SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME
41
SECURE DATA SHARING THROUGH CLOUD COMPUTING
*Midya Azad Ismail, **Klinsega Jeberson
*Technical College /Kirkuk, Foundation of Technical Education,
Ministry of Higher Education and Scientific Research, Republic of Iraq
**Deptt. of Comp. Science & IT. SSET, SHIATS-DU Allahabad (U.P.) INDIA-211007
ABSTRACT
As an emerging technology and business paradigm, Cloud Computing has taken commercial
computing by storm. Cloud computing platforms provide easy access to a company’s high-
performance computing and storage infrastructure through web services. We consider the problem of
building a secure cloud storage service where the registered user could store their data and can share
them with other registered user.
But due to security reasons the uploaded file is encrypted. The advantages of this task are that
even the person who administrates is not able to read the content of uploaded file. For encrypting and
decrypting the Base64 algorithm is used. This process make our application more secure.
Another security technique is the usage of J2ME technology to implement the application.
When the user registers himself the One Time Password (OTP) will be accessed only through given
mobile number using the mobile device then after entering the OTP to the user login interface
another window will appear asking about security code which is also will be access using the mobile
device for every user login that is the security code will be arbitrary given to the user and he has no
control on it. This is the another program which is integrated with our application. It makes
application more secure.
Keywords: Cloud Computing; Security; Encryption; J2ME Technology.
1. INTRODUCTION
Information Technology has always been considered a major pain point of enterprise
organizations, from the perspectives of both cost and management. However, the information
technology industry has experienced a dramatic shift in the past decade – factors such as hardware
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 4, April (2014), pp. 41-47
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME
42
commoditization, open-source software, virtualization, workforce globalization, and agile IT
processes have supported the development of new technology and business models[4].
Cloud computing now offers organizations more choices regarding how to run
infrastructures, save costs, and delegate liabilities to third-party providers. It has become an integral
part of technology and business models, and has forced businesses to adapt to new technology
strategies[4]. Our work attempts to overcome these security threats. The proposed methodology
suggests the encryption of the files to be uploaded on the cloud. The integrity and confidentiality of
the data uploaded by the user is ensured doubly by not only encrypting it but also providing access to
the data only on successful authentication.
Cloud computing is a complex infrastructure of software, hardware, processing, and storage,
all of which are available as a service. It is comprised fundamentally of applications running
remotely (popularly referred to as “in the cloud”) which is made available to all its users. This
technology offers access to a large number of sophisticated supercomputers and their resultant
processing power, connected at numerous locations around the world, thus offering speed in the tens
of trillions of computations per second [2].
Cloud promises tangible cost savings and speed to customers. Using the technology of cloud,
a company can rapidly deploy applications where expansion and contraction of the core technology
components can be attained with the high and low of the business life cycle. This can be achieved
with the help of cloud enablers, such as virtualization and grid computing, that allow applications to
be dynamically deployed onto the most suitable infrastructure at run time. It’s worth noting that
while this might appear alluring, there remain issues of reliability, portability, privacy and security.
2. CLOUD COMPUTING
Cloud computing , or the cloud ,as shown in figure (2.1) is a colloquial expression used to
describe a variety of different types of computing concepts that involve a large number of computers
connected through a real-time communication network (typically the Internet).cloud computing is a
jargon term without a commonly accepted unequivocal scientific or technical definition. In science,
cloud computing is a synonym for distributed computing over a network and means the ability to run
a program on many connected computers at the same time. The phrase is also, more commonly used
to refer to network-based services which appear to be provided by real server hardware, which in fact
are served up by virtual hardware, simulated by software running on one or more real machines.
Such virtual servers do not physically exist and can therefore be moved around and scaled up (or
down) on the fly without affecting the end user - arguably, rather like a cloud.
Figure 2.1: Cloud System
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME
43
The popularity of the term can be attributed to its use in marketing to sell hosted services in
the sense of application service provisioning that run client server software on a remote location.
2.1 Cloud Storage
Cloud Storage, as a subservice of infrastructure as a service (IaaS) in cloud computing, is a
model of networked online storage where data is stored in virtualized pools of storage .The data
storage process can be time-consuming and costly[11]. This includes maintaining data servers,
storage disks, firewalls, backup copies and disaster- recovery provisions. My Cloud Storage reduces
these burdens, allowing you to store, retrieve, share, and analyze your data, day after day, without
worrying about maintenance, scaling up or down or hardware and firmware u upgrades[2]. Cloud
storage is shown in figure (2.8).
Figure 2.8: Cloud Storage System
3. PROPOSED WORK
Here the proposed design is a three layered architecture that will ensure the accountability
and track the usage of owner’s data. This architecture is developed to bring trust between end user
