Skip to main content
Top
Published in: Wireless Personal Communications 2/2018

19-01-2018

Secure Disintegration Protocol for Privacy Preserving Cloud Storage

Authors: Bharat S. Rawal, V. Vijayakumar, Gunasekaran Manogaran, R. Varatharajan, Naveen Chilamkurti

Published in: Wireless Personal Communications | Issue 2/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud service providers offer infrastructure, network services, and software applications in the cloud. The cloud services are hosted in a data center that can be used by users with the help of network connectivity. Hence, there is a need for providing security and integrity in cloud resources. Most security instruments have a finite rate of failure, and the intrusion comes with more complex and sophisticated techniques; the security failure rates are skyrocketing. In this paper, we have proposed a secure disintegration protocol (SDP) for the protection of privacy on-site and in the cloud. The architecture presented in this paper is used for cloud storage, and it is used in conjunction with our unique data compression and encoding technique. Probabilistic analysis is used for calculating the intrusion tolerance abilities for the SDP.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Wang, C., Wang, Q., Ren, K., Cao, N., & Lou, W. (2012). Toward secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing, 5(2), 220–232.CrossRef Wang, C., Wang, Q., Ren, K., Cao, N., & Lou, W. (2012). Toward secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing, 5(2), 220–232.CrossRef
3.
go back to reference Rawal, B. S., Kalutarage, H. K., Sree Vivek, S., & Pandey, K. (2016). The disintegration protocol: An ultimate technique for cloud data security. In 2016 IEEE international conference on smart cloud (in press). Rawal, B. S., Kalutarage, H. K., Sree Vivek, S., & Pandey, K. (2016). The disintegration protocol: An ultimate technique for cloud data security. In 2016 IEEE international conference on smart cloud (in press).
4.
go back to reference Madan, B. B., Banik, M., & Wu, B. C. (2016). Intrusion tolerant multi-cloud distributed storage. In 2016 IEEE international conference on smart cloud (in press). Madan, B. B., Banik, M., & Wu, B. C. (2016). Intrusion tolerant multi-cloud distributed storage. In 2016 IEEE international conference on smart cloud (in press).
5.
go back to reference Santos, C. A. R., & Matias, R. (2017) An empirical study on patterns of failure causes in a mass-market operating system. In Proceedings of the symposium on applied computing (pp. 1542–1547). ACM. Santos, C. A. R., & Matias, R. (2017) An empirical study on patterns of failure causes in a mass-market operating system. In Proceedings of the symposium on applied computing (pp. 1542–1547). ACM.
6.
go back to reference Lopez, D., & Manogaran, G. (2016). Big data architecture for climate change and disease dynamics. In G. S. Tomar et al. (Eds.), The Human element of big data: issues, analytics, and performance. Boca Raton: CRC Press. Lopez, D., & Manogaran, G. (2016). Big data architecture for climate change and disease dynamics. In G. S. Tomar et al. (Eds.), The Human element of big data: issues, analytics, and performance. Boca Raton: CRC Press.
7.
go back to reference Manogaran, G., & Lopez, D. (2017). Disease Surveillance System for Big Climate Data Processing and Dengue Transmission”. International Journal of Ambient Computing and Intelligence, 8(2), 1–25.CrossRef Manogaran, G., & Lopez, D. (2017). Disease Surveillance System for Big Climate Data Processing and Dengue Transmission”. International Journal of Ambient Computing and Intelligence, 8(2), 1–25.CrossRef
8.
go back to reference Manogaran, G., & Lopez, D. (2017). Spatial cumulative sum algorithm with big data analytics for climate change detection. Computers & Electrical Engineering. Manogaran, G., & Lopez, D. (2017). Spatial cumulative sum algorithm with big data analytics for climate change detection. Computers & Electrical Engineering.
9.
go back to reference Manogaran, G., & Lopez, D. (2017). A Gaussian process based big data processing framework in cluster computing environment. Cluster Computing, 21, 1–16. Manogaran, G., & Lopez, D. (2017). A Gaussian process based big data processing framework in cluster computing environment. Cluster Computing, 21, 1–16.
11.
go back to reference Lopez, D., Manogaran, G., & Jagan, J. (2017). Modelling the H1N1 influenza using mathematical and neural network approaches. Biomedical Research, 28(8), 1–5. Lopez, D., Manogaran, G., & Jagan, J. (2017). Modelling the H1N1 influenza using mathematical and neural network approaches. Biomedical Research, 28(8), 1–5.
