Secured Medical Information Transmission Using Chaos Through Cloud Computing
|
|
|
- Bryan Domenic Welch
- 10 years ago
- Views:
Transcription
1 Middle-East Journal of Scientific Research 23 (10): , 2015 ISSN IDOSI Publications, 2015 DOI: /idosi.mejsr Secured Medical Information Transmission Using Chaos Through Cloud Computing I. Bremnavas Department of Computer Engineering and Networks, College of Computer Science and Information Systems, Jazan University, Jazan, Saudi Arabia Abstract: The next generation platform cloud provides virtualization, dynamic resource pools and high availability. The user enables e cloud storage remotely to store eir data and enjoy e on-demand service and such a service also leaving users physical control of eir outsourced data. This problem can be addressed by achieving a secure and dependable cloud storage service. The proposed system uses e secured medical information transmission using chaotic technique rough e cloud computing system. Key words: Cloud storage Chaos Cloud computing Chaotic random key generation INTRODUCTION providers such as Microsoft SkyDrive, Amazon, Dropbox, Apple icloud and Google Drive are all services initiated Cloud computing is e new era of internet based few years back. The cloud computing models and computing system, which provides to user working characteristics are shown in Figure 1. wi e cloud applications in simple and customizable. The rapid development of cloud computing is It offers to store and access e cloud data from anywhere increasing severe security concern. Lack of security is by connecting e cloud application using internet [1]. e problem in widespread adoption of cloud Users are able to store eir local data in e remote server computing [3]. It bounded various security issues such as using e cloud service [2]. In is service oriented securing e data, virtualization and examining e computing environment, e cloud computing have utilization by e cloud computing dealers. Various progressed as a most popular paradigm which resolves security and privacy concern are in e unique cloud e infrastructures are delivered as a service. Most environment [4]. commonly used cloud service is data storage among oer services, where end users can outsource any data to Shared and Extensible Responsibility: Shared and cloud servers, to enjoy and access e hardware/software extensible responsibility is compromised between resources virtually wiout investment. A set of cloud customers in different delivery models. computing services such as Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Outsourcing: Cloud providers should have appropriate Service (IaaS) can be accessed by e cloud computing mechanisms to prevent e control of users data lose. model. In SaaS services are provided rough e service providers and customers to run applications on a cloud Heterogeneity: Security and privacy mechanism has infrastructure. It can be accessed rough web browsers. satisfied different cloud providers which may access e In PaaS services are a mode to rent hardware, operating different approaches, us generating integration system, storage and capacity of network over e internet. challenges. In IaaS services e consumer is provided wi storage management and network, power to control process and Multi-Tenancy: Policies, protection, data access and oer fundamental computing resources which are helpful deployment of application must be e considered as to manage arbitrary software. The popular cloud service major issues of a secure multi-tenant environment. Corresponding Auor: I. Bremnavas, Department of Computer Engineering and Networks, College of Computer Science and Information Systems, Jazan University, Jazan, Saudi Arabia. 2552
2 Fig. 1: Cloud computing NIST (National Institute of Standard and Technology) Definition The tremendous technical advantage of e cloud, Cloud Based Medical Information System: Businesses, security and privacy concern has been major problem organizations, medical information system and e preventing its adoption. Cloud users store e sensitive consumers are adopting cloud technologies. Nowadays, and privacy information in cloud instances. From security e serious problem in e-heal care environment is and privacy concerns, cloud providers need to ensure e medical information security. The security tool can protect confidentiality of e service. Any cloud service, user is medical information from attackers. L.M. Vaquero et al. supposed to know e risk associated