Secure Data Storage Scheme using Blockchain for Federated cloud
Research Paper | Journal Paper
Vol.07 , Issue.06 , pp.51-55, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.5155
Abstract
With the Internet technology development, the volume of data is growing immensely. To deal with huge volume of data, cloud storage has gained great attention from organizations and businesses because of its easy and efficient to adoption procedure. Traditional cloud storage has come to rely almost exclusively on large storage providers acting as trusted third parties to transfer and store data. Though, cloud Provider offers considerable security features, with increasing demands and usage, these centralized systems have become major targets for hacks and data breaches. This makes the data vulnerable and prone to tampering. In this paper, to address the above problems and proposed a distributed blockchain-based security scheme for storage in federated cloud, where users can divide their own files into fragments, encrypted those data fragments, and upload those encrypted fragments randomly into the federated clouds.
Key-Words / Index Term
Cloud storage, Security, Blockchain, Distributed Cloud computing, federated cloud
References
[1] National Institute of Standards and Technology special publication.no.800-145, “The NIST definition of cloud computing” Sept. 2011
[2] Shan, Chen, Chang Heng, and Zou Xianjun. “ Inter-cloud operations via NGSON” IEEE communications, 2012.
[3] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE transactions on parallel and distributed systems, 22(5):847–859, 2011.
[4] Yinghui Zhang, Dong Zheng, and Robert H Deng. Security and privacy in smart health: Efficient policy-hiding attribute-based access control. IEEE Internet of Things Journal, 2018. doi:10.1109/JIOT.2018.2825289.
[5] Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S Wong, Hui Li, and Ilsun You. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Information Sciences, 379:42–61, 2017.
[6] http://techgenix.com/blockchain-technology-for-cloud-storage/
[7] Nakamoto, S. “Bitcoin: A Peer-to-Peer Electronic Cash Systems https://bitcoin.org/bitcoin.pdf namecoin (2014).
[8] Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. https: //bitcoin.org/bitcoin.pdf, 2008.
[9] Kosba, A., Miller, A., Shi, E., Wen, Z. and Papamanthou, C. (2016) ‘Hawk: the blockchain model of cryptography and privacy-preserving smart contracts’, Proceedings of IEEE Symposium onSecurity and Privacy (SP), San Jose, CA, USA, pp.839–858.
[10] Buterin, V. (2014) A Next-Generation Smart Contract and Decentralized Application Platform, White Paper.
[11] Zibin Zheng and Shaoan Xie,”Blockchain challeng es and oppor tunities: a survey” Int. J. Web and Grid Services, Vol. 14, No. 4, 2018.
[12] Adel Nadjaran Toosi, Rodrigo N. Calheiros, and Rajkumar Buyya. 2014. Interconnected cl oud computing environments: Challenges, taxonomy, and s urvey. ACM Comput. S urv. 47, 1, Articl e 7 (April 2014), 47 pages. DOI: h ttp://dx.doi.org/10.1145/2593512.
[13] Guy Zyskind, Oz Nathan, et al. Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy Workshops (SPW), 2015 IEEE, pages 180–184. IEEE, 2015.
[14] Antonio Celesti, Francesco Tusa, Massimo Villari, and Antonio Puliafito. 2010a. How to enhance cloud architectures to enable cross-federation. In Proceedings of the 3rd International Conference on Cloud Computing (Cloud’10). Miami, FL, 337–345.
[15] Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick PC Lee, and Wenjing Lou. A hybrid cloud approach for secure authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26(5):1206–1216, 2015.
[16] Xiaoming Zhu, Bingying Song, Yingzi Ni, Yifan Ren, and Rui Li. Software defined anything from software-defined hardware to software defined anything. In Business Trends in the Digital Era, pages 83–103. Springer, 2016.
[17] Qiang Fu, J¨org-Uwe Pott, Feng Shen, and Changhui Rao. Stochastic parallel gradient descent optimization based on decoupling of the software and hardware. Optics Communications, 310:138–149, 2014.
[18] Guy Zyskind, Oz Nathan, et al. Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy Workshops (SPW), EEE, pages 180–184. IEEE, 2015
[19] Shawn Wilkinson, Tome Boshevski, Josh Brandoff, and Vitalik Buterin. Storj a peer-to-peer cloud storage network, 2014.
[20] Lizhen Cui, Junhua Zhang, Lingxi Yue, Yuliang Shi, Hui Li, and Dong Yuan. A genetic algorithm based data replica placement strategy for sci- entific applications in clouds. IEEE Transactions on Services Computing, pages 1–13, 2017. doi:10.1109/TSC.2015.2481421.
[21] Liu, Xiao Liang Yu, Shiping Chen, Xiwei Xu, and Liming Zhu. Blockchain based data integrity service framework for iot data. In Web Services (ICWS), 2017 IEEE International Conference on, pages 468–475. IEEE, 2017.
[22] Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, and Geyong Min. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4):767–778,2017.
[23] Changsong Yang, Xiaofeng Chen, and Yang Xiang. Blcokchain based publicly verifiable data deletion scheme for cloud storage.Journal of Network and Computer Applications, 103:185–193,2017.doi:10.1016/j.jnca.2017.11.011.
Citation
Shaik. Munwar, K. Ramani, K. Madhavi, "Secure Data Storage Scheme using Blockchain for Federated cloud", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.51-55, 2019.
A Systematic Literature Review on Obstacle Detection for Visually Impaired People
Review Paper | Journal Paper
Vol.07 , Issue.06 , pp.56-65, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.5665
Abstract
In general humans have five senses, among all vision is the most important and best gift given to the humans by GOD, but it is limited to some of the people due to their Visual Impairment issues. If vision is the problem then GOD will give the capabilities in other senses. The proportion of visually impaired and blind people in the overall world has become a very large. In a survey report given by WHO (World Health Organization) in 2010, they estimated nearly 285.389 million people are suffering with visual impairment problems across the globe. Many equipment’s (Ex: Cane, Assistive shoe, Spectacles) are developed by different authors for detection of obstacles by visual impaired people over the time. All these equipment’s are developed by using different techniques like IoT enabled smart cane, GPS/GSM based smart cane, Wearable devices like Assistive shoe’s and blind vision spectacles which detects the obstacles, Smart Phone based navigation technology , Image processing techniques based smart cane which uses the camera for capturing the images, ETA’s (Electronic Travel Aid’s), normal Ultrasonic sensor based smart canes, Sensors(Ultrasonic, LDR’s, Soil moisture and water detection) used smart cane and the most advanced smart canes which uses the Algorithms of Machine Learning and Deep Learning ANN, CNN, RNN. In this paper, we present a clear survey of the navigation systems of blind/Visual impaired people that are proposed by different authors highlighting various technologies used, designs implemented, working challenges faced and requirements of blind people for their autonomous navigation either in indoor or outdoor environment. Also we aims at presenting several existing literatures which are based on object detection by blind people. Due to the advancement in techniques and technology, study, analysis and evaluation of all these proposals by different authors will play a vital role. Hence this survey will concentrate on analyzing the process involved in detection of obstacles with different techniques.3
Key-Words / Index Term
Visual Impairment, IoT, Ultrasonic sensor, wearable devices, Image processing, smart phone, LDR (Light Dependent Resistor), Machine Learning, Deep Learning
References
[1]. World Health Organization. (2010, March) WHO. [Online].
http://www.who.int/mediacentre/factsheets/fs282/en/
[2]. F. Lelièvre, M. Bournot, “Importance, caractéristiques, incapacités fonctionnelles et difficulties socials”, 2005.