and the owner regarding the usage of data. We propose a framework which involves securing of files
through file encryption. The file present on the device will be encrypted using password based
Base64 algorithm. Every uploaded file has a unique key which should be known by the user who
want to download it and he also should know the name of the person who upload that file.
i. Fist Layer – New User Registration
• Any person could register himself for using the cloud service.
• He / She must give the basic information along with a mobile number.
ii. Second Layer – Mobile Based Authentication
• The One Time Password (OTP) will automatically generated by the user at the time of
registration.
• By using the Mobile Device Simulator the user can get the OTP.
• After entering the OTP another window will appear asking about the Security Key which the
user can get by using the Mobile Device Simulator.
iii. Third layer- Upload & Encrypt
• After login the user can upload the files on cloud server for sharing.
• At the time of uploading the files will be encrypted by using the Base64 Algorithm.
• Only after download the user can read the particular file.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME
44
3.1 Flow Chart
Figure 3.1: Flow Chart for Login Use
4. RESULT AND DISCUSSION
4.1 Result
Proposed Model has shown the best provided service when it is compare to some of the
existing Cloud Storage Websites.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME
45
4.1 Discussion
- The project is executed with high security, without login the user cannot access any kind of
service.
- The logged in user can not download a file directly he can do that only after giving the owner
name and the key of that file.
- The system has been developed by using JSP with integration with J2ME. It provides a lot of
facility for designing a good user interface as well as server side programming.
- The data has implemented by using MySql.
- Here we also use Servlets for implementing different logics.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME
46
5. SUMMARY AND CONCLUSION
I have tried my level best for creating a secure system by implementing two types of
password for user login that is OTP and secure code. the first one is get by entering the user mobile
number into the mobile device then after enter that password to the user login interface another page
is appear asking about the second password (I called it secure code) .The secure code is changed
arbitrary by the system for every user access and it cannot be changed by the user. When user upload
a file it will be uploaded with a unique key that made automatically by the system and to enable any
user to download any file from the cloud he must have the security key and the user name of that file.
I am also proving unlimited storage to a user as well as there is no registration cost. The uploaded
data is encrypted using the base64 algorithm this mean that even the person who administrates the
server is not able to read the content of uploaded file.
REFERENCES
1. Anup Mathew, "Survey Paper on Security & Privacy Issues in Cloud Storage Systems",
EECE 571B, TERM SURVEY PAPER, (2012).
2. Debajyoti Mukhopadhyay, Gitesh Sonawane et.el, "Enhanced Security for Cloud Storage
using File Encryption", Department of Information Technology Maharashtra Institute of
Technology Pune 411038, India, (2012).
3. Deepanchakaravarthi Purushothamanand, Dr.Sunitha Abburu, "An Approach for Data
Storage Security in Cloud Computing", IJCSI International Journal of Computer Science
Issues, Vol. 9, Issue 2, No 1, ISSN (Online): 1694-0814, (2012).
4. Eugene Gorelik, "Cloud Computing Models", Working Paper CISL# 2013-01 (2013).
5. Issa M. Khalil et.el, "Cloud Computing Security: A Survey", computers ISSN 2073-431X,
(2014).
6. Jijo.S. Nair, BholaNath Roy, "Data Security in Cloud", International Journal of
Computational Engineering Research (IJCER) ISSN: 2250-3005.
7. Mahima Joshi, Yudhveer Singh Moudgil, "SECURE CLOUD STORAGE", International
Journal of Computer Science & Communication Networks, Vol 1(2), 171-175,
ISSN: 2249-5789, (2011).
8. Mariana Raykova et . el, "Privacy Enhanced Access Control for Outsourced Data Sharing",
Columbia University, Department of Computer Science, New York, NY 10027-7003, USA.
9. MdMasoomRabbani, "Enhancing Accountability for Distributed Data Sharing in the Cloud",
International Journal of Engineering and Technology (IJET), Vol 5 No 3, ISSN: 0975-4024,
(2013).
10. Mohit Marwahal, Rajeev Bedi, "Applying Encryption Algorithm for Data Security and
Privacy in Cloud Computing", IJCSI International Journal of Computer Science Issues, Vol.
10, Issue 1, No 1, ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814, (2013).
11. PENG Yong, ZHAO Wei, XIE Feng, DAI Zhong-hua, GAO Yang, CHEN Dong-qing
"Secure cloud storage based on cryptographic techniques", the journal of china universities of
posts and telecommunications, 19(Suppl.2): 182-189 (2012).
12. Rich Maggiani, “Cloud Computing Is Changing How We Communicate”, In IEEE 978-1-
4244-4358-1/09, (2009).
13. Sai Vamsy et. el, "Data Synchronization Using Cloud Storage", International Journal of
Advanced Research in Computer Science and Software Engineering Volume 2, Issue 11,
ISSN: 2277 128X ,(2012).
14. Saurabh Kumar Garg and Rajkumar Buyya, "Green Cloud computing and Environmental
Sustainability", (2011).
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME
47
15. Simarjeet Kaur, "Cryptography and Encryption In Cloud Computing", VSRD International
Journal of Computer Science & Information Technology Vol. 2 (3), 242-249, (2012).
16. Talasila Sasidhar, Pavan Kumar Illa, Subrahmanyam Kodukula, "A Generalized Cloud
Storage Architecture with Backup Technology for any Cloud Storage Providers".
17. INTERNATIONAL JOURNAL OF COMPUTER APPLICATION, ISSUE 2, VOLUME 2,
ISSN: 2250-1797, (2012).
Websites
18. https://cloud.google.com/files/CloudStorage.pdf.
19. HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITION/ENCRYPTION,
ESSENTIAL GUIDE TO BUSINESS CONTINUITY AND DISASTER RECOVERY
PLANS ARTICLE PUBLISHED ON 10 JUL 2006.