12.
go back to reference Lopez, D., Gunasekaran, M., Murugan, B. S., Kaur, H., & Abbas, K. M. (2014). Spatial BigData analytics of influenza epidemic in Vellore, India. In Proceedings of 2014 IEEE international conference on big data (pp. 19–24). IEEE. Lopez, D., Gunasekaran, M., Murugan, B. S., Kaur, H., & Abbas, K. M. (2014). Spatial BigData analytics of influenza epidemic in Vellore, India. In Proceedings of 2014 IEEE international conference on big data (pp. 19–24). IEEE.
13.
go back to reference Lopez, D., & Gunasekaran, M. (2015). Assessment of vaccination strategies using fuzzy multicriteriadecision making. In Proceedings of the fifth international conference on fuzzy and neurocomputing (FANCCO-2015) (pp. 195–208). Springer International. Lopez, D., & Gunasekaran, M. (2015). Assessment of vaccination strategies using fuzzy multicriteriadecision making. In Proceedings of the fifth international conference on fuzzy and neurocomputing (FANCCO-2015) (pp. 195–208). Springer International.
15.
go back to reference Kaur, J., Gobindgarh, M., & Garg, S. (2015). S. R. I. M. T. Principal. In Survey paper on security in cloud computing. Kaur, J., Gobindgarh, M., & Garg, S. (2015). S. R. I. M. T. Principal. In Survey paper on security in cloud computing.
17.
go back to reference Samarati, P., & di Vimercati, S. D. C. (2016). Cloud security: Issues and concerns. Encyclopedia on Cloud Computing. New York: Wiley.CrossRef Samarati, P., & di Vimercati, S. D. C. (2016). Cloud security: Issues and concerns. Encyclopedia on Cloud Computing. New York: Wiley.CrossRef
18.
go back to reference Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11.CrossRef Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 1–11.CrossRef
19.
go back to reference Schneider, S., & Sundae, A. (2014). Determinant factors of cloud sourcing decisions. Journal of Information Technology, 31, 1–31.CrossRef Schneider, S., & Sundae, A. (2014). Determinant factors of cloud sourcing decisions. Journal of Information Technology, 31, 1–31.CrossRef
20.
go back to reference Lopez, D., & Sekaran, G. (2016). Climate change and disease dynamics—A big data perspective. International Journal of Infectious Diseases, 45, 23–24.CrossRef Lopez, D., & Sekaran, G. (2016). Climate change and disease dynamics—A big data perspective. International Journal of Infectious Diseases, 45, 23–24.CrossRef
21.
go back to reference Manogaran, G., Vijayakumar, V., Varatharajan, R., Kumar, P. M., Sundarasekar, R., & Hsu, C. H. (2017). Machine learning based big data processing framework for cancer diagnosis using hidden markov model and gm clustering. Wireless Personal Communications 1–18. Manogaran, G., Vijayakumar, V., Varatharajan, R., Kumar, P. M., Sundarasekar, R., & Hsu, C. H. (2017). Machine learning based big data processing framework for cancer diagnosis using hidden markov model and gm clustering. Wireless Personal Communications 1–18.
22.
go back to reference Varatharajan, R., Manogaran, G., & Priyan, M. K. (2017). A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools and Applications 1–21. Varatharajan, R., Manogaran, G., & Priyan, M. K. (2017). A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools and Applications 1–21.
23.
go back to reference Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., & Priyan, M. K. (2018). Centralized fog computing security platform for iot and cloud in healthcare system. In Exploring the convergence of big data and the internet of things (pp. 141–154). IGI Global. Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., & Priyan, M. K. (2018). Centralized fog computing security platform for iot and cloud in healthcare system. In Exploring the convergence of big data and the internet of things (pp. 141–154). IGI Global.
24.
go back to reference Manogaran, G., & Lopez, D. (2016). Health data analytics using scalable logistic regression with stochastic gradient descent. International Journal of Advanced Intelligence Paradigms, 9, 1–15. Manogaran, G., & Lopez, D. (2016). Health data analytics using scalable logistic regression with stochastic gradient descent. International Journal of Advanced Intelligence Paradigms, 9, 1–15.