[3]. Parth Dhall, Pankaj Sharma, Shristi Thakur, Rishav Agarwal, Shubham Rastogi, “A Review Paper on Assistive Shoe & Cane for Visually Impaired People”, International Journal of Scientific Research and Management Studies (IJSRMS),Vol 3 Issue 2, pg: 113-117,2016.
[4]. Amjed S. Al-Fahoum, Heba B. Al- Hmoud, and Ausaila A. Al-Fraihat, “A Smart Infrared Microcontroller-Based Blind Guidance System”, Hindawi Transactions on Active and Passive Electronic Components,Vol.3, No.2, pp.1-7, June 2013.
[5]. WHO, Visual impairment and blindness, Fact Sheet N°282, June 2012 Ref: Pascolini D, Mariotti SPM. Global estimates of visual impairment: 2010. British Journal Ophthalmology Online First published December 1, 2011 as 10.1136/bjophthalmol- 2011-300539.
[6]. Thulasiraj RD, Nirmalan PK, Ramakrishnan R, Krishandas R, Manimekalai TK, Baburajan NP, et al. Blindness and Vision Impairment in a Rural South Indian Population: The Aravind Comprehensive Eye Survey. Ophthalmology 2003; 110:1491–8.
[7]. Thulasiraj RD, Rahamathulla R, Saraswati A, Selvaraj S, Ellwein LB. The Sivaganga eye survey: I, Blindness and cataract surgery. Ophthal Epidemiol 2002; 9:299–312.
[8]. Nirmalan PK, Thulasiraj RD, Maneksha V, Rahmathullah R, Ramakrishnan R, Padmavathi A, et al. A population based eye survey of older adults in Tirunelveli district of south India: Blindness, cataract surgery and visual outcomes. Br J Ophthalmol 2002; 86:505–12.
[9.] DIRECTORATE GENERAL OF HEALTH SERVICES Ministry of Health & Family Welfare Government of India.
[10]. National Health Profile: 2007. Central Bureau of Health Intelligence. Directorate General of Health Services, Ministry of Health and Family, Nirman Bhavan, New Delhi – 110011
[11]. “Community Eye Health Journal”, vol 21, Issue 68, 2008.
[12]. NPCB: Statistics Available from http:// www.npcb.nic.in
[13]. Shruti Dambhare, Prof. A. Sakhare, “Smart stick for Blind: Obstacle Detection, Artificial vision and Real-time assistance via GPS”, 2nd National Conference on Information and Communication Technology (NCICT) 2011 Proceedings published in International Journal of Computer Applications® (IJCA).
[14]. Dada Emmanuel Gbenga, Arhyel Ibrahim Shani, Adebimpe Lateef Adekunle “Smart Walking Stick for Visually Impaired People Using Ultrasonic Sensors and Arduino.” International Journal of Engineering and Technology (IJET), Vol 9, No 5, Oct-Nov 2017.
[15]. O. O. Olakanmi, “A Multidimensional Walking Aid for Visually Impaired Using Ultrasonic Sensors Network with Voice Guidance", International Journal of Intelligent Systems and Applications (IJISA), vol. 6, number 8, pp. 53-59, 2014. DOI: 10.5815/ijisa.2014.08.06.
[16]. Parth Dhall, Pankaj Sharma et al., “A Review Paper On Assistive Shoe & Cane for Visually Impaired People”, International Journal of Scientific Research and Management Studies (IJSRMS) ISSN: 2349-3771 Volume 3 Issue 2, page: 113-117 .
[17]. Suryavanshi, Mayuri et al. , “Assistance for visually impaired people”, International Journal for Research in Applied Science & Engineering Technology (IJRASET), Volume 4 Issue IV, April 2016, ISSN: 2321-9653.
[18]. N. Rama Murthy, N. Sudha, “Smart Navigation System For Visually Challenged People”, International Journal of Industrial Electronics and Electrical Engineering, ISSN: 2347-6982 Special Issue, Sep.-2016.
[19]. R. Radhika, P.G. Pai, S. Rakshitha and R. Srinath “Implementation of Smart Stick for Obstacle Detection and Navigation.” International Journal of Latest Research in Engineering and Technology, vol. 2, number 5, pp. 45-50, 2016.
[20]. Ljupko Šimunović, Velimir Anđelić, Ivan Pavlinušić, “Blind people guidance system”, Central Conference on Information and Intelligent Systems, Faculty of Organization and Informatics, Sep 19-21, 2012.
[21]. Alberto Rodríguez, Luis M. Bergasa et al., “Obstacle Avoidance System for Assisting Visually Impaired People”, Proceedings of the 2012 IEEE Intelligent Vehicles Symposium Workshops, ISBN: 978-84-695-3472-4.
[22]. Somnath koley, Ravi Mishra, “Voice Operated Outdoor Navigation System For Visually Impaired Persons”, International Journal of Engineering Trends and Technology- Volume3Issue2- 2012.
[23]. S. Madulika, S. Mohan et al., “Arm7 Based Electronic Travel Aid System for Blind People Navigation and Monitoring”, International Journal of Research in Computer and Communication Technology, Vol 2, Issue 12, December- 2013, ISSN (Print) 2320- 5156.
[24]. Vishwa Rupa, B Santosh, “Rescue System for Visually Impaired Blind Persons”, International Journal of Engineering Trends and Technology (IJETT) – ISSN: 2231-5381 Volume 16 Number 4 – Oct 2014.
[25]. Lilit Hakobyan, Jo Lumsden et al., “Mobile Assistive Technologies for the Visually Impaired”, City, University of London Institutional Repository.
[26]. Nektarios Paisios, “Mobile Accessibility Tools for the Visually Impaired”, Courant Institute of Mathematical Sciences New York University, May 2012.
