A Novel Approach for Cloud Data Security Enhancement through Cryptography and Biometric in the Public Cloud environment
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 12
Abstract
Cloud computing takes the technology, services, and applications that are similar to those on the Internet and turns them into a self-service utility. It is the delivery of computing as a service rather than a product whereby shared resources, software and information is provided to computers. In these days a single server handles the multiple requests from the user. Here the server has to process the both the request from the user simultaneously, so the processing time will the high. This may leads to loss of data and packets may be delayed and corrupted and also the Data Management and the Services are not Trust Worthy. Users start worrying about losing control of their own data. Also the data processed on clouds are often outsourced, leading to a number of issues related to accountability, including the handling of personally identifiable information. An efficient data placement algorithm is proposed and implemented in this paper. The data placement algorithm will tell us how to place the files efficiently to the containers in object storage. Besides, the files will merge when client needs it back. So some additional algorithms are also used for partitioning and merging of files. So the objective is to achieve good security for cloud storage system, through proposed algorithm by using multiple containers of object storage in cloud. To handle these issues, the paper proposed an approach to store the data through data placement algorithm, to provide authentication and secure access control for data using Crypto-Biometric System (CBS) in cloud computing and to Protect the data from unauthorized access.
Authors and Affiliations
S. Prabu, Prof. Gopinath Ganapathy
An Improvement of Replication
Multi-processors must work,In this position paper, we disconfirm the understanding of the lookaside buffer. We disconfirm not only that 802.11 mesh networks and the memory bus are always incompatible, but that the same...
Comprehensive Study on Different Noises And De-Noising Techniques in Digital Imaging
In previous decay, denoising is a great idea in the digital image processing. It support various types of digital images that been taken from the digital cameras and CCTV cameras. In image denoising research work, vario...
Introduction and Security Applications of Computational Intelligence
Computational intelligence is the study of the design of intelligent agents. An agent is something that acts in an environment—it does something. Agents include worms, dogs, thermostats, airplanes, humans, organizations...
Facial Expression Detection using Correlation in Image Processing
Emotion intelligence in human computer interaction is increasing day by day. Human easily detect emotion can see as they are associated with mood, temperament, personality and disposition but for computer its difficult...
Preparation of Scaffold Using Rice Husk and Starch for Bone Regeneration
Bone scaffolds are used in the treatment of bone defects, various materials are widely used nowadays to produce osteoconductive tissues. The present study is framed to design and characterize a bone scaffold using rice...