Skip to main content

2018 | OriginalPaper | Buchkapitel

File Distribution Preparation with File Retrieval and Error Recovery in Cloud Environment

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Many studies have derived multiple ways to achieve security in the server and integrating the data in multiple servers by detecting the misbehavior in the server. The data is secured on server using encryption techniques before dividing into fragments before storing on virtual cloud. The fragments in which data is divided could be big or small. For encryption technique I had used Reed Solomon codes to encrypt fragmented data. After using encryption they are stored into different servers. Whenever user will challenge for its particular file, Cloud Service Provider will provide that file in original form. If that data chunk from particular file or file is corrupted on any server so using Reed Solomon Code we can repair our corrupted data or file. So, whenever attacker might attack on the server he might get small portion of that file in encrypted form which is not useful for him. He did not get original file from one server because that particular file fragments are dispersed on different servers. This ensures data security to cloud servers, cloud customers important information. It will also provide security from cloud service provider. And if any misbehavior of server is occurred or any file fragment is corrupted can be detected with automated tools and it can be also traced that on which server the file fragment is corrupted. Hence, in any way the data stored on server is more secure on cloud platform.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)CrossRef
2.
Zurück zum Zitat Ashalatha, R., Agarkhed, J., Patil, S.: Data storage security algorithms for multi cloud environment. In: 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB 2016) (2016) Ashalatha, R., Agarkhed, J., Patil, S.: Data storage security algorithms for multi cloud environment. In: 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB 2016) (2016)
3.
Zurück zum Zitat Azougaghe, A., Kartit, Z., Hedaboui, M., Belkasmi, M., El Marraki, M.: An efficient algorithm for data security in cloud storage. In: 15th International Conference on Intelligent Systems Design and Applications (ISDA) (2015) Azougaghe, A., Kartit, Z., Hedaboui, M., Belkasmi, M., El Marraki, M.: An efficient algorithm for data security in cloud storage. In: 15th International Conference on Intelligent Systems Design and Applications (ISDA) (2015)
4.
Zurück zum Zitat Gupta, R.R., Katara, S., Sarkar, M.K., Mishra, G., Agarwal, A., Das, R., Kumar, S.: Data storage security in cloud computing using container clustering. In: IEEE 7th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (2016) Gupta, R.R., Katara, S., Sarkar, M.K., Mishra, G., Agarwal, A., Das, R., Kumar, S.: Data storage security in cloud computing using container clustering. In: IEEE 7th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (2016)
5.
Zurück zum Zitat Wu, S., Xu, Y., Li, Y., Yang, Z.: I/O-Efficient scaling schemes for distributed storage systems with CRS codes. IEEE Trans. Parallel Distrib. Syst. 27(9), 2477–2491 (2016)CrossRef Wu, S., Xu, Y., Li, Y., Yang, Z.: I/O-Efficient scaling schemes for distributed storage systems with CRS codes. IEEE Trans. Parallel Distrib. Syst. 27(9), 2477–2491 (2016)CrossRef
6.
Zurück zum Zitat Liu, J.K., Liang, K., Susilo, W., Liu, J., Xiang, Y.: Two-factor data security protection mechanism for cloud storage system. IEEE Trans. Comput. 65(6), 1992–2004 (2016). IEEEMathSciNetCrossRefMATH Liu, J.K., Liang, K., Susilo, W., Liu, J., Xiang, Y.: Two-factor data security protection mechanism for cloud storage system. IEEE Trans. Comput. 65(6), 1992–2004 (2016). IEEEMathSciNetCrossRefMATH
7.
Zurück zum Zitat Shen, S.-T., Lin, H.-Y., Tzeng, W.-G.: An effective integrity check scheme for secure erasure code-based storage systems. IEEE Trans. Reliab. 64(3), 840–851 (2015)CrossRef Shen, S.-T., Lin, H.-Y., Tzeng, W.-G.: An effective integrity check scheme for secure erasure code-based storage systems. IEEE Trans. Reliab. 64(3), 840–851 (2015)CrossRef
8.
Zurück zum Zitat Mishra, V., Pateriya, R.K., Bhopal, M.: Efficient data administration with reed-Solomon code. Int. J. Sci. Res. Manag. (IJSRM) 4, 4929–4935 (2016) Mishra, V., Pateriya, R.K., Bhopal, M.: Efficient data administration with reed-Solomon code. Int. J. Sci. Res. Manag. (IJSRM) 4, 4929–4935 (2016)
9.
