Skip to main content
Top

2018 | OriginalPaper | Chapter

File Distribution Preparation with File Retrieval and Error Recovery in Cloud Environment

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Many studies have derived multiple ways to achieve security in the server and integrating the data in multiple servers by detecting the misbehavior in the server. The data is secured on server using encryption techniques before dividing into fragments before storing on virtual cloud. The fragments in which data is divided could be big or small. For encryption technique I had used Reed Solomon codes to encrypt fragmented data. After using encryption they are stored into different servers. Whenever user will challenge for its particular file, Cloud Service Provider will provide that file in original form. If that data chunk from particular file or file is corrupted on any server so using Reed Solomon Code we can repair our corrupted data or file. So, whenever attacker might attack on the server he might get small portion of that file in encrypted form which is not useful for him. He did not get original file from one server because that particular file fragments are dispersed on different servers. This ensures data security to cloud servers, cloud customers important information. It will also provide security from cloud service provider. And if any misbehavior of server is occurred or any file fragment is corrupted can be detected with automated tools and it can be also traced that on which server the file fragment is corrupted. Hence, in any way the data stored on server is more secure on cloud platform.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef
2.
go back to reference Ashalatha, R., Agarkhed, J., Patil, S.: Data storage security algorithms for multi cloud environment. In: 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB 2016) (2016) Ashalatha, R., Agarkhed, J., Patil, S.: Data storage security algorithms for multi cloud environment. In: 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB 2016) (2016)
3.
go back to reference Azougaghe, A., Kartit, Z., Hedaboui, M., Belkasmi, M., El Marraki, M.: An efficient algorithm for data security in cloud storage. In: 15th International Conference on Intelligent Systems Design and Applications (ISDA) (2015) Azougaghe, A., Kartit, Z., Hedaboui, M., Belkasmi, M., El Marraki, M.: An efficient algorithm for data security in cloud storage. In: 15th International Conference on Intelligent Systems Design and Applications (ISDA) (2015)
4.
go back to reference Gupta, R.R., Katara, S., Sarkar, M.K., Mishra, G., Agarwal, A., Das, R., Kumar, S.: Data storage security in cloud computing using container clustering. In: IEEE 7th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (2016) Gupta, R.R., Katara, S., Sarkar, M.K., Mishra, G., Agarwal, A., Das, R., Kumar, S.: Data storage security in cloud computing using container clustering. In: IEEE 7th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (2016)
5.
go back to reference Wu, S., Xu, Y., Li, Y., Yang, Z.: I/O-Efficient scaling schemes for distributed storage systems with CRS codes. IEEE Trans. Parallel Distrib. Syst. 27(9), 2477–2491 (2016)CrossRef Wu, S., Xu, Y., Li, Y., Yang, Z.: I/O-Efficient scaling schemes for distributed storage systems with CRS codes. IEEE Trans. Parallel Distrib. Syst. 27(9), 2477–2491 (2016)CrossRef
6.
go back to reference Liu, J.K., Liang, K., Susilo, W., Liu, J., Xiang, Y.: Two-factor data security protection mechanism for cloud storage system. IEEE Trans. Comput. 65(6), 1992–2004 (2016). IEEEMathSciNetCrossRefMATH Liu, J.K., Liang, K., Susilo, W., Liu, J., Xiang, Y.: Two-factor data security protection mechanism for cloud storage system. IEEE Trans. Comput. 65(6), 1992–2004 (2016). IEEEMathSciNetCrossRefMATH
7.
go back to reference Shen, S.-T., Lin, H.-Y., Tzeng, W.-G.: An effective integrity check scheme for secure erasure code-based storage systems. IEEE Trans. Reliab. 64(3), 840–851 (2015)CrossRef Shen, S.-T., Lin, H.-Y., Tzeng, W.-G.: An effective integrity check scheme for secure erasure code-based storage systems. IEEE Trans. Reliab. 64(3), 840–851 (2015)CrossRef
8.
go back to reference Mishra, V., Pateriya, R.K., Bhopal, M.: Efficient data administration with reed-Solomon code. Int. J. Sci. Res. Manag. (IJSRM) 4, 4929–4935 (2016) Mishra, V., Pateriya, R.K., Bhopal, M.: Efficient data administration with reed-Solomon code. Int. J. Sci. Res. Manag. (IJSRM) 4, 4929–4935 (2016)
9.
