DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party Abstract– Off-site data storage is an application of cloud that relieves the customers from focusing on data storage system. However, outsourcing data to a third-party administrative control entails serious security concerns. Data leakage may occur due to attacks by other users and machines in the…
DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party Abstract?Off-site data storage is an application of cloud that relieves the customers from focusing on data storage system. However, outsourcing data to a third-party administrative control entails serious security concerns. Data leakage may occur due to attacks by other users and machines in the cloud….
Data Analysis for Chronic disease ?Diabetes using Map Reduce Technique Abstract? Chronic disease endured for a long period of time.They are only be controlled but cannot be cured completely. Most of the people in the world are affected by chronic disease. In foreign countries like U.S. most of the death happens due to chronic disease….
Data as a Currency and Cloud-Based Data Lockers Abstract? Monetization strategies that are apparent to consumers include virtual goods, in-app purchases, and advertising-supported models, as the increasing number of pop-ups, pop-unders, banners, mobile, text-based, in-game, and other ad types makes clear. Such ads can be used not only to sell products and services directly, but…
Data Recovery Abstract-The data recovery process is the one of the important process in the computer field. It is more important to recover the files which are deleted without knowledge. In our process the user want to first enroll and login into the system for the secure usage of the system. After that the user…
Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything Abstract-Cloud-assisted Internet of Things (IoT) is increasingly prevalent in our society, for example in home and office environment; hence, it is also known as Cloud-assisted Internet of Everything (IoE). While in such a setup, data can be easily shared and disseminated (e.g., between a…
Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in Cloud Systems Abstract?Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in Cloud Systems. Many big-data computing applications have been deployed in cloud platforms. These applications normally demand concurrent data transfers among computing nodes for parallel processing. It is important to find the best transfer…
Data Transmission using Audio Steganography Abstract? Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So the attractive solution for this problem is Steganography, which is the art and science of writing hidden messages in such a way that no one, apart from the sender and intend…
Data-driven and Feedback-Enhanced Trust Computing Pattern for Large-scale Multi-Cloud Collaborative Services Abstract? Data-driven and Feedback-Enhanced Trust Computing Pattern for Large-scale Multi-Cloud Collaborative Services. Multi-cloud collaborative environment consists of multiple data centers, which is a typical processing platform for big data. This paper focuses on the trust computing requirement of multi-cloud collaborative services and develops a…
Decentralized Access control with Anonymous Authentication of Data Store in clouds. Decentralized storage system for accessing data with anonymous authentication provides more secure user authentication, user revocation and prevents replay attacks. Access control is processed on decentralized KDCs it is being more secure for data encryption. Generated decentralized KDC’s are then grouped by (KGC). Our…
Deduplication on Encrypted Big Data in Cloud Abstract?Cloud computing offers a new way of service provision by re-arranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data…
Exploring New Opportunities to Defeat Low-rate DDoS Attack in Container-based Cloud Environment Abstract-DDoS attacks are rampant in cloud environments and continually evolve into more sophisticated and intelligent modalities, such as low-rate DDoS attacks. But meanwhile, the cloud environment is also developing in constant. Now container technology and microservice architecture are widely applied in cloud environment…