Contenu connexe

Tendances

Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr_editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCSCJournals
 
Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6IAEME Publication
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGijccsa
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
IRJET- Cloud Computing Review
IRJET-  	  Cloud Computing ReviewIRJET-  	  Cloud Computing Review
IRJET- Cloud Computing ReviewIRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Cloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudCloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudSandip Karale
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...ijtsrd
 

Tendances (20)

489 493
489 493489 493
489 493
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
B1802041217
B1802041217B1802041217
B1802041217
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
70 74
70 7470 74
70 74
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
50120130405007
5012013040500750120130405007
50120130405007
 
Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTING
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
IRJET- Cloud Computing Review
IRJET-  	  Cloud Computing ReviewIRJET-  	  Cloud Computing Review
IRJET- Cloud Computing Review
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Cloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudCloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To Multicloud
 
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
Understanding the Determinants of Security and Privacy in Cloud Computing Arc...
 

En vedette

Kontrol deyimleri
Kontrol deyimleriKontrol deyimleri
Kontrol deyimleriErol Dizdar
 
Energía nuclear
Energía nuclearEnergía nuclear
Energía nuclearErymcssa
 
SAP ABAP Certification Material
SAP ABAP Certification MaterialSAP ABAP Certification Material
SAP ABAP Certification Materialerpselfhelp
 
Prog sp
Prog spProg sp
Prog sporelie
 
Quebrando a-cuca-2-multiplicac3a7c3a3o
Quebrando a-cuca-2-multiplicac3a7c3a3oQuebrando a-cuca-2-multiplicac3a7c3a3o
Quebrando a-cuca-2-multiplicac3a7c3a3oNeemias
 
Sio 2009 Eq5 L13 Tra Gold Cap11 Int
Sio 2009 Eq5 L13 Tra Gold Cap11 IntSio 2009 Eq5 L13 Tra Gold Cap11 Int
Sio 2009 Eq5 L13 Tra Gold Cap11 IntCarlos Cano
 
Efficient Parallel Pruning of Associative Rules with Optimized Search
Efficient Parallel Pruning of Associative Rules with Optimized  SearchEfficient Parallel Pruning of Associative Rules with Optimized  Search
Efficient Parallel Pruning of Associative Rules with Optimized SearchIOSR Journals
 
A New Method of Determining Instability of Linear System
A New Method of Determining Instability of Linear SystemA New Method of Determining Instability of Linear System
A New Method of Determining Instability of Linear SystemIDES Editor
 

En vedette (20)

2014 si locul lui in cariera ta
2014 si locul lui in cariera ta2014 si locul lui in cariera ta
2014 si locul lui in cariera ta
 
