Skip to main content

2018 | OriginalPaper | Buchkapitel

An Approach to Analyze Data Corruption and Identify Misbehaving Server

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Many studies have derived multiple ways to achieve security in the server and integrating the data in multiple servers by detecting the misbehavior in the server. The data is secured on server using encryption techniques before dividing into fragments before storing on virtual cloud. This study focuses different perspective of storing data on virtual cloud to maintain integrity by storing the fragments of address of data. Hence, the data remains secure and only the address of the data is transmitted when divided in fragments and data is secured with encryption, so it would be difficult for third party to decrypt and access on server. Thus, security level has been increased on cloud platform though data stored on server is more secure and integrity is maintained throughout the cloud platform.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Du, R., Deng, L., Chen, J., He, K., Zheng, M.: Proofs of ownership and retrievability in cloud storage. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 328–331 (2014) Du, R., Deng, L., Chen, J., He, K., Zheng, M.: Proofs of ownership and retrievability in cloud storage. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 328–331 (2014)
2.
Zurück zum Zitat Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–366, 372–373 (2013) Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–366, 372–373 (2013)
3.
Zurück zum Zitat Jeeva Rathanam, G., Sumalatha, M.R.: Dynamics secure storage system in cloud services. In: 2014 International Conference on Recent Trends in Informational Technology, pp. 1–5 (2014) Jeeva Rathanam, G., Sumalatha, M.R.: Dynamics secure storage system in cloud services. In: 2014 International Conference on Recent Trends in Informational Technology, pp. 1–5 (2014)
4.
Zurück zum Zitat Shen, S.-T., Lin, H.-Y., Tzeng, W.-G.: An effective integrity check scheme for secure erasure code-based storage systems. IEEE Trans. Reliabilty 64(3), 841–844 (2015) Shen, S.-T., Lin, H.-Y., Tzeng, W.-G.: An effective integrity check scheme for secure erasure code-based storage systems. IEEE Trans. Reliabilty 64(3), 841–844 (2015)
5.
Zurück zum Zitat Derfouf, M., Mimoumi, A., Eleuldj, M.: Vulnerabilities and Storage Security in Cloud Computing, pp. 2–5. IEEE (2015) Derfouf, M., Mimoumi, A., Eleuldj, M.: Vulnerabilities and Storage Security in Cloud Computing, pp. 2–5. IEEE (2015)
6.
Zurück zum Zitat Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Towards secure and dependable storage services in cloud computing, pp. 1–6, 11–13. IEEE (2012) Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Towards secure and dependable storage services in cloud computing, pp. 1–6, 11–13. IEEE (2012)
7.
Zurück zum Zitat Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Ensuring data storage security in cloud computing. In: Proceedings Of IWQos 2009, pp. 1–9, July 2009 Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Ensuring data storage security in cloud computing. In: Proceedings Of IWQos 2009, pp. 1–9, July 2009
8.
Zurück zum Zitat Feng, B., Ma, X., Guo, C., Shi, H., Fu, Z., Qiu, T.: An efficient protocol with bidirectional verification for storage security in cloud computing, pp. 2–6. IEEE Access (2016) Feng, B., Ma, X., Guo, C., Shi, H., Fu, Z., Qiu, T.: An efficient protocol with bidirectional verification for storage security in cloud computing, pp. 2–6. IEEE Access (2016)
9.
Zurück zum Zitat Li, J., Zhou, K., Ren, J.: Security and efficiency trade-offs for cloud computing and storage, 15, pp. 148–150. IEEE (2015). ISBN 978-1-4799-8594-4 Li, J., Zhou, K., Ren, J.: Security and efficiency trade-offs for cloud computing and storage, 15, pp. 148–150. IEEE (2015). ISBN 978-1-4799-8594-4
10.