Zurück zum Zitat Jogdand, R.M., Goudar, R.H., Sayed, G.B., Dhamanekar, P.B.: Enabling public verifiability and availability for secure data storage in cloud computing. Evolving Syst. 6(1), 55–65 (2015)CrossRef Jogdand, R.M., Goudar, R.H., Sayed, G.B., Dhamanekar, P.B.: Enabling public verifiability and availability for secure data storage in cloud computing. Evolving Syst. 6(1), 55–65 (2015)CrossRef
12.
Zurück zum Zitat Khedkar, S.V., Gawande, A.D.: Data partitioning technique to improve cloud data storage security. Int. J. Comput. Sci. Inf. Technol. 5(3), 3347–3350 (2014) Khedkar, S.V., Gawande, A.D.: Data partitioning technique to improve cloud data storage security. Int. J. Comput. Sci. Inf. Technol. 5(3), 3347–3350 (2014)
13.
Zurück zum Zitat Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn.
14.
Zurück zum Zitat Westall, J., Martin, J.: An Introduction to Galois Fields and Reed-Solomon Coding Westall, J., Martin, J.: An Introduction to Galois Fields and Reed-Solomon Coding
15.
Zurück zum Zitat Erl, T., Mahmood, Z., Puttini, R.: Cloud Computing Concepts, Technology and Architecture Erl, T., Mahmood, Z., Puttini, R.: Cloud Computing Concepts, Technology and Architecture
16.
Zurück zum Zitat Haiping, X., Bhalerao, D.: Reliable and secure distributed cloud data storage using reed-Solomon codes. Int. J. Softw. Eng. Knowl. Eng. 25, 1611 (2015)CrossRef Haiping, X., Bhalerao, D.: Reliable and secure distributed cloud data storage using reed-Solomon codes. Int. J. Softw. Eng. Knowl. Eng. 25, 1611 (2015)CrossRef
17.
Zurück zum Zitat Ganatra, A., Panchal, G., Kosta, Y., Gajjar, C.: Initial classification through back propagation in a neural network following optimization through GA to evaluate the fitness of an algorithm. Int. J. Comput. Sci. Inf. Technol. 3(1), 98–116 (2011) Ganatra, A., Panchal, G., Kosta, Y., Gajjar, C.: Initial classification through back propagation in a neural network following optimization through GA to evaluate the fitness of an algorithm. Int. J. Comput. Sci. Inf. Technol. 3(1), 98–116 (2011)
18.
Zurück zum Zitat Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Forecasting employee retention probability using back propagation neural network algorithm. In: IEEE 2010 Second International Conference on Machine Learning and Computing (ICMLC), Bangalore, India, pp. 248–251 (2010) Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Forecasting employee retention probability using back propagation neural network algorithm. In: IEEE 2010 Second International Conference on Machine Learning and Computing (ICMLC), Bangalore, India, pp. 248–251 (2010)
19.
Zurück zum Zitat Panchal, G., Ganatra, A., Shah, P., Panchal, D.: Determination of over-learning and over-fitting problem in back propagation neural network. Int. J. Soft Comput. 2(2), 40–51 (2011)CrossRef Panchal, G., Ganatra, A., Shah, P., Panchal, D.: Determination of over-learning and over-fitting problem in back propagation neural network. Int. J. Soft Comput. 2(2), 40–51 (2011)CrossRef
20.
Zurück zum Zitat Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Behaviour analysis of multilayer perceptrons with multiple hidden neurons and hidden layers. Int. J. Comput. Theor. Eng. 3(2), 332–337 (2011)CrossRef Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Behaviour analysis of multilayer perceptrons with multiple hidden neurons and hidden layers. Int. J. Comput. Theor. Eng. 3(2), 332–337 (2011)CrossRef
21.
Zurück zum Zitat Panchal, G., Panchal, D.: Solving NP hard problems using genetic algorithm. Int. J. Comput. Sci. Inf. Technol. 6(2), 1824–1827 (2015) Panchal, G., Panchal, D.: Solving NP hard problems using genetic algorithm. Int. J. Comput. Sci. Inf. Technol. 6(2), 1824–1827 (2015)
22.