ShyWiki
ShyWikiShyWiki
ShyWiki
 
Kontrol deyimleri
Kontrol deyimleriKontrol deyimleri
Kontrol deyimleri
 
Mp mardoqueo so1
Mp mardoqueo so1Mp mardoqueo so1
Mp mardoqueo so1
 
Trabajo 1
Trabajo 1Trabajo 1
Trabajo 1
 
Sap bo xi r4.0
Sap bo xi r4.0Sap bo xi r4.0
Sap bo xi r4.0
 
Mian nawaz sharif pmln
Mian nawaz sharif pmlnMian nawaz sharif pmln
Mian nawaz sharif pmln
 
Version comparison print manager (nx power lite)
Version comparison print manager (nx power lite)Version comparison print manager (nx power lite)
Version comparison print manager (nx power lite)
 
Energía nuclear
Energía nuclearEnergía nuclear
Energía nuclear
 
SAP ABAP Certification Material
SAP ABAP Certification MaterialSAP ABAP Certification Material
SAP ABAP Certification Material
 
Matrizes hoje
Matrizes hojeMatrizes hoje
Matrizes hoje
 
00101
0010100101
00101
 
Prog sp
Prog spProg sp
Prog sp
 
Quebrando a-cuca-2-multiplicac3a7c3a3o
Quebrando a-cuca-2-multiplicac3a7c3a3oQuebrando a-cuca-2-multiplicac3a7c3a3o
Quebrando a-cuca-2-multiplicac3a7c3a3o
 
Sp
SpSp
Sp
 
Sio 2009 Eq5 L13 Tra Gold Cap11 Int
Sio 2009 Eq5 L13 Tra Gold Cap11 IntSio 2009 Eq5 L13 Tra Gold Cap11 Int
Sio 2009 Eq5 L13 Tra Gold Cap11 Int
 
Efficient Parallel Pruning of Associative Rules with Optimized Search
Efficient Parallel Pruning of Associative Rules with Optimized  SearchEfficient Parallel Pruning of Associative Rules with Optimized  Search
Efficient Parallel Pruning of Associative Rules with Optimized Search
 
Virtualizacion
VirtualizacionVirtualizacion
Virtualizacion
 
G04544346
G04544346G04544346
G04544346
 
A New Method of Determining Instability of Linear System
A New Method of Determining Instability of Linear SystemA New Method of Determining Instability of Linear System
A New Method of Determining Instability of Linear System
 

Similaire à 50120140504005

An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study Raman Gill
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsIRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
A premeditated cdm algorithm in cloud computing environment for fpm 2
A premeditated cdm algorithm in cloud computing environment for fpm 2A premeditated cdm algorithm in cloud computing environment for fpm 2
A premeditated cdm algorithm in cloud computing environment for fpm 2IAEME Publication
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud securityIAEME Publication
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelCloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelIJERA Editor
 

Similaire à 50120140504005 (20)

An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computing
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study    Load Balancing Tactics in Cloud Computing: A Systematic Study
Load Balancing Tactics in Cloud Computing: A Systematic Study
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
50120140503020
5012014050302050120140503020
50120140503020
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
A premeditated cdm algorithm in cloud computing environment for fpm 2
A premeditated cdm algorithm in cloud computing environment for fpm 2A premeditated cdm algorithm in cloud computing environment for fpm 2
A premeditated cdm algorithm in cloud computing environment for fpm 2
 
El35782786
El35782786El35782786
El35782786
 
Introduction to cloud security
Introduction to cloud securityIntroduction to cloud security
Introduction to cloud security
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment ModelCloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment Model
 

Plus de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Plus de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Dernier

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Dernier (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