Zurück zum Zitat Ashalatha, R., Agarkhed, J., Patil, S.: Data storage security algorithms for multi cloud environment. In: International Conference on Advances in Electrical, Information, Communication and Bio-Informatics (AEEICB 2016), pp. 697–699 (2016) Ashalatha, R., Agarkhed, J., Patil, S.: Data storage security algorithms for multi cloud environment. In: International Conference on Advances in Electrical, Information, Communication and Bio-Informatics (AEEICB 2016), pp. 697–699 (2016)
16.
Zurück zum Zitat A. Juels, Kaliski Jr., B.S.: Pors: proofs of retrievaility for large files. In: Proceedings Of CCS 2007, Alexabdria, VA, pp. 584–597, October 2007 A. Juels, Kaliski Jr., B.S.: Pors: proofs of retrievaility for large files. In: Proceedings Of CCS 2007, Alexabdria, VA, pp. 584–597, October 2007
17.
Zurück zum Zitat Ganatra, A., Panchal, G., Kosta, Y., Gajjar, C.: Initial classification through back propagation in a neural network following optimization through GA to evaluate the fitness of an algorithm. Int. J. Comput. Sci. Inf. Technol. 3(1), 98–116 (2011) Ganatra, A., Panchal, G., Kosta, Y., Gajjar, C.: Initial classification through back propagation in a neural network following optimization through GA to evaluate the fitness of an algorithm. Int. J. Comput. Sci. Inf. Technol. 3(1), 98–116 (2011)
18.
Zurück zum Zitat Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Forecasting employee retention probability using back propagation neural network algorithm. IEEE 2010 Second International Conference on Machine Learning and Computing (ICMLC), Bangalore, India, pp. 248–251 (2010) Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Forecasting employee retention probability using back propagation neural network algorithm. IEEE 2010 Second International Conference on Machine Learning and Computing (ICMLC), Bangalore, India, pp. 248–251 (2010)
19.
Zurück zum Zitat Panchal, G., Ganatra, A., Shah, P., Panchal, D.: Determination of over-learning and over-fitting problem in back propagation neural network. Int. J. Soft Comput. 2(2), 40–51 (2011)CrossRef Panchal, G., Ganatra, A., Shah, P., Panchal, D.: Determination of over-learning and over-fitting problem in back propagation neural network. Int. J. Soft Comput. 2(2), 40–51 (2011)CrossRef
20.
Zurück zum Zitat Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Behaviour analysis of multilayer perceptrons with multiple hidden neurons and hidden layers. Int. J. Comput. Theory Eng. 3(2), 332–337 (2011)CrossRef Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Behaviour analysis of multilayer perceptrons with multiple hidden neurons and hidden layers. Int. J. Comput. Theory Eng. 3(2), 332–337 (2011)CrossRef
21.
Zurück zum Zitat Panchal, G., Panchal, D.: Solving NP hard problems using genetic algorithm. Int. J. Comput. Sci. Inf. Technol. 6(2), 1824–1827 (2015) Panchal, G., Panchal, D.: Solving NP hard problems using genetic algorithm. Int. J. Comput. Sci. Inf. Technol. 6(2), 1824–1827 (2015)
22.
Zurück zum Zitat Panchal, G., Panchal, D.: Efficient attribute evaluation, extraction and selection techniques for data classification. Int. J. Comput. Sci. Inf. Technol. 6(2), 1828–1831 (2015) Panchal, G., Panchal, D.: Efficient attribute evaluation, extraction and selection techniques for data classification. Int. J. Comput. Sci. Inf. Technol. 6(2), 1828–1831 (2015)
23.
Zurück zum Zitat Panchal, G., Panchal, D.: Forecasting electrical load for home appliances using genetic algorithm based back propagation neural network. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1503–1506 (2015) Panchal, G., Panchal, D.: Forecasting electrical load for home appliances using genetic algorithm based back propagation neural network. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1503–1506 (2015)
24.
Zurück zum Zitat Panchal, G., Panchal, D.: Hybridization of genetic algorithm and neural network for optimization problem. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1507–1511 (2015) Panchal, G., Panchal, D.: Hybridization of genetic algorithm and neural network for optimization problem. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1507–1511 (2015)
25.