[27]. Adbel Iiah Nour, “Automated Mobility and Orientation system for Blind or Partially Sighted People”, International Journal on Smart Sensing and Intelligent Systems, vol. 6 no. 2, April 2013.
[28]. Ben Leduc-Mills, Halley Profita et al., “ioCane: A Smart-Phone and Sensor-Augmented Mobility Aid for the Blind”, Submitted as a Computer Science Technical Report to the University of Colorado, Boulder libraries on September 23, 2013.
[29]. Aswathy, Dilraj et al., “Rf Based Talking Signage For Blind Navigation”, International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015.
[30]. Karen Soares, “SmartGuia: Shopping Assistant for Blind People”, a thesis presented to Department of de Engenharia Informática, Universidade de Coimbra, 2014.
[31]. Anik Hasan, Nasrat Sharif, “Pedestrian Crossing Guide based on Android-Cloud Platform for Blind People”, Brac University, 2010.
[32]. Niclas Zeller, “Obstacle detection using Microsoft Kinect”, a thesis presented to Ryerson University and Karlsruhe University of Applied Sciences, 2013.
[33]. Pooja, Hemant, “A Review on an Obstacle Detection in Navigation of Visually Impaired”, IOSR Journal of Engineering (IOSRJEN) e-ISSN: 2250-3021, p-ISSN: 2278-8719 Vol. 3, Issue 1 (Jan. 2013), ||V2|| PP 01-06.
[34]. IAN AUSTEN, “Street Smarts: A Device to Help the Blind Find Crosswalks”, The New York Times, Technology, 2004.
[35]. Qing Lin, Hernsoo et al., “Top-View-Based Guidance for Blind People Using Directional Ellipse Model”, International Journal of Advanced Robotic Systems, 2013.
[36]. N. Sachin, G. Anil et al., “Obstacle Detection And Deviation Technique In Real World”, International Journal of Current Trends in Engineering & Research (IJCTER) e-ISSN 2455–1392 Volume 2 Issue 5, May 2016 pp. 117 – 122, 2016.
[37]. Byeong-Seok, Cheol-Su, “Obstacle Detection and Avoidance System for Visually Impaired People”, I. Oakley and S. Brewster (Eds.): HAID 2007, LNCS 4813, pp. 78–85, 2007. © Springer-Verlag Berlin Heidelberg 2007.
[38]. K.Swathi, Dr.R.Subhashin et al., “Smart Walking Stick Using IOT”, International Journal of Innovations & Advancement in Computer Science, IJIACS, ISSN 2347 – 8616, Volume 6, Issue 11, November 2017.
[39]. Alejandro, Renato et al., “Evaluation of Electronic Haptic Device for Blind and Visually Impaired People: A case Study”, Journal of Medical and Biological Engineering, 32(6): 423-428”, doi: 10.5405/jmbe.925, 10 Apr 2012.
[40]. Chinh Nguyen, “Haptic Obstacle Detector for the blind”, Thesis submitted to KTH Industrial Engineering and Management, Machine Design, Stockholm.
[41]. Fernando, Gerardo et al., “Obstacle Recognition Based on Machine Learning for On-Chip LiDAR Sensors in a Cyber-Physical System”, Sensors, PMCID: PMC5620580, PMID: 28906450, doi: 10.3390/s17092109, 2017.
[42]. Dawid, Karolina et al., “Obstacle Detection as a Safety Alert in Augmented Reality Models by the Use of Deep Learning Techniques”, Article, Sensors 2017, 17, 2803; doi:10.3390/s17122803.
[43]. Roshan, Dinesh et al., “Proposed System on Object Detection for Visually Impaired People”, International Journal of Information Technology (IJIT) – Volume 4 Issue 1, Mar - Apr 2018.
[44]. N. Veeranjaneyulu, Dr. K. K. Baseer, V. S. Asha, T. Madhu Prakash, “A Meta-Analysis on Obstacle Detection for Blind and Visually Impaired”, i-manager’s Journal on Pattern Recognition (Accepted), 2019.
Citation
N. Veeranjaneyulu, K.K. Baseer, V.S. Asha, T. Madhu Prakash, "A Systematic Literature Review on Obstacle Detection for Visually Impaired People", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.56-65, 2019.
A Survey on Securing Cloud Service Data by Using Homomorphic Encryption
Survey Paper | Journal Paper
Vol.07 , Issue.06 , pp.66-72, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.6672
Abstract
In Recent trends shows Cloud computing technology is adopted by many IT companies as it reduces the investment burden for infrastructure, software, hardware or any reasonably resource in a company. However, one amongst the most important problems in implementing or adopting cloud is threats due to security breaches. To ensure security, countless ancient secret writing algorithms are used like various truthful cipher mechanisms, RSA, Homomorphic secret writing etc. however these algorithms are solely accustomed to convert plain text into cipher text during transit or at storage.Homomorphic encryption can be a particular type of encryption where mathematical operations on the cipher text is like mathematical operations on the corresponding plaintext. Homomorphic encryption (HE) is fascinating on account of the particular proven fact it can operate on big databases. In this paper discussed and studied the fundamental concepts of HE, along with various homomorphic encryption schemes andtheir possible implementation in cloud computing.
Key-Words / Index Term
cloud computing,Homomorphic encryption, Security, Homomorphic Encryption in cloud computing
References
[1]. Ms. Parin V. Patel, Mr. Hitesh D. Patel, Prof. Pinal J. Patel, “A Secure Cloud using Homomorphic Encryption Scheme”, International Journal of Computer Science Research & Technology (IJCSRT) Vol. 1 Issue 1, June-2013.
[2].Maha TEBAA* ; Said EL HAJJI** University Mohammed V – Agdal, Faculty of Scienc “Homomorphic Encryption method applied to Cloud Computing” Abdellatif EL GHAZI Laboratory of Research – Institute of Vinci Rabat
[3].kamalkumarchauhan,Amit K.S Sanger ,Ajaiverma” Homomorphic encryption for data security in cloud computing”.
[4].PG Student, Maharashtra Institute Of Technology(MIT), Pune Maharashtra Institute Of Technology(MIT) Iram Ahmad 1 and ArchanaKhandekar” Homomorphic Encryption Method Applied to Cloud Computing”
Citation
J. Sai krishna, S. Muni Kumar, K. Venkataramana, "A Survey on Securing Cloud Service Data by Using Homomorphic Encryption", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.66-72, 2019.