50120140504005

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME 41 SECURE DATA SHARING THROUGH CLOUD COMPUTING *Midya Azad Ismail, **Klinsega Jeberson *Technical College /Kirkuk, Foundation of Technical Education, Ministry of Higher Education and Scientific Research, Republic of Iraq **Deptt. of Comp. Science & IT. SSET, SHIATS-DU Allahabad (U.P.) INDIA-211007 ABSTRACT As an emerging technology and business paradigm, Cloud Computing has taken commercial computing by storm. Cloud computing platforms provide easy access to a company’s high- performance computing and storage infrastructure through web services. We consider the problem of building a secure cloud storage service where the registered user could store their data and can share them with other registered user. But due to security reasons the uploaded file is encrypted. The advantages of this task are that even the person who administrates is not able to read the content of uploaded file. For encrypting and decrypting the Base64 algorithm is used. This process make our application more secure. Another security technique is the usage of J2ME technology to implement the application. When the user registers himself the One Time Password (OTP) will be accessed only through given mobile number using the mobile device then after entering the OTP to the user login interface another window will appear asking about security code which is also will be access using the mobile device for every user login that is the security code will be arbitrary given to the user and he has no control on it. This is the another program which is integrated with our application. It makes application more secure. Keywords: Cloud Computing; Security; Encryption; J2ME Technology. 1. INTRODUCTION Information Technology has always been considered a major pain point of enterprise organizations, from the perspectives of both cost and management. However, the information technology industry has experienced a dramatic shift in the past decade – factors such as hardware INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME 42 commoditization, open-source software, virtualization, workforce globalization, and agile IT processes have supported the development of new technology and business models[4]. Cloud computing now offers organizations more choices regarding how to run infrastructures, save costs, and delegate liabilities to third-party providers. It has become an integral part of technology and business models, and has forced businesses to adapt to new technology strategies[4]. Our work attempts to overcome these security threats. The proposed methodology suggests the encryption of the files to be uploaded on the cloud. The integrity and confidentiality of the data uploaded by the user is ensured doubly by not only encrypting it but also providing access to the data only on successful authentication. Cloud computing is a complex infrastructure of software, hardware, processing, and storage, all of which are available as a service. It is comprised fundamentally of applications running remotely (popularly referred to as “in the cloud”) which is made available to all its users. This technology offers access to a large number of sophisticated supercomputers and their resultant processing power, connected at numerous locations around the world, thus offering speed in the tens of trillions of computations per second [2]. Cloud promises tangible cost savings and speed to customers. Using the technology of cloud, a company can rapidly deploy applications where expansion and contraction of the core technology components can be attained with the high and low of the business life cycle. This can be achieved with the help of cloud enablers, such as virtualization and grid computing, that allow applications to be dynamically deployed onto the most suitable infrastructure at run time. It’s worth noting that while this might appear alluring, there remain issues of reliability, portability, privacy and security. 2. CLOUD COMPUTING Cloud computing , or the cloud ,as shown in figure (2.1) is a colloquial expression used to describe a variety of different types of computing concepts that involve a large number of computers connected through a real-time communication network (typically the Internet).cloud computing is a jargon term without a commonly accepted unequivocal scientific or technical definition. In science, cloud computing is a synonym for distributed computing over a network and means the ability to run a program on many connected computers at the same time. The phrase is also, more commonly used to refer to network-based services which appear to be provided by real server hardware, which in fact are served up by virtual hardware, simulated by software running on one or more real machines. Such virtual servers do not physically exist and can therefore be moved around and scaled up (or down) on the fly without affecting the end user - arguably, rather like a cloud. Figure 2.1: Cloud System
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME 43 The popularity of the term can be attributed to its use in marketing to sell hosted services in the sense of application service provisioning that run client server software on a remote location. 