scispace - formally typeset
Book ChapterDOI

Server Security in Cloud Computing Using Block-Chaining Technique

01 Jan 2020-pp 913-920

TL;DR: This project is aiming to implement an encryption algorithm which works on the principles of block-chains, to ensure the security and integrity of a cloud-based system.

AbstractData security is a key concern in cloud computing . With the increase in attempts to hack a virtual cloud server in order to access the data stored there privately, more and more measures are being taken to ensure a reliable and secure cloud. Enhancements are made on traditional cryptography algorithms so that they are more suited to the distributed, virtual and multi-tenant environment of the cloud. Block-chaining is the newest technique in the fields of computing. It is basically a growing list of records, called as “blocks”, which are linked and secured using cryptography. In this project, we are aiming to implement an encryption algorithm which works on the principles of block-chains, to ensure the security and integrity of a cloud-based system. The infallible nature of block-chains is what makes it perfect for cloud server security.

...read more


Citations
More filters
Journal ArticleDOI
TL;DR: Various communication protocols, namely Zigbee, Bluetooth, Near Field Communication (NFC), LoRA, etc. are presented, and the difference between different communication protocols is provided.
Abstract: Internet of Things (IoT) consists of sensors embed with physical objects that are connected to the Internet and able to establish the communication between them without human intervene applications are industry, transportation, healthcare, robotics, smart agriculture, etc. The communication technology plays a crucial role in IoT to transfer the data from one place to another place through Internet. This paper presents various communication protocols, namely Zigbee, Bluetooth, Near Field Communication (NFC), LoRA, etc. Later, it provides the difference between different communication protocols. Finally, the overall discussion about the communication protocols in IoT.

37 citations

Book ChapterDOI
01 Jan 2021
TL;DR: Robust Automation Testing (RAT) tool is built on the Hybrid Automation Framework which is easy to learn and reduces the automation scripting time/coding, while execution increases the permutation and combination of the test scenarios without changing the test steps as mentioned in this paper.
Abstract: In this digital world, technology changes exponentially to increase the speed, efficiency, and accuracy. To achieve these features, we need good programming language, high-end hardware configurations, permutation, and combinations of scenarios based on testing. Applications are developed to make more interactive and reduce the complexity, reduce the transaction response time, and without failure at the end users. For any graphical user interface application, they need to be tested either by Manual/Automation Testing tools. Robust Automation Testing (RAT) tool is built on the Hybrid Automation Framework which is easy to learn and reduces the automation scripting time/coding, while execution increases the permutation and combination of the test scenarios without changing the test steps. There is no dependency on the test data and maintenance-free. RAT tool is for testing the application from creating the manual/automation test scripts, generating the test data, executing the automation scripts, and generating the customized reports. RAT tool shows that the performance is increased the accuracy of validation by 97%, no cost to the tool. Manual tester is enough to complete the automation script execution, and frequency of execution is increased and reduces the maintenance of the scripts to less than 10% cost as well resource cost reduced to 38%.
Book ChapterDOI
01 Jan 2021
TL;DR: IP Address Randomization is suggested, a moving objective defense mechanism with the aim of verifies authentic customers besides flood DDoS assaults, and builds up a greedy shuffling computation toward limit the amount of proxy reschedule even as augmenting attack isolation.
Abstract: Distributed Denial of Service (DDoS) assaults represent an important warning toward basic communications and same to internet benefits. Here paper suggests IP Address Randomization, a moving objective defense mechanism with the aim of verifies authentic customers besides flood DDoS attacks. This project utilizes gathering of active packet indirection proxies toward passing information between real customers along with the protected servers. Our structure is able to successfully inhibit outer attackers’ endeavors to legitimately bombard the network base. Subsequently, attacker’s determination requires on the way to conspire through malicious insiders within discovering secrecy proxies after that initiating attack. However, moving objective defense mechanism can segregate insider assaults as of innocent clients through ceaselessly “moving” secrecy proxies toward latest network area whereas recognizing client to intermediary assignments. We build up a greedy shuffling computation to limit the quantity of proxy reassign (shuffles) while amplifying assaults detachment.
Book ChapterDOI
01 Jan 2021
TL;DR: In this article, a file compression system for big data as system utility software, and the users would also be able to use it on the desktop and lossless compression takes place in this work.
Abstract: The world is surrounded by technology. There are lots of devices everywhere around us. It is impossible to imagine our lives without technology, as we have got dependent on it for most of our work. One of the primary functions for which we use technology or computers especially is to store and transfer data from a host system or network to another one having similar credentials. The restriction in the capacity of computers means that there’s restriction on amount of data which can be stored or has to transport. So, in order to tackle this problem, computer scientists came up with data compression algorithms. A file compression system’s objective is to build an efficient software which can help to reduce the size of user files to smaller bytes so that it can easily be transferred over a slower Internet connection and it takes less space on the disk. Data compression or the diminishing of rate of bit includes encoding data utilizing less number of bits as compared to the first portrayal. Compression can be of two writes lossless and lossy. The first one decreases bits by recognizing and disposing of measurable excesses, and due to this reason, no data is lost or every info is retained. The latter type lessens record estimate by expelling pointless or less vital data. This paper proposed a file compression system for big data as system utility software, and the users would also be able to use it on the desktop and lossless compression takes place in this work.
Book ChapterDOI
01 Jan 2021
TL;DR: This paper provides an optimal solution to provide electricity to a city divided into different sections or areas, when only a limited amount of energy units are available or generated and the approach is 0/1 knapsack problem to provide energy in a smart grid.
Abstract: Almost nothing in today’s world runs without power. Right from the air conditioner and water heaters to phone charging and electricity. Energy has its own role to play in everything that happens. But with increasing number of homes, the power consumption increases. The number of electricity sources does not follow the same rate of increase. So it becomes very difficult to supply all sections of a place with power simultaneously. Some areas will have to face blackout, whereas other places will have proper supply. And the electricity department needs revenue every month. This paper provides an optimal solution to provide electricity to a city divided into different sections or areas, when only a limited amount of energy units are available or generated. Assuming that each grid has its own power consumption and as per that and the revenue, the approach used in the proposed work is 0/1 knapsack problem to provide energy in a smart grid such that almost all of the power is used and maximum revenue is generated. This can be done through various methods like dynamic programming, greedy approach, brute force, backtracking, etc. We also find out that which approach will give the best solution with least time complexity.