25.
go back to reference Manogaran, G., Thota, C., Lopez, D., Vijayakumar, V., Abbas, K. M., & Sundarsekar, R. (2017). Big data knowledge system in healthcare. In Internet of things and big data technologies for next generation healthcare (pp. 133–157). Springer International Publishing. Manogaran, G., Thota, C., Lopez, D., Vijayakumar, V., Abbas, K. M., & Sundarsekar, R. (2017). Big data knowledge system in healthcare. In Internet of things and big data technologies for next generation healthcare (pp. 133–157). Springer International Publishing.
26.
go back to reference Manogaran, G., & Lopez, D. (2017). Disease surveillance system for big climate data processing and dengue transmission. International Journal of Ambient Computing and Intelligence (IJACI), 8(2), 88–105.CrossRef Manogaran, G., & Lopez, D. (2017). Disease surveillance system for big climate data processing and dengue transmission. International Journal of Ambient Computing and Intelligence (IJACI), 8(2), 88–105.CrossRef
27.
go back to reference Manogaran, G., Lopez, D., Thota, C., Abbas, K. M., Pyne, S., & Sundarasekar, R. (2017). Big data analytics in healthcare Internet of Things. In Innovative healthcare systems for the 21st century (pp. 263–284). Springer International Publishing. Manogaran, G., Lopez, D., Thota, C., Abbas, K. M., Pyne, S., & Sundarasekar, R. (2017). Big data analytics in healthcare Internet of Things. In Innovative healthcare systems for the 21st century (pp. 263–284). Springer International Publishing.
28.
go back to reference Manogaran, G., & Lopez, D. (2017). A survey of big data architectures and machine learning algorithms in healthcare. International Journal of Biomedical Engineering and Technology, 25(2–4), 182–211.CrossRef Manogaran, G., & Lopez, D. (2017). A survey of big data architectures and machine learning algorithms in healthcare. International Journal of Biomedical Engineering and Technology, 25(2–4), 182–211.CrossRef
29.
go back to reference Manogaran, G., Thota, C., & Lopez, D. (2018). Human-computer interaction with big data analytics. In HCI challenges and privacy preservation in big data security (pp. 1–22). IGI Global. Manogaran, G., Thota, C., & Lopez, D. (2018). Human-computer interaction with big data analytics. In HCI challenges and privacy preservation in big data security (pp. 1–22). IGI Global.
30.
go back to reference Kumar, P. M., Gandhi, U., Varatharajan, R., Manogaran, G., Jidhesh, R., & Vadivel, T. (2017). Intelligent face recognition and navigation system using neural learning for smart security in Internet of Things. Cluster Computing 1–12. Kumar, P. M., Gandhi, U., Varatharajan, R., Manogaran, G., Jidhesh, R., & Vadivel, T. (2017). Intelligent face recognition and navigation system using neural learning for smart security in Internet of Things. Cluster Computing 1–12.
31.
go back to reference Lopez, D., & Manogaran, G. (2017). Parametric model to predict H1N1 influenza in Vellore District, Tamil Nadu, India. In Handbook of Statistics (Vol. 37, pp. 301–316). Elsevier. Lopez, D., & Manogaran, G. (2017). Parametric model to predict H1N1 influenza in Vellore District, Tamil Nadu, India. In Handbook of Statistics (Vol. 37, pp. 301–316). Elsevier.
32.
go back to reference Manogaran, G., Varatharajan, R., & Priyan, M. K. (2017). Hybrid recommendation system for heart disease diagnosis based on multiple kernel learning with adaptive neuro-fuzzy inference system. Multimedia Tools and Applications 1–21. Manogaran, G., Varatharajan, R., & Priyan, M. K. (2017). Hybrid recommendation system for heart disease diagnosis based on multiple kernel learning with adaptive neuro-fuzzy inference system. Multimedia Tools and Applications 1–21.
33.
go back to reference Varatharajan, R., Manogaran, G., Priyan, M. K., Balaş, V. E., & Barna, C. (2017). Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimedia Tools and Applications 1–21. Varatharajan, R., Manogaran, G., Priyan, M. K., Balaş, V. E., & Barna, C. (2017). Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis. Multimedia Tools and Applications 1–21.