A Brief Study on AES Technique With Double and Triple Block Cipher
Survey Paper | Journal Paper
Vol.07 , Issue.06 , pp.73-76, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.7376
Abstract
Cryptography plays an important role in data security. During digital exchange of data, it is important; data should not be access by an unauthorized user. Cryptography methods are based on symmetric and asymmetric encryption. It is challenging researchers to find out advanced encryption security development algorithm. Cryptography techniques are based on, symmetric key or private key and asymmetric key or public key. Researchers worked on secure and efficient data transmission and presented various cryptographic techniques. For secure and efficient data transmission over the network, it is necessary to use correct encryption method. Symmetric encryption is widely used technique. In this research work, we are presenting an efficient block cipher encryption techniques based on triple method and improved key. Proposed AESD method is based on block level symmetric encryption. The proposed AESD method is based on improve cubes. A pair of binary inputs are contains by each cell. The Cube can able to provide a various number of combinations, by that system will generate a strong cipher text. For efficient and strong cipher, proposed technique uses shuffling of bits in cube. Proposed AESD algorithm, performed a series of bit transformations, by using of S-BOX, operation XOR, and operation AND. The performance analysis of proposed encryption technique are compared with different existing symmetric encryptions methods, based on block cipher encryption, such as Data encryption standard, 3-Data encryption standard, Advance encryption standard, and blowfish fish, based on various comparison parameters such as encryption and decryption time, Avalanche effect and cipher text size. Simulation results clearly shows that proposed method performs outstanding in terms of encryption and decryption time, Avalanche effect and size, as compared to existing methods.
Key-Words / Index Term
Encryption, decryption, Block Cipher, DES, AESD, 3-DES, AES, Blowfish, and Encryption
References
[1] Priyadarshini Patil, Prashant Narayankar ,Narayan D G , Meena S M, “A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish”, Science Direct, Elsevier, International Conference on Information Security & Privacy (ICISP), 11-12 December 2017, Nagpur, INDIA ,PP 617-624, 2017.
[2] Guy-Armand Yandji, Lui Lian Hao,“Research on a normal file encryption and decryption”, IEEE conference, PP 978-982, 2017.
[3] P Verma, Ritu Agarwal, Dhiraj Dafouti, Shobha Tyagi,” Peformance Analysis Of Data Encryption Algorithms”, IEEE conference, PP 542-547, 2016.
[4] Sharad Boni,Jaimik Bhatt,Santosh Bhat,” Improving the Diffie-Hellman Key Exchange Algorithm by Proposing the Multiplicative Key Exchange Algorithm”, International Journal of Computer Applications (0975 – 8887)Volume 130, No.15, PP 7-11,November-2015.
[5] Manju Rani,Dr. Sudesh Kumar,”Analysis on Different Parameters of Encryption Algorithms for Information Security”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 8, PP 104-108,August 2015.
[6] Swati Kashyap, Er. Neeraj Madan,”A Review on: Network Security and Cryptographic Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 4, PP 1414-1419 ,April 2015.
[7] Prakash Kuppuswamy, Saeed Q. Y. Al-Khalidi,” Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm”, MIS Review, Vol. 19, No. 2, pp. 1-13, March (2014).
[8] Dharitri Talukdar, “Study on symmetric key encryption: An Overview”, International Journal of Applied Research, PP 543-546, 2015.
[9] Rajesh R Mane,” A Review on Cryptography Algorithms, Attacks and Encryption Tools”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 9, PP 8509-8515, September 2015.
[10] Dharitri Talukdar, Prof (Dr.) Lakshmi P. Saikia,” A Review On Different Encryption Techniques: A Comparative Study”, International Journal of Engineering Research and General Science Volume 3, Issue 3, PP 1622-1626,May-June, 2015.
[11] Obaida Mohammad Awad Al-Hazaimeh,”A new approach for complex encrypting and decrypting data”, International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, PP 96-105, March 2013.
[12] Rajdeep Bhanot and Rahul Hans, “A Review and Comparative Analysis of Various Encryption Algorithms”, International Journal of Security and Its Applications, Vol. 9, No. 4, pp. 289-306, 2015.
[13] Rashmi A. Gandhi,Atul M. Gosai,“A Study on Current Scenario of Audio Encryption”, International Journal of Computer Applications (0975 – 8887) ,Volume 116, No. 7, April 2015.
[14] Pahrul Irfan, Yudi Prayudi,Yogyakarta,Imam Riadi, Image Encryption using Combination of Chaotic System and Rivers Shamir Adleman (RSA)”, International Journal of Computer Applications (0975 -8887)Volume 123 ,No.6, August 2015.
[15] Dhishan Dhammearatchi,” Particlemagic: need for quantum Cryptography research in the south Asian region”, International Journal of Artificial Intelligence & Applications (IJAIA) Vol. 6, No. 5, PP 99-109, September 2015.
[16] Harsh Mathur, Prof.Zahid Alam,” Analysis In Symmetric And Asymmetric Cryptology Algorithm”, International Journal of Emerging Trends & Technology in Computer Science, Volume 4, Issue 1, PP 44-47,January-February 2015.
[17] Pranjala G Kolapwar,” An improved geo-encryption algorithm in location based services”, International Journal of Research in Engineering and Technology, eISSN: 2319-1163, Volume: 04 Issue: 05,547-551, May-2015.
[18] Rupinder Kaur, Dr. Madhu Goel,”Effective Symmetric Key Block Ciphers Technique for Data Security: RIJNDAEL”, International Journal of Science, Engineering and Technology Research (IJSETR), Volume 3, Issue 7,PP 224-228, July 2014.
[19] Soheila Omer AL Faroog Mohammed Koko, Dr.Amin Babiker A/Nabi Mustafa,” Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication”, IOSR Journal of Computer Engineering, Volume 17, Issue 1, Ver. III, PP 62-69, Feb. 2015.
[20] Neha,Paramjeet Singh, Shaveta Rani, “Optimal Keyless Algorithm for Security”, International Journal of Computer Applications (0975 – 8887),Volume 124 - No.10,PP28-33,, August 2015.
Citation
P. Lakshmi Devi, K. Madhusudhan Reddy, "A Brief Study on AES Technique With Double and Triple Block Cipher", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.73-76, 2019.
A Review on Data Fusion and Integration
Review Paper | Journal Paper
Vol.07 , Issue.06 , pp.77-81, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.7781
Abstract
A standout amongst the most critical and valuable element of independent versatile robots is their capacity to receive themselves to work in unstructured condition. Today robots are performing self-sufficiently in mechanical conditions, and in addition in swarmed open places. The essential necessity of a clever portable robot is to create and keep up confinement and mapping parameters to finish the unpredictable missions. In such circumstances, a few difficulties emerge because of the errors and vulnerabilities in sensor estimations. Different systems are there to deal with such commotions where the multi sensor information combination isn`t the remarkable one. Amid the last two decades, multi sensor information combinations in versatile robots turn into a prevailing worldview because of its potential favorable circumstances like decrease in vulnerability, increment in precision, and decrease of cost. This paper exhibits the detail survey of multi sensor information combination and its applications for self-ruling versatile.