2.1 Cloud Storage Cloud Storage, as a subservice of infrastructure as a service (IaaS) in cloud computing, is a model of networked online storage where data is stored in virtualized pools of storage .The data storage process can be time-consuming and costly[11]. This includes maintaining data servers, storage disks, firewalls, backup copies and disaster- recovery provisions. My Cloud Storage reduces these burdens, allowing you to store, retrieve, share, and analyze your data, day after day, without worrying about maintenance, scaling up or down or hardware and firmware u upgrades[2]. Cloud storage is shown in figure (2.8). Figure 2.8: Cloud Storage System 3. PROPOSED WORK Here the proposed design is a three layered architecture that will ensure the accountability and track the usage of owner’s data. This architecture is developed to bring trust between end user and the owner regarding the usage of data. We propose a framework which involves securing of files through file encryption. The file present on the device will be encrypted using password based Base64 algorithm. Every uploaded file has a unique key which should be known by the user who want to download it and he also should know the name of the person who upload that file. i. Fist Layer – New User Registration • Any person could register himself for using the cloud service. • He / She must give the basic information along with a mobile number. ii. Second Layer – Mobile Based Authentication • The One Time Password (OTP) will automatically generated by the user at the time of registration. • By using the Mobile Device Simulator the user can get the OTP. • After entering the OTP another window will appear asking about the Security Key which the user can get by using the Mobile Device Simulator. iii. Third layer- Upload & Encrypt • After login the user can upload the files on cloud server for sharing. • At the time of uploading the files will be encrypted by using the Base64 Algorithm. • Only after download the user can read the particular file.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME 44 3.1 Flow Chart Figure 3.1: Flow Chart for Login Use 4. RESULT AND DISCUSSION 4.1 Result Proposed Model has shown the best provided service when it is compare to some of the existing Cloud Storage Websites.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME 45 4.1 Discussion - The project is executed with high security, without login the user cannot access any kind of service. - The logged in user can not download a file directly he can do that only after giving the owner name and the key of that file. - The system has been developed by using JSP with integration with J2ME. It provides a lot of facility for designing a good user interface as well as server side programming. - The data has implemented by using MySql. - Here we also use Servlets for implementing different logics.
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME 46 5. SUMMARY AND CONCLUSION I have tried my level best for creating a secure system by implementing two types of password for user login that is OTP and secure code. the first one is get by entering the user mobile number into the mobile device then after enter that password to the user login interface another page is appear asking about the second password (I called it secure code) .The secure code is changed arbitrary by the system for every user access and it cannot be changed by the user. When user upload a file it will be uploaded with a unique key that made automatically by the system and to enable any user to download any file from the cloud he must have the security key and the user name of that file. I am also proving unlimited storage to a user as well as there is no registration cost. The uploaded data is encrypted using the base64 algorithm this mean that even the person who administrates the server is not able to read the content of uploaded file. REFERENCES 1. Anup Mathew, "Survey Paper on Security & Privacy Issues in Cloud Storage Systems", EECE 571B, TERM SURVEY PAPER, (2012). 2. Debajyoti Mukhopadhyay, Gitesh Sonawane et.el, "Enhanced Security for Cloud Storage using File Encryption", Department of Information Technology Maharashtra Institute of Technology Pune 411038, India, (2012). 3. Deepanchakaravarthi Purushothamanand, Dr.Sunitha Abburu, "An Approach for Data Storage Security in Cloud Computing", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 1, ISSN (Online): 1694-0814, (2012). 4. Eugene Gorelik, "Cloud Computing Models", Working Paper CISL# 2013-01 (2013). 5. Issa M. Khalil et.el, "Cloud Computing Security: A Survey", computers ISSN 2073-431X, (2014). 6. Jijo.S. Nair, BholaNath Roy, "Data Security in Cloud", International Journal of Computational Engineering Research (IJCER) ISSN: 2250-3005. 7. Mahima Joshi, Yudhveer Singh Moudgil, "SECURE CLOUD STORAGE", International Journal of Computer Science & Communication Networks, Vol 1(2), 171-175, ISSN: 2249-5789, (2011). 8. Mariana Raykova et . el, "Privacy Enhanced Access Control for Outsourced Data Sharing", Columbia University, Department of Computer Science, New York, NY 10027-7003, USA. 9. MdMasoomRabbani, "Enhancing Accountability for Distributed Data Sharing in the Cloud", International Journal of Engineering and Technology (IJET), Vol 5 No 3, ISSN: 0975-4024, (2013). 10. Mohit Marwahal, Rajeev Bedi, "Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing", IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814, (2013). 11. PENG Yong, ZHAO Wei, XIE Feng, DAI Zhong-hua, GAO Yang, CHEN Dong-qing "Secure cloud storage based on cryptographic techniques", the journal of china universities of posts and telecommunications, 19(Suppl.2): 182-189 (2012). 12. Rich Maggiani, “Cloud Computing Is Changing How We Communicate”, In IEEE 978-1- 4244-4358-1/09, (2009). 13. Sai Vamsy et. el, "Data Synchronization Using Cloud Storage", International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 11, ISSN: 2277 128X ,(2012). 14. Saurabh Kumar Garg and Rajkumar Buyya, "Green Cloud computing and Environmental Sustainability", (2011).
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 4, April (2014), pp. 41-47 © IAEME 47 15. Simarjeet Kaur, "Cryptography and Encryption In Cloud Computing", VSRD International Journal of Computer Science & Information Technology Vol. 2 (3), 242-249, (2012). 16. Talasila Sasidhar, Pavan Kumar Illa, Subrahmanyam Kodukula, "A Generalized Cloud Storage Architecture with Backup Technology for any Cloud Storage Providers". 17. INTERNATIONAL JOURNAL OF COMPUTER APPLICATION, ISSUE 2, VOLUME 2, ISSN: 2250-1797, (2012). Websites 18. https://cloud.google.com/files/CloudStorage.pdf. 19. HTTP://SEARCHSECURITY.TECHTARGET.COM/DEFINITION/ENCRYPTION, ESSENTIAL GUIDE TO BUSINESS CONTINUITY AND DISASTER RECOVERY PLANS ARTICLE PUBLISHED ON 10 JUL 2006.