wi e data focused only on e-heal security and privacy protection security, e.g., user data loss and data eft. in e cloud [12]. Cryptographic algorim like Rivest Auentication, data encryption, integrity, recovery and Shamir Adleman (RSA) and Data Encryption Standard user protection are all e important components to cover (DES) were used for medical information security. But it is e data security model in cloud. To avoid unauorised not effective for medical information security because of person access of e data, applying encryption e high data capacity and correlation among pixels. mechanism on data, at data is totally unusable. Chaos have been explored in last two decades for medical Encryption is always a powerful scheme whenever storing information security, it has some suitable intrinsic features e sensitive and privacy information. To confirm e of medical image processing. Chaos can be well applied in basic security model components like confidentiality, cryptography [13, 14]. Because it has many characteristics integrity and availability (CIA), e cloud storage which can be connected wi e confusion and diffusion provider need to include a security scheme to ensure at property in cryptography, such as sensitive dependence e shared storage environment safeguards for e data on initial conditions and parameters, broadband power [5]. This survey have been discussed some security spectrum, randomness in e time domain and ergodicity issues in cloud computing. E.M. Mohamed et al. [6] etc. discussed e data security model of cloud computing Cloud based medical information system is and also implemented data security model for cloud becoming more predominant in medicine. Still, in e-heal computing. care environment some medical information systems M. Balduzzi et al and C. Rong et al. [7, 8] presented have concerns about transferring eir data storage, e security issues review of e cloud computing. Akhil computing capacity to e cloud providers. Behl [9] has discussed e exiting security approaches Collaboration among e hospitals and medical society is and security issues related to e cloud environment. required for sharing patient medical data and images. E.Maisen [10] presented few key security issues of Patient medical data stored in virtual environment are cloud computing. Sabahi [11] focussed e security easily accessible by different healcare providers, us issues, reliability and availability for cloud computing and e advantage of process is facilitating sharing of data also given some solutions for security issues. and considerably reducing local storage requirements. 2553
3 Fig. 2: Cloud computing general architecture Ultimately what system allows physicians to build characterized by sensitive dependence on initial networks for storing e high volume of patient medical conditions and similarity to random behaviour. information and open platform for sharing and accessing Here, we consider one dimensional chaotic logistic of patient medical information. map. It is a simple model which yields chaos, can be The proposed system uses e secured patient written as: medical information transmission using chaotic map over to cloud computing system. The first process is to x n+1 = a x n (1-x n) ( n=0, 1, 2 ) where 0<=a<=4 provide e security for patient medical data using chaos and sharing and exchanging wi e available "Cloud". This is a discrete time map which receives a real The patient medical information will be available in e number between 0 and 1 and returns a real number in cloud, which can provide e required details to e [0, 1]. n denotes a discrete time step and x n denotes doctors and e patient can seek e treatment in oer a data at n. Time series x n (n=0, 1, 2 ) is deterministic. branch hospital, reduce e computational resource Using e above simulator, we can get ese sequences x0, maintenance in e hospital. The cloud computing general x 1, x 2... dramatically and a is e control parameters architecture is shown in Figure 2. governing e chaotic behavior. In e above logistic difference equation initial key Secured Medical Information Transmission Using a = 0.3 as e user perception. The difference equation is Chaotic Map in Cloud: From security perspective, for evaluated to generate a sequence of random numbers secure communication e encryption is a better which are sorted and eir index value is used. This value mechanism. Better to secure e data before storing in a 0.3 acts as an encryption key K for e encryption