scispace - formally typeset
Search or ask a question
Author

R Gane San

Bio: R Gane San is an academic researcher from VIT University. The author has contributed to research in topics: Data security & Cloud testing. The author has an hindex of 1, co-authored 1 publications receiving 5 citations.

Papers
More filters
Proceedings ArticleDOI
T. Devi1, R Gane San1
01 Oct 2014
TL;DR: A new hybrid model for data security in cloud targets encrypting data and ensures that the proper policies are enforced and speed of processing and computational efficiency of encrypted data should also be considered since the cloud environment involves large amount of data transfer, storage and usage.
Abstract: Cloud computing provides a wide range of services to consumers with lesser investment which are delivered over Internet Security is considered to be a significant problem in the development of cloud computing which is actually an obstacle to the growth of cloud is computing The most challenging task in a shared environment like cloud is data security Cloud enables the clients to store data on remote servers thereby preventing direct control over this data Data in cloud is not controlled by the data owner So, proper data security mechanism must be maintained A new hybrid model for data security in cloud targets encrypting data and ensures that the proper policies are enforced The major objective is to transmit, store and retrieve data in a secure manner The main focus of this paper is to highlight the various encryption techniques and data integrity proofs Speed of processing and computational efficiency of encrypting data should also be considered since the cloud environment involves large amount of data transfer, storage and usage This paper presents the survey about data security in cloud computing

6 citations


Cited by
More filters
Posted Content
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Abstract: In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.A POR may be viewed as a kind of cryptographic proof of knowledge (POK), but one specially designed to handle a large file (or bitstring) F. We explore POR protocols here in which the communication costs, number of memory accesses for the prover, and storage requirements of the user (verifier) are small parameters essentially independent of the length of F. In addition to proposing new, practical POR constructions, we explore implementation considerations and optimizations that bear on previously explored, related schemes.In a POR, unlike a POK, neither the prover nor the verifier need actually have knowledge of F. PORs give rise to a new and unusual security definition whose formulation is another contribution of our work.We view PORs as an important tool for semi-trusted online archives. Existing cryptographic techniques help users ensure the privacy and integrity of files they retrieve. It is also natural, however, for users to want to verify that archives do not delete or modify files prior to retrieval. The goal of a POR is to accomplish these checks without users having to download the files themselves. A POR can also provide quality-of-service guarantees, i.e., show that a file is retrievable within a certain time bound.

1,783 citations

Book
13 Sep 2017
TL;DR: A hybrid algorithm ‘HESSIS’ is proposed to secure data while sharing and Secure hashing algorithm-3, Elliptic Curve and Advanced encryption algorithm are combined to enhance the security.
Abstract: Cloud computing has appeared as a new computing paradigm that offers a great possibility of storing information remotely. Advancements in this new technology have reduced computational cost, the expense for requisition hosting, computation, content delivery, and storage. Cloud has many advantages but has issues or threats also. Alongside that mobile devices are making major changes in the world. Users share their confidential information on an unsecured channel which is vulnerable to attack. Security is fundamental concern over cloud computing and Cryptography is one of the best techniques for protection. The main focus of this research work is to provide the high-level security to data while storing on the cloud. In existing work, security is provided to images but that security is not high level and encryption/ decryption time also increased. In this research work, a hybrid algorithm ‘HESSIS’ is proposed to secure data while sharing. In this proposed scheme Secure hashing algorithm-3, Elliptic Curve and Advanced encryption algorithm are combined to enhance the security. Parameters calculated are index building time, candidate selection time, and accuracy.

3 citations

01 Jan 2016
TL;DR: The rehabilitation of stroke patients suffering from neglect is today a time and resource heavy process for therapists and patients.
Abstract: The rehabilitation of stroke patients suffering from neglect is today a time and resource heavy process for therapists and patients. New technolog ybased methods are currently being developed to ma ...

2 citations

Dissertation
31 Aug 2015
TL;DR: This dissertation investigated two popular open source hypervisors XEN and KVM and found security flaws in each system and proposed securing the live migration process by using encryption, intrusion detection systems, role based access control and firewall rules.
Abstract: This dissertation was carried out in order to investigate the current methods for securing live virtual machine migration and to contribute to the current frameworks that currently exist. The Live migration of virtual machines is fundamental component of cloud computing. In recent years, researchers have discussed frameworks and methodologies to secure the process of live virtual machine migration. However the majority of research that is carried out to date has focused on the performance and not on security. The research that we have undertaken focuses on the security of virtual machine during migration. To fulfill this we investigated two popular open source hypervisors XEN and KVM. We found security flaws in each system and have proposed securing the live migration process by using encryption, intrusion detection systems, role based access control and firewall rules. We recommend that XEN is the more secure of the two systems available.