Zurück zum Zitat Panchal, G., Panchal, D.: Efficient attribute evaluation, extraction and selection techniques for data classification. Int. J. Comput. Sci. Inf. Technol. 6(2), 1828–1831 (2015) Panchal, G., Panchal, D.: Efficient attribute evaluation, extraction and selection techniques for data classification. Int. J. Comput. Sci. Inf. Technol. 6(2), 1828–1831 (2015)
23.
Zurück zum Zitat Panchal, G., Panchal, D.: Forecasting electrical load for home appliances using genetic algorithm based back propagation neural network. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1503–1506 (2015) Panchal, G., Panchal, D.: Forecasting electrical load for home appliances using genetic algorithm based back propagation neural network. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1503–1506 (2015)
24.
Zurück zum Zitat Panchal, G., Panchal, D.: Hybridization of genetic algorithm and neural network for optimization problem. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1507–1511 (2015) Panchal, G., Panchal, D.: Hybridization of genetic algorithm and neural network for optimization problem. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1507–1511 (2015)
25.
Zurück zum Zitat Panchal, G., Samanta, D.: Comparable features and same cryptography key generation using biometric fingerprint image. In: 2nd IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 1–6 (2016) Panchal, G., Samanta, D.: Comparable features and same cryptography key generation using biometric fingerprint image. In: 2nd IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 1–6 (2016)
26.
Zurück zum Zitat Panchal, G., Samanta, D.: Directional area based minutiae selection and cryptographic key generation using biometric fingerprint. In: 1st International Conference on Computational Intelligence and Informatics, pp. 1–8. Springer (2016) Panchal, G., Samanta, D.: Directional area based minutiae selection and cryptographic key generation using biometric fingerprint. In: 1st International Conference on Computational Intelligence and Informatics, pp. 1–8. Springer (2016)
27.
Zurück zum Zitat Panchal, G., Samanta, D., Barman, S.: Biometric-based cryptography for digital content protection without any key storage. In: Multimedia Tools and Application, pp. 1–18. Springer (2017) Panchal, G., Samanta, D., Barman, S.: Biometric-based cryptography for digital content protection without any key storage. In: Multimedia Tools and Application, pp. 1–18. Springer (2017)
28.
Zurück zum Zitat Panchal, G., Kosta, Y., Ganatra, A., Panchal, D.: Electrical load forecasting using genetic algorithm based back propagation network. In: 1st International Conference on Data Management, IMT Ghaziabad. MacMillan Publication (2009) Panchal, G., Kosta, Y., Ganatra, A., Panchal, D.: Electrical load forecasting using genetic algorithm based back propagation network. In: 1st International Conference on Data Management, IMT Ghaziabad. MacMillan Publication (2009)
29.
Zurück zum Zitat Patel, G., Panchal, G.: A chaff-point based approach for cancelable template generation of fingerprint data. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), p. 6 (2017) Patel, G., Panchal, G.: A chaff-point based approach for cancelable template generation of fingerprint data. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), p. 6 (2017)
30.
Zurück zum Zitat Patel, J., Panchal, G.: An IoT based portable smart meeting space with real-time room occupancy. In: International Conference on Internet of Things for Technological Development (IoT4TD-2017), pp. 1–6 (2017) Patel, J., Panchal, G.: An IoT based portable smart meeting space with real-time room occupancy. In: International Conference on Internet of Things for Technological Development (IoT4TD-2017), pp. 1–6 (2017)
31.
Zurück zum Zitat Soni, K., Panchal, G.: Data security in recommendation system using homomorphic encryption. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017) Soni, K., Panchal, G.: Data security in recommendation system using homomorphic encryption. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017)
32.
Zurück zum Zitat Patel, N., Panchal, G.: An approach to analyze data corruption and identify misbehaving server. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017) Patel, N., Panchal, G.: An approach to analyze data corruption and identify misbehaving server. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017)
33.
Zurück zum Zitat Kosta, Y., Panchal, D., Panchal, G., Ganatra, A.: Searching most efficient neural network architecture using Akaikes information criterion (AIC). Int. J. Comput. Appl. 1(5), 41–44 (2010) Kosta, Y., Panchal, D., Panchal, G., Ganatra, A.: Searching most efficient neural network architecture using Akaikes information criterion (AIC). Int. J. Comput. Appl. 1(5), 41–44 (2010)
Metadaten
Titel
File Distribution Preparation with File Retrieval and Error Recovery in Cloud Environment
verfasst von
Shital Mehta
Gaurang Panchal
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-63673-3_36

Premium Partner