cloud server. User can give e permission to eir process. The image pixel in e one dimensional array members such at data can be easily accessed by em. format is being encrypted wi e pseudo random In a public cloud, users are sharing medical information numbers generated by e logistic map as e key in e wi oer medical hospitals. In a shared pool outside e chaotic region i.e., a value 0 and 4. It has been applied to hospitals, users don t have any knowledge or control of security and increases e hiding capacity of e where e resources are located. Because users share e embedding positions. This proposed algorim has been medical environment in e cloud, may put your data at put forward for Least Significant Bit (LSB) based image risk of seizure. Data integrity is assurance at e data is steganography in which e last bits of e cover image consistent and correct. Ensuring e integrity of e data are replaced by e bits of e message image which is really means at it changes only in response to encrypted using index based logistic chaotic map. auorized transactions. Now e image is encrypted in e chaotic region and it is The dynamic nonlinear system is chaos, has ready to send across e transmission channels wi more brought out e consideration of ese facts such as number of attackers. Figure 3 is e proposed flow low-dimensional dynamical systems are capable of diagram of secured medical image transmission using handling complex and unpredictable behaviour. Chaos chaos in distributed cloud environment. Figure 4 is e seems to be a good technique for encryption algorim, flow diagram of proposed embedding algorim. 2554
4 SENDERSIDE Medical Information System Database Medical Image Information (I) Chaotic signal is generated (CS) Chaos signal in to medical image information (CSI) Encrypted Medical Image Information wi respective index key (ES) Cloud Storage Medical Information System Database Extracted Medical Image Information (I) Chaotic s ignal is extracted Chaos signal in to medical image information (CSI) Encrypted Medical Image Information wi respective index key (ES) RECEIVER Fig. 3: Secured medical image transmission using chaos in distributed cloud environment Input medical image information (I) Embedding chaos signal in to medical image information (CSI) Output medical image information wi chaos signal (ES) Fig. 4: Embedding Process The medical information system has a patient medical x n+1 = ax n (1- x n) database, where n number of patient medical information in e database. It extracts e features from Step 3: The medical image information I is medical information and generates a key. To protect what e sensitive patient medical information are encrypted embedded wiin e chaotic signal S using e following steps before outsourcing to e cloud server. During e encryption process, e unique index key value is assigned for each patient medical data. Then, e encrypted query is submitted to e cloud server. Finally, e auorized user decrypts e received medical information. Working example of sender side encryption process is shown in Figure 5. Proposed Embedding Algorim: I/P and O/P: Medical image information, I: Encrypted Signal, ES Step 1: Load an medical image information from e database and store an image in one-dimensional array named as I. Step 2: Generate e chaotic signal S using logistic equation. Fix e covered boundary region based on e size of an medical image information I. The signal is assumed to be generated from e starting position of e boundary region. Set a key value K dynamically as user perception wiin e boundary region for representing e initial position. The medical image information value I is embedded wi chaotic signal S from K. The sort actual indexes of e sorted key values should be stored. Step 4: The Encrypted signal (ES) is transferred along wi e key value K. (The key value is embedded in a standardized position of e signal ES). 2555
5 Medical Image Information (I) Generate e signal based on e logistic equations (CSI) Medical Information and chaos signal wi e cover region (ES) Fig. 5: Working example of sender side encryption process 2556
6 Medical image information wi chaos signal (ES) Extracting chaos signal (CS) Medical image information (I) Fig. 6: Extraction Process Medical Information and chaos signal wi e cover region (ES) Extracting e Chaotic signal (CS) Medical Image Information (I) Fig. 7: Working example of receiver side decryption process 2557