34.
go back to reference Varatharajan, R., Vasanth, K., Gunasekaran, M., Priyan, M., & Gao, X. Z. (2017). An adaptive decision based kriging interpolation algorithm for the removal of high density salt and pepper noise in images. Computers & Electrical Engineering. Varatharajan, R., Vasanth, K., Gunasekaran, M., Priyan, M., & Gao, X. Z. (2017). An adaptive decision based kriging interpolation algorithm for the removal of high density salt and pepper noise in images. Computers & Electrical Engineering.
35.
go back to reference Varatharajan, R., Manogaran, G., Priyan, M. K., & Sundarasekar, R. (2017). Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Cluster Computing 1–10. Varatharajan, R., Manogaran, G., Priyan, M. K., & Sundarasekar, R. (2017). Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm. Cluster Computing 1–10.
36.
go back to reference Varatharajan, R., Manogaran, G., & Priyan, M. K. (2017). A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools and Applications 1–21. Varatharajan, R., Manogaran, G., & Priyan, M. K. (2017). A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing. Multimedia Tools and Applications 1–21.
37.
go back to reference Manogaran, G., Varatharajan, R., Lopez, D., Kumar, P. M., Sundarasekar, R., & Thota, C. (2017). A new architecture of internet of things and big data ecosystem for secured smart healthcare monitoring and alerting. Future Generation Computer Systems. Manogaran, G., Varatharajan, R., Lopez, D., Kumar, P. M., Sundarasekar, R., & Thota, C. (2017). A new architecture of internet of things and big data ecosystem for secured smart healthcare monitoring and alerting. Future Generation Computer Systems.
38.
go back to reference Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., & Priyan, M. K. (2018). Centralized fog computing security platform for iot and cloud in healthcare system. In Exploring the convergence of big data and the internet of things (pp. 141–154). IGI Global. Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., & Priyan, M. K. (2018). Centralized fog computing security platform for iot and cloud in healthcare system. In Exploring the convergence of big data and the internet of things (pp. 141–154). IGI Global.
39.
40.
go back to reference Ratliff, Z. B., Kuhn, D. R., Kacker, R. N., Lei, Y., & Trivedi, K. S. (2016). The relationship between software bug type and number of factors involved in failures. In 2016 IEEE international symposium on software reliability engineering workshops (ISSREW) (pp. 119–124). IEEE. Ratliff, Z. B., Kuhn, D. R., Kacker, R. N., Lei, Y., & Trivedi, K. S. (2016). The relationship between software bug type and number of factors involved in failures. In 2016 IEEE international symposium on software reliability engineering workshops (ISSREW) (pp. 119–124). IEEE.
41.
go back to reference Suresh, A., & Varatharajan, R. (2017). Competent resource provisioning and distribution techniques for cloud computing environment. Cluster Computing 1–8. Suresh, A., & Varatharajan, R. (2017). Competent resource provisioning and distribution techniques for cloud computing environment. Cluster Computing 1–8.
42.
go back to reference Vishwanath, K. V., & Nagappan, N. (2010). Characterizing cloud computing hardware reliability. In Proceedings of the 1st ACM symposium on cloud computing. ACM. Vishwanath, K. V., & Nagappan, N. (2010). Characterizing cloud computing hardware reliability. In Proceedings of the 1st ACM symposium on cloud computing. ACM.
43.
go back to reference Oualha, N., Onen, M., & Roudier, Y. (2008). A security protocol for self-organizing data storage. In Tech. Rep. EURECOM+2399, Institut Eurecom, 2008, France. Oualha, N., Onen, M., & Roudier, Y. (2008). A security protocol for self-organizing data storage. In Tech. Rep. EURECOM+2399, Institut Eurecom, 2008, France.
44.
go back to reference Siam Kumar, P., & Subramanian, R. (2011). An efficient and secure protocol for ensuring data storage security in cloud computing. IJCSI International Journal of Computer Science Issues, 8(6), 1694–1814. Siam Kumar, P., & Subramanian, R. (2011). An efficient and secure protocol for ensuring data storage security in cloud computing. IJCSI International Journal of Computer Science Issues, 8(6), 1694–1814.
45.
go back to reference Deswarte, Y., Quisquater, J.-J., & Saidane, A. (2003). Remote integrity checking. In Proceedings of Conference on integrity and internal control in information systems (IICIS’03), November 2003. Lausanne, Switzerland. Deswarte, Y., Quisquater, J.-J., & Saidane, A. (2003). Remote integrity checking. In Proceedings of Conference on integrity and internal control in information systems (IICIS’03), November 2003. Lausanne, Switzerland.
