the
parts to generate original file during the download process.
Meta data of all the files is stored on local application
server which not only saves network transmission time but
also provides greater level of security
Cloud Based File System / PaaS
Developer Interface / SaaS
Proprietary
File System
Proprietary
File System
Proprietary
File System
Cloud A Cloud B Cloud C
Web Server
Figure 1 : Multi-Cloud Secured Storage System
4. SECURITY ANALYSIS
This section deals with analyzing security of our
proposed system using various cryptographic techniques
.Proposed system provides security to user's data by
splitting it into multiple chunks and putting those chunks
in various clouds. Confidentiality of the data is maintained
using encryption techniques where symmetric or
asymmetric techniques can be used
Cryptographic Techniques:
Security of data is most important aspect for any
cloud service provider. Most of the public cloud provider
stores data in plain format or some of them may use
encryption / decryption using keys stored on cloud
premises. Hence there is a need of system where
cryptographic techniques are in the control of the user so
that data stored on cloud premises is safe from malicious
inside attacker.
Cryptographic techniques are most popular for
security of data has been classified as symmetric or private
key cryptography and Asymmetric or public key
cryptography. Symmetric algorithms are simple and easy
to implement with less complexity . Some of the popular
symmetric algorithms are DES, 3DES, AES, RC5,
BlowFish Etc. Asymmetric cryptography is mathematically
more complex than symmetric but provide more security.
RSA is most popular asymmetric key algorithm.
We have tested our system for various symmetric
key algorithms and results are discussed in next section.
Here we discussed AES, Advanced encryption standard
algorithm
AES is symmetric key block cipher uses 128 bit
data size. It allows variable round and keys. It supports 10
round for 128 bit key, 12 rounds for 192 bit key and 14
rounds for 256 bit key. Each round uses 128 bit round key
extracted from original key by key generator program. It is
stronger and around six times faster than 3DES. It is
iterative cipher using substitution & permutation network.
Each round in AES consists of four processes as
Byte substitution, Shift Rows, Mix Columns and Add
RoundKey
Security:
In general, AES is most secured symmetric key
algorithm. It is widely accepted and used in both hardware
and software implementation. AES does not have any
cryptanalytic attacks but has some side channel attacks
detected against specific versions of AES hence
programmer must take care during its implementation
5. RESULTS AND. DISCUSSIONS
We have developed system for implementing the
concept using asp.net. Our system has web interface which
is used by end user for communication with the system.
Registration module is used for user registration and
regular signup. We have developed a multi-cloud system in
which user split his file, perform encryption using
symmetric key and will upload the file to multiple clouds.
During downloading user will specify his file, system will
read various encrypted parts from multi clouds , merge
them and perform decryption to generate original file for
the user.
Our system is using cryptographic techniques for
securing the users data. We have chosen symmetric key
cryptographic technique for our system as it is simple, easy
to implement as compared to asymmetric techniques.
We have tested our system for various symmetric
cryptographic algorithms like DES, 3DES, AES, Blowfish
and RC4. We have tested the system in cloud environment
with following configuration. We have Xen (5.6 XCP)
server and the client with VMware system with N- Para-
virtual machine. The cloud server has Core i5 (4.8GHz)
with 8GB of RAM and 500GB-HDD. The client machine
has Core i3 (2.4GHz) with 2GB of RAM . We have tested
4. International Journal of Research in Advent Technology, Vol.7, No.1, January 2019
E-ISSN: 2321-9637
Available online at www.ijrat.org
487
our system for encryption and decryption using various
symmetric algorithms for varying file size from 500 kb to
3500 kb. We came to the conclusion that AES algorithm is
fastest among all other algorithms tested hence we will be
using AES symmetric key algorithm for security of our
system data.
Following figure shows results of comparison of various
cryptographic algorithms for varying file
size.
Figure 3 : Encryption with Symmetric Key
6. CONCLUSION
Cloud based storage systems are most popular
among organizations due to their "pay-as-you-go" model.