7 Figure 6 is e flow diagram of proposed extraction 3. Fernandes, D.AB., L.FB. Soares, J.V. Gomes, M.M. process. The encrypted image is received by e trusted Freire and P.R.M. Inacio, Security issues in receiver. The indexing key value and e key is also cloud environments: a survey, Int. J. Inform. Sec., embedded in e same cover region wi secret coding. 13(2): The receiver generates e random numbers using same 4. Takabi, H., J. Joshi and G.J. Ahn, Secure cloud: logistic equation. The encrypted logistic map is Towards a comprehensive security framework for subtracted from e raw logistic map ereby e image is cloud computing environments, In: Computer being retrieved from e encrypted source of information. Software and Applications Conference Workshops Working example of receiver side decryption process is in (COMPSACW), 2010 IEEE 34 Annual, pp: Figure Xiao, Z. and Y. Xiao, Security and privacy in cloud computing, IEEE Commun. Surveys Tutorials, Proposed Extraction Algorim: 15(2): Mohamed, E.M., Hatem S. Abdelkader, Sherif E.I. I/P : Encrypted signal, ES Etriby, Enhanced Data Security Model for O/P : Medical image information, I Cloud Computing, in: 8 International Conference on Informatics and Systems (INFOS), Cairo, pp: Step 1: Receive e encrypted signal, ES from e open 7. Balduzzi, M., J. Zaddach, D. Balzarotti, E. Kirda and communication channel. S. Loureiro, A Security analysis of amazon s Step 2: Retrieve e actual indexes of e stored key value elastic compute cloud service, in: Proceedings of e K from encrypted signal ES. 27 Annual ACM Symposiumon Applied Step 3: Generate e chaotic signal S using logistic Computings, pp: equation. 8. Rong, C., S.T. Nguyen and M.G. Jaatun, x n+1 = ax n (1- x n) Beyond lightning: a survey on security challenges in cloud computing, Comput. Electr. Engg., 39(1): Step 4: Subtract e received encrypted signal, ES wi 9. Akhil Bhel, Emerging Security Challenges in e raw logistic signal, S using e key value K, to obtain Cloud Computing. Information and Communication a one-dimensional array for medical image information, I Technologies, in: World Congress on, Mumbai, Step 5: The resultant medical image information, I from e pp: one-dimensional array. 10. Eystein Maisen, Security Challenges and Solutions in Cloud Computing, in: International CONCLUSION Conference on Digital Ecosystems and Technologies (IEEE DEST 2011), pp: In is work, we proposed a secured medical 11. Farzad Sabahi, Cloud Computing Security information transmission using chaotic map rough rd Threats and Responses, in: IEEE 3 International cloud computing system. The proposed meod considers Conference on Communication software and e techniques from chaos security and image processing Networks (ICCSN), pp: domains to perform secure medial information outsourcing 12. Abbas, A. and S.U. Khan, A Review on e problem. state-of-e-art privacy preserving approaches in e- healclouds, IEEE J. Biomed. Heal Inform. REFERENCES 13. Maniccam, S.S. and N.G. Bourbkis, Pattern Recognition, 37: Vaquero, L.M., L. Rodero-Merino, J. Caceres and 14. Kocarev, L., IEEE Circuits and System M. Lindner, A break in e clouds: towards a Magazine, 3: cloud definition, in: ACM SIGCOMM Computer Communication Review, pp: Mollah, M.B., K.R. Islam and S.S. Islam, Next generation of computing rough cloud computing technology, in: 25 IEEE Canadian Conference on Electrical Computer Engineering (CCECE), pp:
[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem
Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing
Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Renuka Goyal, Navjot Sidhu Centre for Computer Science and Technology, Central University of Punjab Bathinda,
Enhance data security of private cloud using encryption scheme with RBAC
Enhance data security of private cloud using encryption scheme with RBAC Dimpi Rani 1, Rajiv Kumar Ranjan 2 M.Tech (CSE) Student, Arni University, Indora, Kangra, India 1 Assistant Professor, Dept. of
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
Fully homomorphic encryption equating to cloud security: An approach
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 2 (Jan. - Feb. 2013), PP 46-50 Fully homomorphic encryption equating to cloud security: An approach
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
CLOUD COMPUTING SECURITY CONCERNS
CLOUD COMPUTING SECURITY CONCERNS ABSTRACT ASMA GULAM MOHAMED Saveetha School of Engineering Cloud computing is set of resources including data storage, programs and hardware offered through the Internet.
