scispace - formally typeset
Search or ask a question
Book ChapterDOI

Server Security in Cloud Computing Using Block-Chaining Technique

TL;DR: This project is aiming to implement an encryption algorithm which works on the principles of block-chains, to ensure the security and integrity of a cloud-based system.
Abstract: Data security is a key concern in cloud computing . With the increase in attempts to hack a virtual cloud server in order to access the data stored there privately, more and more measures are being taken to ensure a reliable and secure cloud. Enhancements are made on traditional cryptography algorithms so that they are more suited to the distributed, virtual and multi-tenant environment of the cloud. Block-chaining is the newest technique in the fields of computing. It is basically a growing list of records, called as “blocks”, which are linked and secured using cryptography. In this project, we are aiming to implement an encryption algorithm which works on the principles of block-chains, to ensure the security and integrity of a cloud-based system. The infallible nature of block-chains is what makes it perfect for cloud server security.
Citations
More filters
Journal ArticleDOI
TL;DR: Various communication protocols, namely Zigbee, Bluetooth, Near Field Communication (NFC), LoRA, etc. are presented, and the difference between different communication protocols is provided.
Abstract: Internet of Things (IoT) consists of sensors embed with physical objects that are connected to the Internet and able to establish the communication between them without human intervene applications are industry, transportation, healthcare, robotics, smart agriculture, etc. The communication technology plays a crucial role in IoT to transfer the data from one place to another place through Internet. This paper presents various communication protocols, namely Zigbee, Bluetooth, Near Field Communication (NFC), LoRA, etc. Later, it provides the difference between different communication protocols. Finally, the overall discussion about the communication protocols in IoT.

66 citations

Book ChapterDOI
01 Jan 2021
TL;DR: In this article, a file compression system for big data as system utility software, and the users would also be able to use it on the desktop and lossless compression takes place in this work.
Abstract: The world is surrounded by technology. There are lots of devices everywhere around us. It is impossible to imagine our lives without technology, as we have got dependent on it for most of our work. One of the primary functions for which we use technology or computers especially is to store and transfer data from a host system or network to another one having similar credentials. The restriction in the capacity of computers means that there’s restriction on amount of data which can be stored or has to transport. So, in order to tackle this problem, computer scientists came up with data compression algorithms. A file compression system’s objective is to build an efficient software which can help to reduce the size of user files to smaller bytes so that it can easily be transferred over a slower Internet connection and it takes less space on the disk. Data compression or the diminishing of rate of bit includes encoding data utilizing less number of bits as compared to the first portrayal. Compression can be of two writes lossless and lossy. The first one decreases bits by recognizing and disposing of measurable excesses, and due to this reason, no data is lost or every info is retained. The latter type lessens record estimate by expelling pointless or less vital data. This paper proposed a file compression system for big data as system utility software, and the users would also be able to use it on the desktop and lossless compression takes place in this work.

2 citations

Book ChapterDOI
01 Jan 2022

1 citations

Book ChapterDOI
01 Jan 2022
TL;DR: In this paper , a web application with an integrated voice assistant can help patients with the process of disease diagnosis, which can work verbally with the patient and can assist him/her with the diagnostic process.
Abstract: AbstractPresently, healthcare is the most important domain across the globe. Amidst this pandemic, all the doctors are much occupied and extremely busy. Getting proper treatment from doctor is getting difficult due to unavailability of doctors. Moreover, if a person feels uneasy and does not know what exactly the problem is, they really do not know which doctor they should take an appointment with. So, in this chapter intend to provide a web application as an all-in-one solution with an integrated voice assistant, which can help you with the process of disease diagnosis. For those doctors and patients who may need a second brain to make sure the diagnosis is correct, this is a platform with an AI-based medical voice assistant. It can work verbally with the doctor/patient and can assist him/her with the diagnostic process. This voice assistant should be able to select a patient’s illness on a confidence score to support diagnosis operations. Such a software can help both physicians and patients. Depending on the predicted disease/illness, the doctor may give the patient an e-prescription using the help of a voice assistant. The patient can also order medication using a voice assistant. The archives are stored in an orderly fashion, so users do not have to worry about losing them. This application is exclusively made to assist doctors and patients with intention of giving medical care in an interactive, lifesaving and resource saving manner. This application is a minor step in achieving a bigger target of completely digitalizing our medical care..KeywordsAICovid-19PredictionNLPEMR’s

1 citations

Book ChapterDOI
01 Jan 2021
TL;DR: Robust Automation Testing (RAT) tool is built on the Hybrid Automation Framework which is easy to learn and reduces the automation scripting time/coding, while execution increases the permutation and combination of the test scenarios without changing the test steps as mentioned in this paper.
Abstract: In this digital world, technology changes exponentially to increase the speed, efficiency, and accuracy. To achieve these features, we need good programming language, high-end hardware configurations, permutation, and combinations of scenarios based on testing. Applications are developed to make more interactive and reduce the complexity, reduce the transaction response time, and without failure at the end users. For any graphical user interface application, they need to be tested either by Manual/Automation Testing tools. Robust Automation Testing (RAT) tool is built on the Hybrid Automation Framework which is easy to learn and reduces the automation scripting time/coding, while execution increases the permutation and combination of the test scenarios without changing the test steps. There is no dependency on the test data and maintenance-free. RAT tool is for testing the application from creating the manual/automation test scripts, generating the test data, executing the automation scripts, and generating the customized reports. RAT tool shows that the performance is increased the accuracy of validation by 97%, no cost to the tool. Manual tester is enough to complete the automation script execution, and frequency of execution is increased and reduces the maintenance of the scripts to less than 10% cost as well resource cost reduced to 38%.
References
More filters
Journal ArticleDOI
TL;DR: This paper concisely covers some of the existing cryptographic approaches that can be used to improve the security in cloud environment and investigates different encryption technique to protect the cloud storage environment.
Abstract: Cloud Computing is very flexible in nature that helps to quickly access the resources efficiently from the third party service provider to expand the business with low capitalization cost. A cloud storage system stores large number of data in its storage server. Since the data is stored for a long term over the internet it does not provide the data confidentiality and make the hackers to steal the data provided in the storage system and even when data forwarded to cloud environment, it lacks data integrity and makes the cloud user unsatisfied. In this paper, we study about different encryption technique to protect the cloud storage environment. This paper concisely covers some of the existing cryptographic approaches that can be used to improve the security in cloud environment.

21 citations