scispace - formally typeset
Book ChapterDOI

Server Security in Cloud Computing Using Block-Chaining Technique

Reads0
Chats0
TLDR
This project is aiming to implement an encryption algorithm which works on the principles of block-chains, to ensure the security and integrity of a cloud-based system.
Abstract
Data security is a key concern in cloud computing . With the increase in attempts to hack a virtual cloud server in order to access the data stored there privately, more and more measures are being taken to ensure a reliable and secure cloud. Enhancements are made on traditional cryptography algorithms so that they are more suited to the distributed, virtual and multi-tenant environment of the cloud. Block-chaining is the newest technique in the fields of computing. It is basically a growing list of records, called as “blocks”, which are linked and secured using cryptography. In this project, we are aiming to implement an encryption algorithm which works on the principles of block-chains, to ensure the security and integrity of a cloud-based system. The infallible nature of block-chains is what makes it perfect for cloud server security.

read more

Citations
More filters
Journal ArticleDOI

A Recent Survey on Internet of Things (IoT) Communication Protocols

TL;DR: Various communication protocols, namely Zigbee, Bluetooth, Near Field Communication (NFC), LoRA, etc. are presented, and the difference between different communication protocols is provided.
Book ChapterDOI

Storage Optimization Using File Compression Techniques for Big Data

TL;DR: In this article, a file compression system for big data as system utility software, and the users would also be able to use it on the desktop and lossless compression takes place in this work.
Book ChapterDOI

AI-Based Medical Voice Assistant During Covid-19

TL;DR: In this paper , a web application with an integrated voice assistant can help patients with the process of disease diagnosis, which can work verbally with the patient and can assist him/her with the diagnostic process.
Book ChapterDOI

Robust Automation Testing Tool for GUI Applications in Agile World—Faster to Market

TL;DR: Robust Automation Testing (RAT) tool is built on the Hybrid Automation Framework which is easy to learn and reduces the automation scripting time/coding, while execution increases the permutation and combination of the test scenarios without changing the test steps as mentioned in this paper.
References
More filters
Journal ArticleDOI

Toward Secure and Dependable Storage Services in Cloud Computing

TL;DR: This paper proposes a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data, which is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
Journal ArticleDOI

Trusted Cloud Computing with Secure Resources and Data Coloring

TL;DR: The authors suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners.
Proceedings ArticleDOI

Secure data access in cloud computing

TL;DR: This work proposes a modified Diffie-Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that alleviates the problem of key distribution and management at cloud service service provider.
Journal Article

Security in Cloud Computing usingCryptographic Algorithms

TL;DR: In this article, the proposed work plan is to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud as per different perspective of cloud customers, which is a set of IT Services, for example network, software system, storage, hardware, software, and resources and these services are provided to a customer over a network.
Journal ArticleDOI

Security in Cloud Computing using Cryptographic Algorithms

TL;DR: The proposed work plan is to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud as per different perspective of cloud customers.