Key-Words / Index Term
Autonomous Mobile Robots, Multi sensor Data Fusion, Multi sensor Integration
References
[1] N Ghosh, Y Ravi, A Patra, S Mukhopadhyay, S Paul, A Mohanty, and A Chattopadhyay. “Estimation of tool wearduring CNC milling using neural network-based sensor fusion”. Mechanical Systems and Signal Processing. 2007;21(1): 466-479.
[2] M Mucientes, DL Moreno, A Bugarin, and S Barro. “Design of a fuzzy controller in mobile robotics using genetic algorithms”. Applied Soft Computing. 2007; 7(2): 540-546.
[3] B Moshiri, M Reza Asharif, and R Hosein Nezhad. “Pseudo information measure: A new concept for extension of bayesian fusion in robotic map building”. Information Fusion. 2002; 3(1): 51-68.
[4] K Nagla, M Uddin, D Singh, and R Kumar. “Object identification in dynamic environment using sensor fusion”. in IEEE 39th Workshop on Applied Imagery Pattern Recognition Workshop (AIPR), 2010. IEEE. 2010: 1-4.
[5] DE Rumelhart, GE Hinton, and RJ Williams. “Learning representations by back-propagating errors”. Cognitive modeling. 2002; 1: 213.
[6] JW van Dam, BJ Krose, and FC Groen. “Adaptive sensor models”. in Multisensor Fusion and Integration for Intelligent Systems, 1996. IEEE/SICE/RSJ International Conference on. IEEE. 1996: 705-712.
[7] M Kam, X Zhu, and P Kalata. “Sensor fusion for mobile robot navigation”. Proceedings of the IEEE. 1997; 85(1): 108-119.
[8] YF Zheng. “Integration of multiple sensors into a robotic system and its performance evaluation”. Robotics and Automation, IEEE Transactions on. 1989; 5(5): 658-669.
[9] N Yadaiah, L Singh, RS Bapi, VS Rao, BL Deekshatulu, and A Negi. “Multisensor data fusion using neural networks”. in Neural Networks, 2006. IJCNN`06. International Joint Conference on. IEEE. 2006: 875-881.
[10] J Borenstein and Y Koren. “Histogramic in-motion mapping for mobile robot obstacle avoidance”. Robotics and Automation, IEEE Transactions on. 1991; 7(4): 535-539.
[11] M Dekhil and TC Henderson. “Instrumented logical sensor systems-practice”. in Robotics and Automation, 1998. Proceedings. 1998 IEEE International Conference on. 1998; 4: 3103-3108.
[12] H Alex, M Kumar, and B Shirazi. “Midfusion: An adaptive middleware for information fusion in sensor network applications”. Information Fusion. 2008; 9(3): 332-343.
[13] J Gonzalez, JL Blanco, C Galindo, A Ortiz-de Galisteo, JA Fernandez-Madrigal, FA Moreno, and JL Martinez. “Mobile robot localization based on ultra-wide-band ranging: A particle filter approach”. Robotics and autonomous systems. 2009; 57(5): 496-507.
[14] F Ferreira, I Amorim, R Rocha, and J Dias. “T-slam: Registering topological and geometric maps for robot localization in large environments”. in Multi sensor Fusion and Integration for Intelligent Systems, 2008. MFI 2008. IEEE International Conference on. IEEE. 2008: 392-398.
[15] A Elfes. “Using occupancy grids for mobile robot perception and navigation”. Computer. 1989; 22(6): 46-57.
[16] JJ Leonard, HF Durrant-Whyte, and IJ Cox. “Dynamic map building for an autonomous mobile robot”. The International Journal of Robotics Research. 1992; 11(4): 286-298.
[17] HF Durrant-Whyte. Integration, coordination and control of multi-sensor robot systems. Kluwer Academic Publishers, 1987.
[18] RC Luo and MG Kay. “A tutorial on multi sensor integration and fusion”. in Industrial Electronics Society, 1990. IECON`90., 16th Annual Conference of IEEE. IEEE. 1990: 707-722.
[19] DL Hall and J Llinas. “An introduction to multi sensor data fusion”. Proceedings of the IEEE. 1997; 85(1): 6-23.
[20] AN Steinberg, CL Bowman, and FE White. “Revisions to the jdl data fusion model”. in AeroSense`99. International Society for Optics and Photonics. 1999: 430-441.
[21] BV Dasarathy. “Information fusion-what, where, why, when, and how?". Information Fusion. 2001; 2(2): 75-76.
[22] S Das. High-level data fusion. Artech House, 2008.
[23] A Plascencia. Sensor fusion for autonomous mobile robot navigation. Videnbasen for Aalborg Universitet VBN, Aalborg Universitet Aalborg University, Det Teknisk Naturvidenskabelige Fakultet The Faculty of Engineering and Science, Automation & Control Automation & Control, 2007.
[24] R Araujo and AT de Almeida. “Learning sensor-based navigation of a real mobile robot in unknown worlds”.Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on. 1999; 29(2): 164-178.
[25] S Thrun. “Learning occupancy grid maps with forward sensor models”. Autonomous robots. 2003; 15(2): 111-127.
Citation
T. Roja, A. Murali Mohan Kumar, "A Review on Data Fusion and Integration", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.77-81, 2019.
A Review on Evolution of Cryptocurrencies using Blockchain
Review Paper | Journal Paper
Vol.07 , Issue.06 , pp.82-86, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.8286
Abstract
Cryptocurrency, which operates as a Peer to Peer Electronic Cash System. Cryptocurrency has a potential to be a major means of payment for e-commerce. In Cryptocurrency the word -"Crypto" refers to various encryption algorithms and cryptographic techniques are employed. Cryptocurrency has numerous latent value propositions and long-term use cases including Distributed Ledger Technology (DLT) and Blockchain innovations. This technology is not issued by any central authority and it is theoretically not effecting to any Government interference. The first Cryptocurrency based on Blockchain was Bitcoin, which is still the most popular and valuable. The success of Bitcoin brought number of competing Cryptocurrencies like -Altcoins. For example Altcoins are- Litecoin, Namecoin, Ethereum, Peercoin, Dogecoin, Monero, EOS, and Cardano etc., At present there are literally thousands of Cryptocurrencies in existence, with an aggregate market value around $200 billion. But the future of Cryptocurrency is impossible to predict, and although it is unlikely that Cryptocurrency will eliminate trusted intermediaries like Financial Payments, Settlements, Clearing, Supply Chain, Agriculture, Voting, Data Protection Mechanisms, Crowd-funding, Decentralized business applications and Services. There may be benefits of Cryptocurrencies towards hype-financed research and development in DLT and Blockchain infrastructure. The main purpose of this study is to narrate the evolution of Cryptocurrency using Blockchain Technology. The study also includes the growth of technology and the challenges that are faced at the time of development. However there are inherent difficulties in regulating the cryptocurrency market, which will be discussed in detail in this paper.