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
How To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms
RESERCH RTIE PEN CCESS nalyzing ata Security for Cloud Computing Using Cryptographic lgorithms Gurpreet Kaur 1, Manish Mahajan 2 1 (epartment of Information technology, Chandigarh Engineering College,
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
Cloud Computing and Attacks
Cloud Computing and Attacks Joseph Spring School of Computer Science 7COM1027 - Distributed Systems Security 1 Areas for Discussion Cloud Computing Attacks Firewalls 2 Cloud Computing A Cloud is a large
An Efficient data storage security algorithm using RSA Algorithm
An Efficient data storage security algorithm using RSA Algorithm Amandeep Kaur 1, Sarpreet Singh 2 1 Research fellow, Department of Computer Science and Engineering, Sri Guru Granth Sahib World University,
Cloud Computing For Distributed University Campus: A Prototype Suggestion
Cloud Computing For Distributed University Campus: A Prototype Suggestion Mehmet Fatih Erkoç, Serhat Bahadir Kert [email protected], [email protected] Yildiz Technical University (Turkey) Abstract
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
DATA SECURITY MODEL FOR CLOUD COMPUTING
DATA SECURITY MODEL FOR CLOUD COMPUTING POOJA DHAWAN Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001 [email protected] ABSTRACT Cloud Computing
Information Security Management System for Cloud Computing
ICT Innovations 2011 Web Proceedings ISSN 1857-7288 49 Information Security Management System for Cloud Computing Sashko Ristov, Marjan Gushev, and Magdalena Kostoska Ss. Cyril and Methodius University
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC
SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 [email protected], 2 [email protected]
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
Survey On Security Threats In Data Storing & Sharing In Cloud Environment
Survey On Security Threats In Data Storing & Sharing In Cloud Environment Seema Tahalyani 1 and Dr. S.M Ghosh 2 1 CSE Department, Rungta College of Engineering & Technology, Bhilai, Chhattisgarh, India
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Cloud Computing Services In Libraries: An Overview
9 th Convention PLANNER 2014 Cloud Computing Services In Libraries... Cloud Computing Services In Libraries: An Overview Shekar HP Muttayya Konganurmath Abstract The purpose of this paper is to provide
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
(C) Global Journal of Engineering Science and Research Management
DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.
A Fully Homomorphic Encryption Implementation on Cloud Computing
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 8 (2014), pp. 811-816 International Research Publications House http://www. irphouse.com A Fully Homomorphic
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 M.Tech Dept. of Computer Science, IPEC, Ghaziabad, U.P. 2 Professor, Dept. of Computer science, IPEC, Ghaziabad, U.P. Abstract:
Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst
Clouds on the Horizon Cloud Security in Today s DoD Environment Bill Musson Security Analyst Agenda O Overview of Cloud architectures O Essential characteristics O Cloud service models O Cloud deployment
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
An Intelligent Approach for Data Fortification in Cloud Computing
An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Data Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
Customer Security Issues in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY Amanjot Kaur 1, Manisha Bhardwaj 2 1 MTech Student, Computer Science Department, LPU, Jalandhar, Punjab, India, [email protected] 2 Assistant Professor,
The Impact of Cloud Computing on Saudi Organizations: The Case of a Telecom Company
International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184 Volume 3, Number 6(December 2014), pp. 126-130 MEACSE Publications http://www.meacse.org/ijcar The Impact of Cloud Computing
A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor
I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification
IMPLEMENTATION OF ELECTRONIC FUND TRANSFER USING NEW SYMMETRIC KEY ALGORITHM BASED ON SIMPLE LOGARITHM
IMPLEMENTATION OF ELECTRONIC FUND TRANSFER USING NEW SYMMETRIC KEY ALGORITHM BASED ON SIMPLE LOGARITHM Mohammed Abdullah Mohammed Aysan* Abstract: Electronic Fund Transfer involves electronic transfer
Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection
Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection Govinda.K 1, Sathiyamoorthy.E *2, Surbhit Agarwal 3 # SCSE,VIT University Vellore,India 1 [email protected]
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Security Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services
International Journal of Recent Research and Review, Vol. IV, December 2012 ISSN 2277 8322 Data Security & Privacy Protection: Primary Inhibitor for Adoption of Cloud Computing Services Vidhi Agarwal 1,