46.
go back to reference Filho, D. L. G., & Barreto, P. S. L. M. (2006). Demonstrating data possession and uncheatable data transfer. Cryptology ePrint Archive, Report 2006/150, 2006, http://eprint.iacr.org/. Filho, D. L. G., & Barreto, P. S. L. M. (2006). Demonstrating data possession and uncheatable data transfer. Cryptology ePrint Archive, Report 2006/150, 2006, http://​eprint.​iacr.​org/​.
47.
go back to reference Caroni, G., & Wald Vogel, M. (2003). Establishing trust in distributed storage providers. In Third IEEE P2P Conference, Linkoping 03. Caroni, G., & Wald Vogel, M. (2003). Establishing trust in distributed storage providers. In Third IEEE P2P Conference, Linkoping 03.
48.
go back to reference Boneh, D., di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with a keyword search. In Advances in Cryptology EUROCRYPT ‘04, vol. 3027 of Lecture notes in computer science (pp. 506–522). Boneh, D., di Crescenzo, G., Ostrovsky, R., & Persiano, G. (2004). Public key encryption with a keyword search. In Advances in Cryptology EUROCRYPT ‘04, vol. 3027 of Lecture notes in computer science (pp. 506–522).
49.
go back to reference Yang, Y., Lu, H., & Weng, J. (2011). Multi-user private keyword search for cloud computing. In Proceedings of IEEE third international conference on cloud com (Vol. 29, pp. 264–271). Yang, Y., Lu, H., & Weng, J. (2011). Multi-user private keyword search for cloud computing. In Proceedings of IEEE third international conference on cloud com (Vol. 29, pp. 264–271).
50.
go back to reference Kudtarkar, P. P., Pagare, J. D., Ahire, S. R., & Pawar, T. S. (2015). Enhanced file security using encryption and splitting technique over multi-cloud environment. Kudtarkar, P. P., Pagare, J. D., Ahire, S. R., & Pawar, T. S. (2015). Enhanced file security using encryption and splitting technique over multi-cloud environment.
51.
go back to reference Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2011). Privacy preserving multi keyword ranked search over encrypted cloud data. In 30th IEEE conference on computer communications (pp. 829–837). Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2011). Privacy preserving multi keyword ranked search over encrypted cloud data. In 30th IEEE conference on computer communications (pp. 829–837).
53.
go back to reference Pancholi, V. R., & Patel, B. P. (2016). Enhancement of cloud computing security with secure data storage using AES. International Journal for Innovative Research in Science and Technology, 2(9), 18–21. Pancholi, V. R., & Patel, B. P. (2016). Enhancement of cloud computing security with secure data storage using AES. International Journal for Innovative Research in Science and Technology, 2(9), 18–21.
54.
go back to reference Nithyabharathi, P. V., Kosalya, T., & Baskar, V. (2014). To enhance multimedia security in cloud computing environment using RSA and AES. International Journal of Science Engineering and Technology Research (IJSETR), 3(2), 341–345. Nithyabharathi, P. V., Kosalya, T., & Baskar, V. (2014). To enhance multimedia security in cloud computing environment using RSA and AES. International Journal of Science Engineering and Technology Research (IJSETR), 3(2), 341–345.
55.
go back to reference Ghavghave, R. S., & Khatwar, D. M. (2015). Architecture for data security in multicloud using AES-256 encryption algorithm. International journal on recent and innovation trends in computing and communication, 3(5), 157–161. Ghavghave, R. S., & Khatwar, D. M. (2015). Architecture for data security in multicloud using AES-256 encryption algorithm. International journal on recent and innovation trends in computing and communication, 3(5), 157–161.
56.
go back to reference Arora, R., & Parashar, A. (2013). Secure user data in cloud computing using encryption algorithms. International Journal of Engineering Research and Applications (IJERA)., 3(4), 1922–1926. Arora, R., & Parashar, A. (2013). Secure user data in cloud computing using encryption algorithms. International Journal of Engineering Research and Applications (IJERA)., 3(4), 1922–1926.
57.
go back to reference Dierks, T., & Rescorla, E. (2008). The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5256. Dierks, T., & Rescorla, E. (2008). The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5256.