go back to reference Jogdand, R.M., Goudar, R.H., Sayed, G.B., Dhamanekar, P.B.: Enabling public verifiability and availability for secure data storage in cloud computing. Evolving Syst. 6(1), 55–65 (2015)CrossRef Jogdand, R.M., Goudar, R.H., Sayed, G.B., Dhamanekar, P.B.: Enabling public verifiability and availability for secure data storage in cloud computing. Evolving Syst. 6(1), 55–65 (2015)CrossRef
12.
go back to reference Khedkar, S.V., Gawande, A.D.: Data partitioning technique to improve cloud data storage security. Int. J. Comput. Sci. Inf. Technol. 5(3), 3347–3350 (2014) Khedkar, S.V., Gawande, A.D.: Data partitioning technique to improve cloud data storage security. Int. J. Comput. Sci. Inf. Technol. 5(3), 3347–3350 (2014)
13.
go back to reference Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn.
14.
go back to reference Westall, J., Martin, J.: An Introduction to Galois Fields and Reed-Solomon Coding Westall, J., Martin, J.: An Introduction to Galois Fields and Reed-Solomon Coding
15.
go back to reference Erl, T., Mahmood, Z., Puttini, R.: Cloud Computing Concepts, Technology and Architecture Erl, T., Mahmood, Z., Puttini, R.: Cloud Computing Concepts, Technology and Architecture
16.
go back to reference Haiping, X., Bhalerao, D.: Reliable and secure distributed cloud data storage using reed-Solomon codes. Int. J. Softw. Eng. Knowl. Eng. 25, 1611 (2015)CrossRef Haiping, X., Bhalerao, D.: Reliable and secure distributed cloud data storage using reed-Solomon codes. Int. J. Softw. Eng. Knowl. Eng. 25, 1611 (2015)CrossRef
17.
go back to reference Ganatra, A., Panchal, G., Kosta, Y., Gajjar, C.: Initial classification through back propagation in a neural network following optimization through GA to evaluate the fitness of an algorithm. Int. J. Comput. Sci. Inf. Technol. 3(1), 98–116 (2011) Ganatra, A., Panchal, G., Kosta, Y., Gajjar, C.: Initial classification through back propagation in a neural network following optimization through GA to evaluate the fitness of an algorithm. Int. J. Comput. Sci. Inf. Technol. 3(1), 98–116 (2011)
18.
go back to reference Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Forecasting employee retention probability using back propagation neural network algorithm. In: IEEE 2010 Second International Conference on Machine Learning and Computing (ICMLC), Bangalore, India, pp. 248–251 (2010) Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Forecasting employee retention probability using back propagation neural network algorithm. In: IEEE 2010 Second International Conference on Machine Learning and Computing (ICMLC), Bangalore, India, pp. 248–251 (2010)
19.
go back to reference Panchal, G., Ganatra, A., Shah, P., Panchal, D.: Determination of over-learning and over-fitting problem in back propagation neural network. Int. J. Soft Comput. 2(2), 40–51 (2011)CrossRef Panchal, G., Ganatra, A., Shah, P., Panchal, D.: Determination of over-learning and over-fitting problem in back propagation neural network. Int. J. Soft Comput. 2(2), 40–51 (2011)CrossRef
20.
go back to reference Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Behaviour analysis of multilayer perceptrons with multiple hidden neurons and hidden layers. Int. J. Comput. Theor. Eng. 3(2), 332–337 (2011)CrossRef Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Behaviour analysis of multilayer perceptrons with multiple hidden neurons and hidden layers. Int. J. Comput. Theor. Eng. 3(2), 332–337 (2011)CrossRef
21.
go back to reference Panchal, G., Panchal, D.: Solving NP hard problems using genetic algorithm. Int. J. Comput. Sci. Inf. Technol. 6(2), 1824–1827 (2015) Panchal, G., Panchal, D.: Solving NP hard problems using genetic algorithm. Int. J. Comput. Sci. Inf. Technol. 6(2), 1824–1827 (2015)
22.