References
More filters
Journal ArticleDOI
Cong Wang1, Qian Wang1, Kui Ren1, Ning Cao, Wenjing Lou 
TL;DR: This paper proposes a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data, which is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.
Abstract: Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.

638 citations

Journal ArticleDOI
TL;DR: The authors suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners.
Abstract: Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, providers must first secure virtualized data center resources, uphold user privacy, and preserve data integrity. The authors suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners. Data coloring and software watermarking techniques protect shared data objects and massively distributed software modules. These techniques safeguard multi-way authentications, enable single sign-on in the cloud, and tighten access control for sensitive data in both public and private clouds.

314 citations

Proceedings ArticleDOI
01 Dec 2010
TL;DR: This work proposes a modified Diffie-Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that alleviates the problem of key distribution and management at cloud service service provider.
Abstract: Data security and access control is one of the most challenging ongoing research work in cloud computing, because of users outsourcing their sensitive data to cloud providers Existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management This paper addresses this challenging open problem using capability based access control technique that ensures only valid users will access the outsourced data This work also proposes a modified Diffie-Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that alleviates the problem of key distribution and management at cloud service provider The simulation run and analysis shows that the proposed approach is highly efficient and secure under existing security models

74 citations

Journal Article
TL;DR: In this article, the proposed work plan is to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud as per different perspective of cloud customers, which is a set of IT Services, for example network, software system, storage, hardware, software, and resources and these services are provided to a customer over a network.
Abstract: Cloud Computing is a set of IT Services, for example network, software system, storage, hardware, software, and resources and these services are provided to a customer over a network. The IT services of Cloud Computing are delivered by third party provider who owns the infrastructure. Benefits of cloud storage are easy access means access to your knowledge anyplace, anyhow, anytime, scalability, resilience, cost efficiency, and high reliability of the data. Because of these benefits each and every organization is moving its data to the cloud, means it uses the storage service provided by the cloud provider. So there is a need to protect that data against unauthorized access, modification or denial of services etc. To secure the Cloud means secure the treatments (calculations) and storage (databases hosted by the Cloud provider). In this research paper, the proposed work plan is to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud as per different perspective of cloud customers.

44 citations

Journal ArticleDOI
TL;DR: The proposed work plan is to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud as per different perspective of cloud customers.
Abstract: Cloud Computing is a set of IT Services, for example network, software system, storage, hardware, software, and resources and these services are provided to a customer over a network. The IT services of Cloud Computing are delivered by third party provider who owns the infrastructure. Benefits of cloud storage are easy access means access to your knowledge anyplace, anyhow, anytime, scalability, resilience, cost efficiency, and high reliability of the data. Because of these benefits each and every organization is moving its data to the cloud, means it uses the storage service provided by the cloud provider. So there is a need to protect that data against unauthorized access, modification or denial of services etc. To secure the Cloud means secure the treatments (calculations) and storage (databases hosted by the Cloud provider). In this research paper, the proposed work plan is to eliminate the concerns regarding data privacy using cryptographic algorithms to enhance the security in cloud as per different perspective of cloud customers.

29 citations