58.
go back to reference Dierks, T., & Rescorla, E. (2014). The Transport Layer Security (TLS) Protocol Version 1.3. Internet Draft. Dierks, T., & Rescorla, E. (2014). The Transport Layer Security (TLS) Protocol Version 1.3. Internet Draft.
59.
go back to reference Bhargavan, K., Leurent, G., Cadé, D., Blanchet, B., Paraskevopoulou, Z., & Hriţcu, C. et al. (2016). Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH. In Network and distributed system security symposium–NDSS 2016. Bhargavan, K., Leurent, G., Cadé, D., Blanchet, B., Paraskevopoulou, Z., & Hriţcu, C. et al. (2016). Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH. In Network and distributed system security symposium–NDSS 2016.
60.
go back to reference Khan, K. M., & Malluhi, Q. (2013). Trust in cloud services: Providing more controls to clients. Computer, 46(7), 94–96.CrossRef Khan, K. M., & Malluhi, Q. (2013). Trust in cloud services: Providing more controls to clients. Computer, 46(7), 94–96.CrossRef
61.
go back to reference Sunyaev, A., & Schneider, S. (2013). Cloud services certification. Communications of the ACM, 56(2), 33–36.CrossRef Sunyaev, A., & Schneider, S. (2013). Cloud services certification. Communications of the ACM, 56(2), 33–36.CrossRef
62.
go back to reference Rawal, B. S., Liang, S., Gautam, S., Kalutarage, H. K., & Vijayakumar, P. (2018). Nth order binary encoding with split-protocol. International Journal of Rough Sets and Data Analysis (IJRSDA), 5(2), 95–118. (in press).CrossRef Rawal, B. S., Liang, S., Gautam, S., Kalutarage, H. K., & Vijayakumar, P. (2018). Nth order binary encoding with split-protocol. International Journal of Rough Sets and Data Analysis (IJRSDA), 5(2), 95–118. (in press).CrossRef
64.
go back to reference Rawal, B., Karne, R., Wijesinha, A., Ramcharan, H., & Liang, S. (2012). A split protocol technique for web server migration. In 2012 IEEE 9th international conference on mobile adhoc and sensor systems (MASS) (pp. 1–6). IEEE. Rawal, B., Karne, R., Wijesinha, A., Ramcharan, H., & Liang, S. (2012). A split protocol technique for web server migration. In 2012 IEEE 9th international conference on mobile adhoc and sensor systems (MASS) (pp. 1–6). IEEE.
67.
go back to reference Bernstein, D., Ludvigson, E., Sankar, K., Diamond, S., & Morrow, M. (2009) Blueprint for the intercloud-protocols and formats for cloud computing interoperability. In Fourth international conference on internet and web applications and services, 2009. ICIW’09 (pp. 328–336). IEEE. Bernstein, D., Ludvigson, E., Sankar, K., Diamond, S., & Morrow, M. (2009) Blueprint for the intercloud-protocols and formats for cloud computing interoperability. In Fourth international conference on internet and web applications and services, 2009. ICIW’09 (pp. 328–336). IEEE.
69.
go back to reference Rawal B. S., Duan, Q., & Vijayakumar, P. Dissection of the experimental outcome of split-protocol. International Journal of Advanced Intelligence Paradigms. In the press of Inderscience Publishers. Rawal B. S., Duan, Q., & Vijayakumar, P. Dissection of the experimental outcome of split-protocol. International Journal of Advanced Intelligence Paradigms. In the press of Inderscience Publishers.
70.
go back to reference Rawal, B. S., Eberhardt, G., & Lee, J. (2016). Cybersecurity snapshot: Google, twitter, and other online databases. Journal of Advanced Computer Science & Technology, 5(1), 14–22.CrossRef Rawal, B. S., Eberhardt, G., & Lee, J. (2016). Cybersecurity snapshot: Google, twitter, and other online databases. Journal of Advanced Computer Science & Technology, 5(1), 14–22.CrossRef
Metadata
Title
Secure Disintegration Protocol for Privacy Preserving Cloud Storage
Authors
Bharat S. Rawal
V. Vijayakumar
Gunasekaran Manogaran
R. Varatharajan
Naveen Chilamkurti
Publication date
19-01-2018
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2018
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-018-5284-6

Other articles of this Issue 2/2018

Wireless Personal Communications 2/2018 Go to the issue