Building Blocks of the Private Cloud
www.cloudtp.com Building Blocks of the Private Cloud Private clouds are exactly what they sound like. Your own instance of SaaS, PaaS, or IaaS that exists in your own data center, all tucked away, protected
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
A Novel Cryptographic Key Generation Method Using Image Features
Research Journal of Information Technology 4(2): 88-92, 2012 ISSN: 2041-3114 Maxwell Scientific Organization, 2012 Submitted: April 18, 2012 Accepted: May 23, 2012 Published: June 30, 2012 A Novel Cryptographic
A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS
A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS Dr.S.Gunasekaran, M.P.Lavanya Professor, CSE, Coimbatore Institute of Engineering and Tech, Coimbatore PG Scholar, Coimbatore
CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM
CLOUD COMPUTING: A NEW VISION OF THE DISTRIBUTED SYSTEM Taha Chaabouni 1 and Maher Khemakhem 2 1 MIRACL Lab, FSEG, University of Sfax, Sfax, Tunisia [email protected] 2 MIRACL Lab, FSEG, University
Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works
Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
Associate Prof. Dr. Victor Onomza Waziri
BIG DATA ANALYTICS AND DATA SECURITY IN THE CLOUD VIA FULLY HOMOMORPHIC ENCRYPTION Associate Prof. Dr. Victor Onomza Waziri Department of Cyber Security Science, School of ICT, Federal University of Technology,
Grid Computing Vs. Cloud Computing
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid
SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING
SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING Ali Newaz Bahar 1*, Md. Ahsan Habib 2, Md. Manowarul Islam 3 1, 2, 3 Department of Information and Communication Technology, Mawlana Bhashani Science and
Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
Alaa Hussein Al-Hamami, Jalal Yousef AL-Juneidi Department of Computer Sciences and Informatics Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 2, 23-27, 2015 Secure Mobile Cloud Computing Based-On Fingerprint Alaa Hussein Al-Hamami, Jalal Yousef AL-Juneidi
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
A Review: Data Security Approach in Cloud computing by using RSA Algorithm
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Review:
MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY
MODIFIED RSA ENCRYPTION ALGORITHM IS USED IN CLOUD COMPUTING FOR DATA SECURITY Yogita Gangboir 1, Praveen Shende 2 1.,2 CSE Dept, CSIT Durg, (India) ABSTRACT Cloud computing is rising day by day around
Cloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
RUNNING HEAD: Cloud Computing 1. Cloud Computing. Future of Computer Networking
RUNNING HEAD: Cloud Computing 1 Cloud Computing Future of Computer Networking Asif U Islam University of North Texas LTEC 4550 Assignment 5 07/31/2014 Cloud Computing 2 Abstract The paper discusses the
Cloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Broker
Ranked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
Cloud & Security. Dr Debabrata Nayak [email protected]
Cloud & Security Dr Debabrata Nayak [email protected] AGENDA General description of cloud Cloud Framework Top issues in cloud Cloud Security trend Cloud Security Infrastructure Cloud Security Advantages
A Secure Model for Cloud Computing Based Storage and Retrieval
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 1 (Sep-Oct. 2012), PP 01-05 A Secure Model for Cloud Computing Based Storage and Retrieval Yaga Reddemma
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
The cloud - ULTIMATE GAME CHANGER ===========================================
The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 11, November 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.
Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana
Cloud Computing in the Czech Republic
Cloud Computing in the Czech Republic George Feuerlicht, Lukas Burkon and Nikos Margaris Cloud Computing Research Group Prague University of Economics Cloud Computing Research Group CCRG@KIT http://cloud-computing.vse.cz/wp/
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA
THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Number 1/2013, pp. 72 77 NEW CRYPTOGRAPHIC CHALLENGES IN CLOUD COMPUTING ERA Laurenţiu BURDUŞEL Politehnica
An Efficient Cost Calculation Mechanism for Cloud and Non Cloud Computing Environment in Java
2012 International Conference on Computer Technology and Science (ICCTS 2012) IPCSIT vol. 47 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V47.31 An Efficient Cost Calculation Mechanism
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Secure Data Storage in Cloud Service using RC5 Algorithm
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-2, Issue-5 November 2013 Secure Data Storage in Cloud using RC5 Algorithm Sachindra K. Chavan, Manoj L. Bangare