Key-Words / Index Term
Cryptocurrency, Bitcoin, Blockchain Technology, Distributed Ledger Technology, Financial Payments
References
[1]. https://enterslice.com/learning/cryptocurrencies-challenges-india
[2]. S. Manski, “Building the blockchain world: Technological commonwealth or just more of the same?” Strategic Change, vol. 26, no. 5, 2017, pp. 511-522.
[3]. https://imarticus.org/the-scpe-of-cryptocurrency-technology-in-india/
[4]. https://www.dqindia.com/scope-of-adopting-bitcoin-in-indian-market/
[5]. https://en.bitcoin.it/wiki/Bitcoin_symbol
[6]. https://www.quora.com/What-is-the-scope-of-cryptocurrency-in-India-and-what-are-its-legal-consequences
[7]. http://learningspot.altervista.org/altcoins-history-and-main-features-and-differences-from-bitcoin/altcoin_history/
[8]. Browne, R.; Kharpal, A. Cryptocurrency Market Will Hit $1 Trillion Valuation This Year, CEO of Top Exchange Says. 2018. Available online: https://www.cnbc.com/2018/02/13/cryptocurrency-market-to-hit1-trillion-valuation-in-2018-kraken-ceo.html (accessed on 30 August 2018)
[9]. Wamba, S.F.; Akter, S.; Edwards, A.; Chopin, G.; Gnanzou, D. How ‘big data’ can make big impact: Findings from a systematic review and a longitudinal case study. Int. J. Prod. Econ. 2015, 165, 234–246. [CrossRef]
[10]. Tschorsch, F.; Scheuermann, B. Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 2016, 18, 2084–2123. [CrossRef]
[11]. Demir, E.; Gozgor, G.; Lau, C.K.M.; Vigne, S.A. Does economic policy uncertainty predict the Bitcoin returns? An empirical investigation. Financ. Res. Lett. 2018, 26, 145–149. [CrossRef]
[12]. Ciaian, P.; Rajcaniova, M.; Kancs, D.A. The economics of BitCoin price formation. Appl. Econ. 2016, 48, 1799–1815. [CrossRef]
[13]. Bouri, E.; Gupta, R.; Tiwari, A.K.; Roubaud, D. Does Bitcoin hedge global uncertainty? Evidence from wavelet-based quantile-in-quantile regressions. Financ. Res. Lett. 2017, 23, 87–95. [CrossRef]
[14]. Hayes, A.S. Cryptocurrency value formation: An empirical study leading to a cost of production model for valuing bitcoin. Telemat. Inf. 2017, 34, 1308–1321. [CrossRef]
[15]. Yelowitz, A.; Wilson, M. Characteristics of Bitcoin users: An analysis of Google search data. Appl. Econ. Lett. 2015, 22, 1030–1036. [CrossRef]
[16]. Pieters, G.; Vivanco, S. Financial regulations and price inconsistencies across Bitcoin markets. Inf. Econ. Policy 2017, 39, 1–14. [CrossRef]
[17]. Bouri, E.; Gupta, R.; Lau, C.K.M.; Roubaud, D.; Wang, S. Bitcoin and global financial stress: A copula-based approach to dependence and causality in the quantiles. Q. Rev. Econ. Financ. 2018, 69, 297–307. [CrossRef]
[18]. Berke, A. How Safe Are Blockchains? It Depends. Harvard Business Review. 2017. Available online: https://hbr.org/2017/03/how-safe-are-blockchains-it-depends (accessed on 30 August 2018)
[19]. Mendling, J.; Weber, I.; Aalst, W.V.D.; Brocke, J.V.; Cabanillas, C.; Daniel, F.; Debois, S.; Di Ciccio, C.; Dumas, M.; Gal, A.; et al. Blockchains for business process management-challenges and opportunities. ACM Trans. Manag. Inf. Syst. 2018, 9. [CrossRef] 63. Kikten
Citation
K. Hema, A. Ravi Prasad, J. Kishore Kumar, "A Review on Evolution of Cryptocurrencies using Blockchain", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.82-86, 2019.
Hybrid crypto system for cloud storage security using MECC and Native bayes classifer A Review
Review Paper | Journal Paper
Vol.07 , Issue.06 , pp.87-90, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.8790
Abstract
The global ubiquity of cloud computing may expose consumer’s sensing personal data to significant privacy and security threats. A critical challenge for the cloud computing industry is to earn consumers’ trust by entering adequate privacy and security for sensitive consumer data. Regulating consumer privacy and security also challenges government enforcement of data protection laws that were designed with national borders in mind. In this paper, we present a hybrid cloud architecture which combines public cloud, private cloud computing and cryptography to minimize the bank’s operational costs, maximizing the flexibility, scalability, availability and reliability of the services provided by the bank and guarantees the privacy, confidentiality and safety of the client’s record. A smart card which contains a secret key is produced for each client upon creating a new account. A smart card which contains a pair of public/private keys is produced for each bank. A smart card which contains a secret key is produced for the auditor to decrypt the database of the banks’ public/private keys for auditing purposes. The secret key is used to encrypt and decrypt the client’s account data. The bank uses its public key to double encrypt the client’s data that are temporarily stored in the bank’s private cloud before being transmitted to be stored permanently in the public cloud. In order to perform any transaction on a client’s account, the client’s record must be retrieved from the public cloud and stored temporarily in the bank’s private cloud in order to be decrypted with the bank’s private key and then decrypted using the client’s secret key in order to perform the required transaction in the private cloud.
Key-Words / Index Term
Online banking, Hybrid cloud, Cryptography, Security
References
[1] Jun Li, Bryan Stephenson, "GEODAC: A Data Assurance Policy Specification and Enforcement Framework for Outsourced Services", In Proceedings of IEEE Transaction in Services Compuitng, Vol. 4, No. 4, Oct 2011.
[2] Tristan Groleat and Helia Pouyllau, "Distributed Learning Algorithms for Inter-NSP SLA Negotiation Management", In Proceedings of IEEE Transaction on Network and Service management, Vol. 9, No. 4, Dec 2012.