go back to reference Panchal, G., Panchal, D.: Efficient attribute evaluation, extraction and selection techniques for data classification. Int. J. Comput. Sci. Inf. Technol. 6(2), 1828–1831 (2015) Panchal, G., Panchal, D.: Efficient attribute evaluation, extraction and selection techniques for data classification. Int. J. Comput. Sci. Inf. Technol. 6(2), 1828–1831 (2015)
23.
go back to reference Panchal, G., Panchal, D.: Forecasting electrical load for home appliances using genetic algorithm based back propagation neural network. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1503–1506 (2015) Panchal, G., Panchal, D.: Forecasting electrical load for home appliances using genetic algorithm based back propagation neural network. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1503–1506 (2015)
24.
go back to reference Panchal, G., Panchal, D.: Hybridization of genetic algorithm and neural network for optimization problem. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1507–1511 (2015) Panchal, G., Panchal, D.: Hybridization of genetic algorithm and neural network for optimization problem. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1507–1511 (2015)
25.
go back to reference Panchal, G., Samanta, D.: Comparable features and same cryptography key generation using biometric fingerprint image. In: 2nd IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 1–6 (2016) Panchal, G., Samanta, D.: Comparable features and same cryptography key generation using biometric fingerprint image. In: 2nd IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 1–6 (2016)
26.
go back to reference Panchal, G., Samanta, D.: Directional area based minutiae selection and cryptographic key generation using biometric fingerprint. In: 1st International Conference on Computational Intelligence and Informatics, pp. 1–8. Springer (2016) Panchal, G., Samanta, D.: Directional area based minutiae selection and cryptographic key generation using biometric fingerprint. In: 1st International Conference on Computational Intelligence and Informatics, pp. 1–8. Springer (2016)
27.
go back to reference Panchal, G., Samanta, D., Barman, S.: Biometric-based cryptography for digital content protection without any key storage. In: Multimedia Tools and Application, pp. 1–18. Springer (2017) Panchal, G., Samanta, D., Barman, S.: Biometric-based cryptography for digital content protection without any key storage. In: Multimedia Tools and Application, pp. 1–18. Springer (2017)
28.
go back to reference Panchal, G., Kosta, Y., Ganatra, A., Panchal, D.: Electrical load forecasting using genetic algorithm based back propagation network. In: 1st International Conference on Data Management, IMT Ghaziabad. MacMillan Publication (2009) Panchal, G., Kosta, Y., Ganatra, A., Panchal, D.: Electrical load forecasting using genetic algorithm based back propagation network. In: 1st International Conference on Data Management, IMT Ghaziabad. MacMillan Publication (2009)
29.
go back to reference Patel, G., Panchal, G.: A chaff-point based approach for cancelable template generation of fingerprint data. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), p. 6 (2017) Patel, G., Panchal, G.: A chaff-point based approach for cancelable template generation of fingerprint data. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), p. 6 (2017)
30.
go back to reference Patel, J., Panchal, G.: An IoT based portable smart meeting space with real-time room occupancy. In: International Conference on Internet of Things for Technological Development (IoT4TD-2017), pp. 1–6 (2017) Patel, J., Panchal, G.: An IoT based portable smart meeting space with real-time room occupancy. In: International Conference on Internet of Things for Technological Development (IoT4TD-2017), pp. 1–6 (2017)
31.
go back to reference Soni, K., Panchal, G.: Data security in recommendation system using homomorphic encryption. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017) Soni, K., Panchal, G.: Data security in recommendation system using homomorphic encryption. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017)
32.
go back to reference Patel, N., Panchal, G.: An approach to analyze data corruption and identify misbehaving server. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017) Patel, N., Panchal, G.: An approach to analyze data corruption and identify misbehaving server. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017)
33.
go back to reference Kosta, Y., Panchal, D., Panchal, G., Ganatra, A.: Searching most efficient neural network architecture using Akaikes information criterion (AIC). Int. J. Comput. Appl. 1(5), 41–44 (2010) Kosta, Y., Panchal, D., Panchal, G., Ganatra, A.: Searching most efficient neural network architecture using Akaikes information criterion (AIC). Int. J. Comput. Appl. 1(5), 41–44 (2010)
Metadata
Title
File Distribution Preparation with File Retrieval and Error Recovery in Cloud Environment
Authors
Shital Mehta
Gaurang Panchal
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-63673-3_36

Premium Partner