Big organizations are using private / public / hybrid cloud
infrastructure for storage but still most of them are not
deploying their critical data on cloud due to security
concerns.
Our proposed system implementation is based on
multiple clouds where data is fragmented and distributed
among various available clouds partially so that adversary
will never get complete data thus removing threats related
to single cloud system. Security is enhanced in our system
by using AES symmetric cipher used for encryption during
writing data to the cloud and for decryption during reading
data from the cloud. We have tested our system on local
and public cloud environment for various symmetric key
algorithm. Our system is secure and reliable.
REFERENCES
[1] Lee Badger, Tim Grance, Robert Patt-Corner, Jeff
Voas DRAFT Cloud Computing Synopsis and
Recommendations, NIST Special Publication 800-146,
May 2011
[2] Cloud Security Alliance (CSA). “Security Guidance
for Critical Areas of Focus in Cloud Computing
V2.1,” (Released December 17, 2009),
http://www.cloudsecurityalliance.org/guidance/csagui
de.v2.1.pdf
[3] Zhifeng Xiao and Yang Xiao, “Security and Privacy in
Cloud Computing”, IEEE Communications Surveys &
Tutorials, March 2012
[4] MohammedA. AlZain, Eric Pardede, Ben Soh, James
A. Thom, “Cloud Computing Security: From Single to
Multi-Clouds”, IEEE 45th Hawaii International
Conference on System Sciences, 2012
[5] Tran Doan Thanh, Subaji Mohan, EunmiChoil,
SangBum Kim, Pilsung Kim “A Taxonomy and
Survey on Distributed File Systems,” IEEE Fourth
International Conference on Networked Computing
and Advanced Information Management, 2008
[6] Satyanarayanan, M., "A Survey of Distributed
FileSystems," Technical Report CMU- CS-89- 116,
Departmentof Computer Science,
CarnegieMellonUniversity, 1989
[7] PavalBzoch, Jiri Safarik, “Security and reliability of
distributed file systems,” 6th
IEEE international con.
on intelligent data acquisition and advanced
computing systems, Sep 2011.
[8] Hussam Abu-Libdeh, Lonnie Princehouse, Hakim
Weatherspoon, " RACS: A Case for Cloud Storage
Diversity", International conference for Internet
technology and Secured Transaction, December 2012
[9] Kevin D. Bowers, Ari Juels, Alina Oprea, "HAIL: A
High-Availability and Integrity Layer for Cloud
Storage", 16th ACM conference on Computer and
communications security, November 2009.
[10]Alysson Bessani Miguel Correia Bruno Quaresma
Fernando Andre Paulo Sousa, " DEPSKY: Dependable
and Secure Storage in a Cloud-of-Clouds", ACM
Transaction on Storage, Vol. 9,No. 4, Article 12.
November 2013
[11]DaliborPeric, Thomas Bocek, Fabio Victora Hecht,
David Hausheer, Burkhard Stiller, “ The design and
evaluation of a distributed reliable file system,” Int.
Conference of parallel and distributed computing,
application and technologies, 2009
[12]Hung-Chang Haiao, Hsueh –Yi Chung, HaiyingShen,
Yu-Chang Chao, “Load rebalancing for distributed file
systems in clouds,” IEEE transactions on parallel and
distributed systems, Vol. 24, No. 5, May 2013
[13]KhengKok Mar, “Secured virtual diffused file system
for the cloud,” 6th
International
[14]IEEE conference on internet technology and secured
transactions, UAE, December 2011
[15]Quanlu Zhang, Shenglong Li, Zhenhua Li, Yuanjian
Xing, Zhi Yang, Yafei Dai, “ CHARM: A Cost-
efficient multi cloud data hosting scheme with high
availability,” IEEE Transactions on Cloud Computing,
Vol. 3, Issue 3, July-September 2015
[16]Dan Dobre, Paolo Viotti, Marko Vukolic, " Hybris:
Robust Hybrid Cloud Storage", ACM Transactions
on Storage, Vol . 13, Issue 3, October 2017