[3] Nancy J. King, V.T. Raja, "Protecting the privacy and security of sensitive customer data in the cloud", ELSEVIER Journal of Computer law & security RE, Vol. 28, No. 3, pp.308-319, June 2012.
[4] Nir Kshetri, "Privacy and security issues in cloud computing: The role of institutions and institutional evolution", ELSEVIER journal of Telecommunication policy, Vol. 37, No. 4–5, pp. 372-386, May–June 2013.
[5] Justin L. Rice, Vir V. Phoha, "Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds", In Proceeding of IEEE Transactions on Information Forensics and Security, Vol. 8, No. 6, pp. 963-972, June 2013.
[6] Lifei Wei a, Haojin Zhu, "Security and privacy for storage and computation in cloudcomputing", ELSEVIER Journal of Information Sciences, Vol. 258, pp. 371-386, Feb 2014.
[7] Gongjun Yan, Ding Wen, "Security Challenges in Vehicular Cloud Computing", In Proceedings of IEEE Transaction on Intelligent Transaction System, Vol. 14, No. 1, pp. 284-294, Mar 2013.
[8] Farrukh Shahzad, "State-of-the-art Survey on Cloud Computing Security Challenges,
Approaches and Solutions", ELSEVIER Journal of Procedia Computer Science on Applications of Ad hoc and Sensor Networks, Vol. 37, pp. 357-362, 2014.
[9] Maha TEBAA, Said EL HAJJI, "From Single to Multi-Clouds Computing Privacy and Fault
Tolerance", In Proceedings of IEEE International Journal of Future Information Engineering, Vol. 10, , pp. 112-118, 2014.
[10] Rizwana Shaikha, Dr. M. Sasikumarb, "Trust Model for Measuring Security Strength of Cloud Computing Service", ELSEVIER Journal of Advanced Computing Technologies and Applications (ICACTA), Vol. 45, pp. 380-389, 2015.
[11] Steve Jones, "Cloud computing procurement and implementation: Lessons learnt from a United Kingdom case study", ELSEVIER Journal of Information Management, Vol. 35, No. 6, pp. 712-716, Dec 2015.
[12] Changbo Ke a, Zhiqiu Huang a, "Supporting negotiation mechanism privacy authority method in cloud computing", ELSEVIER Journal of Knowledge Based Systems, Vol. 51, pp. 48-59, October 2013.
[13] Ibrahim Arpaci, Kerem Kilicer, "Effects of security and privacy concerns on educational use of cloud services", ELSEVIER Journal of Computer in Human Behaviour, Vol. 45, pp. 93-98, April 2015.
[14]Bharath K.Samanthula, YousefElmehdwi, "A secure data sharing and query processing framework via federation of cloudcomputing ", ELSEVIER Journal of Information Systems, Vol. 48, pp. 196-212, March 2015.
[15] Khaled Salah a, Jose M. Alcaraz Calero, "Analyzing the security of Windows 7 and Linux for cloud computing", ELSEVIER Journal of Computers and Security, Vol. 34, pp. 113-122, May 2013.
[16] Salim Bitam, Abdelhamid Mellouk, "Vanet-Cloud: A Generic Cloud Computing Model For Vehicular Ad Hoc Networks", In Proceedings of IEEE Wireless Communication, Vol. 22, No. 1, pp. 96-102, Jan 2015.
[17] R. Velumadhava Raoa, K. Selvamani, "Data Security Challenges and Its Solutions in Cloud Computing", ELSEVIER Journal of Procedia Computer Science, Vol. 48, pp. 204-209, 2015.
[18] Tao Jiang, Xiaofeng Chena, "Towards secure and reliable cloud storage against data reoutsourcing", ELSEVIER Journal of Future Generation Computer Systems, Vol. 52, pp. 86-94, Nove 2015.
[19] Mehdi Sookhaka, Abdullah Gania, "Dynamic remote data auditing for securing big data storage in cloud computing", ELSEVIER Journal of Information Sciences, pp. 1-16, 2015.
[20] Vijay Varadharajan, Udaya Tupakula, "Security as a Service Model for Cloud Environment", In Proceedings of IEEE Transaction on Network and Service Management, Vol. 11, No. 1, pp. 60-75, March 2014.
[21] Jin Li, Zheli Liu, "L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing", ELSEVIER Journal of Knowledge-based Systems, Vol. 79, pp. 18-26, May 2015.
[22] Hassan Rasheed, "Data and infrastructure security auditing in cloud computing environments", Vol. 34, No. 3, pp. 364-368, June 2014.
Citation
P Munichandra Reddy, "Hybrid crypto system for cloud storage security using MECC and Native bayes classifer A Review", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.87-90, 2019.
Facilitating Security Using Third Party Auditing Based on Fragmentation
Research Paper | Journal Paper
Vol.07 , Issue.06 , pp.91-94, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.9194
Abstract
In Cloud computing, which is a evolving technology, security requirement is very essentials when the services are provided by the third party venders.This paper concentrates on a well-connected association between secure cloud storage and network coding. To overcome the problem of old cryptography encoding and to provide cloud surroundings with a reliable third party. This can prevent the possibility of all information about getting hacked at one time and additionally provides access management and safe removal file. Homomorphic digital signature makes use of better technology to facilitate access to authorized users only. The proposed protocol is highly economical and provides a reasonable intrusion from an anonymous party. Hence, the overall outcome expected from these tasks is to provide information access to cloud environments. The proposed systems reduce the time required to secure the new systematic structure of the Cloud Storage Protocol and provide security in uploading and downloading files.
Key-Words / Index Term
Cloud storage auditing, network coding, security, fragmentation, user anonymity, third-party public auditing
References
[1] Fei Chen, Tao Xiang, Yuan Yang, Sherman S. M. Chow “Secure Cloud Storage Meets with Secure Network Coding” IEEE INFOCOM 2014- IEEE Conference on Computer Communications, 978-1-4799-3360-0/14/.
[2] Mazhar Ali, Saif U. R. Malik, Samee U. Khan,” DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party,” IEEE Transaction on journal name, manuscript ID IN 2015.
[3] Arjun Kumar, Byung Gook Lee, HoonJae Lee”, Secure Storage and Access of Data in Cloud Computing” 978-1- 4673-4828- 7/12/$31.00 ©2012 IEEE.
[4] Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, and Elisa Bertino,” An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds,” IEEE Transaction on knowledge and data engineering VOL. 26, NO. 9, SEPTEMBER 2014.
[5] A. Juels and B. Kaliski Jr, "PORs: Proofs of retrievability for large files," Proc. ACM Conf. Comput.Commune. Security, pp. 584-597, 2007.