Zurück zum Zitat Panchal, G., Samanta, D.: Comparable features and same cryptography key generation using biometric fingerprint image. In: 2nd IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 1–6 (2016) Panchal, G., Samanta, D.: Comparable features and same cryptography key generation using biometric fingerprint image. In: 2nd IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 1–6 (2016)
26.
Zurück zum Zitat Panchal, G., Samanta, D.: Directional area based minutiae selection and cryptographic key generation using biometric fingerprint. In: 1st International Conference on Computational Intelligence and Informatics, pp. 1–8. Springer (2016) Panchal, G., Samanta, D.: Directional area based minutiae selection and cryptographic key generation using biometric fingerprint. In: 1st International Conference on Computational Intelligence and Informatics, pp. 1–8. Springer (2016)
27.
Zurück zum Zitat Panchal, G., Samanta, D., Barman, S.: Biometric-based cryptography for digital content protection without any key storage, pp. 1–18. Springer (Multimedia Tools and Application) (2017) Panchal, G., Samanta, D., Barman, S.: Biometric-based cryptography for digital content protection without any key storage, pp. 1–18. Springer (Multimedia Tools and Application) (2017)
28.
Zurück zum Zitat Panchal, G., Kosta, Y., Ganatra, A., Panchal, D.: Electrical load forecasting using genetic algorithm based back propagation network. In: 1st International Conference on Data Management, IMT Ghaziabad. MacMillan Publication (2009) Panchal, G., Kosta, Y., Ganatra, A., Panchal, D.: Electrical load forecasting using genetic algorithm based back propagation network. In: 1st International Conference on Data Management, IMT Ghaziabad. MacMillan Publication (2009)
29.
Zurück zum Zitat Patel, G., Panchal, G.: A chaff-point based approach for cancelable template generation of fingerprint data. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), p. 6 (2017) Patel, G., Panchal, G.: A chaff-point based approach for cancelable template generation of fingerprint data. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), p. 6 (2017)
30.
Zurück zum Zitat Patel, J., Panchal, G.: An IOT based portable smart meeting space with real-time room occupancy. In: International Conference on Internet of Things for Technological Development (IoT4TD-2017), pp. 1–6 (2017) Patel, J., Panchal, G.: An IOT based portable smart meeting space with real-time room occupancy. In: International Conference on Internet of Things for Technological Development (IoT4TD-2017), pp. 1–6 (2017)
31.
Zurück zum Zitat Soni, K., Panchal, G.: Data security in recommendation system using homomorphic encryption. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017) Soni, K., Panchal, G.: Data security in recommendation system using homomorphic encryption. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017)
32.
Zurück zum Zitat Bhimani, P., Panchal, G.: Message delivery guarantee and status up- date of clients based on IOT-AMQP. In: International Conference on Internet of Things for Technological Development (IoT4TD-2017), pp. 1–6 (2017) Bhimani, P., Panchal, G.: Message delivery guarantee and status up- date of clients based on IOT-AMQP. In: International Conference on Internet of Things for Technological Development (IoT4TD-2017), pp. 1–6 (2017)
33.
Zurück zum Zitat Mehta, S., Panchal, G.: File distribution preparation with file retrieval and error recovery in cloud environment. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), p. 6 (2017) Mehta, S., Panchal, G.: File distribution preparation with file retrieval and error recovery in cloud environment. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), p. 6 (2017)
34.
Zurück zum Zitat Kosta, Y., Panchal, D., Panchal, G., Ganatra, A.: Searching most efficient neural network architecture using Akaikes information criterion (AIC). Int. J. Comput. Appl. 1(5), 41–44 (2010) Kosta, Y., Panchal, D., Panchal, G., Ganatra, A.: Searching most efficient neural network architecture using Akaikes information criterion (AIC). Int. J. Comput. Appl. 1(5), 41–44 (2010)
Metadaten
Titel
An Approach to Analyze Data Corruption and Identify Misbehaving Server
verfasst von
Nishi Patel
Gaurang Panchal
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-63673-3_33

Premium Partner