[6] Ning Cao, Cong Wang, Ming Li, Kui Ren and Wenjing Lou,” Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data,” IEEE Transaction onparallel and distributed system, VOL. 25, NO. 1, JANUARY 2014.
[7] International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 128 ISSN 2229-5518 IJSER © 2013 http://www.ijser.org “The impact of different MAC protocols for Network Coding in Adhoc Network.”
[8] C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362–375, 2013.
[9] K. Yang and X. Jia, “An efficient and secure dynamic auditing protocol for data storage in cloud computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1717–1726, 2013.
[10] R. Ahlswede, N. Cai, S.-Y. Li, and R. W. Yeung, “Network information flow,” IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1204–1216, 2000
Citation
K. Sekar, G.V. Ramesh Babu, Sasidhar Sake, "Facilitating Security Using Third Party Auditing Based on Fragmentation", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.91-94, 2019.
Review Paper on Usage of Data in Cloud Computing Applications
Review Paper | Journal Paper
Vol.07 , Issue.06 , pp.95-98, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.9598
Abstract
Cloud computing is a generally ground-breaking innovation which performs enormous scale and complex processing. It takes out the prerequisite to keep up expensive registering equipment, committed space necessity and related programming. Huge development in the size of information or enormous information created through cloud registering has been distinguished. Idea of enormous information is a testing and time-requesting errand that requires a vast computational space to guarantee fruitful information preparing and examination. This paper incorporates definition, qualities, and arrangement of enormous information alongside a few dialogs on distributed computing are presented. The similitude between enormous information and distributed computing, enormous information stockpiling frameworks, a few major information handling methods and Hadoop innovation are additionally talked about. The term `Huge Data` characterizes inventive strategies and innovations to catch, store, convey, oversee and break down peta byte-or bigger measured datasets with high-speed and extraordinary structures. Huge information might be organized, unstructured or on the other hand semi-organized, bringing about ineptitude of customary information the board strategies. Information can be created from different applicable sources and can store in the framework at different rates. So as to break down these a lot of information in a cheap and effective way, parallelism method is utilized. 2015 was the year that Big Data went from being something that a larger part of associations were either doing or at the least effectively considering. The development of cloud based Enormous Data administrations has made Big Data examination an achievable reality for associations everything being equal
Key-Words / Index Term
Big Data, Big Data Analytics, Map Reduce, Hadoop, Personal Digital Assistant (PDA), Enterprise Data Warehouse (EDW)
References
[1] Umasri.M.L,Shyamalagowri.D,SureshKumar.S“Mining Big Data:- Current status and forecast to the future” Volume 4,Issue 1, January 2014 ISSN: 2277 128X.
[2] Albert Bifet,“Mining Big Data in Real Time”, informatica,2013.
[3] James Manyika, Michael Chui, Brad Brown, Jacques Bhuhin,Richard Dobbs, CharlesRoxburgh, Angela Hungh Byers, “BigData: The next frontier for innovation, competition and productivity”, June 2011.
[4] Sameera Siddiqui, Deepa Gupta,” Big Data Process and Analytics : A Survey”, InternationalJournal Of EmergingResearch in Management & Technology, ISSN: 22789359,Volume 3, Issue 7, July 2014.
[5]M.Cooper,P.Mell(2012).TacklingbigData(Online).Http://csrc.nist.gov/groups/SMA/Forum/document/June2012Presentation/f%CSM_june2012_cooper_Neul.pdf.
[6] Han Hu, YongyangNen, Tat Seng Chua, Xuelong Li,”Towards Scalable System for Big Data Analytics: A Technology Tutorial”, IEEE Access, Volume 2, Page No 653, June 2014.
[7] J.Gantz, D. Reinset,” The Digital Universe in 2020: Big Data, Bigger digital shadow, and biggest growth in the far east”, in Proc :IDC iview, IDC Anal, Future, 2012.
[8] www.ebizmba .com/articles/social-networking websites.
[9] Neil Raden,”Big Data Analytics Architecture”, Hired Brains Inc, 2012.
[10] James Manyika, Michael Chui, Brad Brown, Jacques Bhuhin, Richard Dobbs, Charles Roxburgh, Angela Hungh Byers, “Big Data: The next frontier for innovation, competition and productivity”, June 2011.
[11]Wei Fan, Albert Bifet, “Mining Big Data: Current Status and Forecast to the Future”, SIGKDD Explorations, Volume 14, Issue2.
[12] Albert Bifet“Mining Big Data In Real Time” Informatics 37(2013) 15–20 DEC 2012.
[13] Bernice Purcell “The emergence of “big data” technology and analytics” Journal of Technology Research 2013.
[14] Ritu Katara, Hareram Shah “A Novel Integrated Approach for Big Data Mining”, International Journal For Computer treands andTechnology, Volume 18, Number 5, Dec 2014.
[15] K, Chitharanjan, and Kala Karun A. "A review on hadoop, HDFS infrastructure extensions.". JeJu Island: 2013, pp. 132-137, 11-12 Apr. 2013.
Citation
E. Vani, R. Prabhakar Naidu, "Review Paper on Usage of Data in Cloud Computing Applications", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.95-98, 2019.
A Study on Secure Cloud server System using Proxy Re-Encryption Model
Survey Paper | Journal Paper
Vol.07 , Issue.06 , pp.99-102, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si6.99102
Abstract
A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated.
Key-Words / Index Term
Architecture, Construction of Secure Cloud Storage Systems
References
[1] J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, An Architecture for Global-Scale Persistent Storage,” Proc. Ninth Int’l Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 190-201, 2000.
[2] P. Druschel and A. Rowstron, “PAST: A Large-Scale, Persistent Peer-to-Peer Storage Utility,” Proc. Eighth Workshop Hot Topics in Operating System (HotOS VIII), pp. 75-80, 2001.
[3] A. Adya, W.J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J.R.Douceur, J. Howell, J.R. Lorch, M. Theimer, and R. Wattenhofer, “Farsite: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment,” Proc. Fifth Symp. Operating System Design and Implementation (OSDI), pp. 1-14, 2002.
[4] Haeberlen, A. Mislove, and P. Druschel, “Glacier: Highly Durable, Decentralized Storage Despite Massive Corr elated Failures,” Proc. Second Symp.Networked Systems Design and Implementation (NSDI), pp. 143-158, 2005.
[5] A.G. Dimakis, V. Prabhakaran, and K. Ramchandran, “Decentralized Erasure Codes for Distributed Networked Storage,” IEEE Trans. Information Theory, vol. 52, no. 6 pp. 2809-2816, June 2006.
Citation
G. Praveen, V. Ravikumar Chowdary, "A Study on Secure Cloud server System using Proxy Re-Encryption Model", International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.99-102, 2019.