Dynamic Hybrid Secured Environment (DHSE) to Provide Confidentiality in Cloud Computing Environment

2020 ◽  
Vol 17 (6) ◽  
pp. 2557-2561
Author(s):  
Deepak Garg ◽  
Shalli Rani

With help of internet technology today people can process, store and share data easily moreover, cloud computing model has provided various application services to users such as storage because cloud provide pay as you go environment. Storage helps data owner to share their data among users or employees of organization. But there is a need for data owners to provide flexible access control such that unauthorized users cannot have access to the data and confidentiality can be maintained. In addition, there is a need that only encrypted data is shared over the cloud. Encryption schemes have a major role in security domain of cloud computing model. In this article, DHSE scheme which is a hybrid technique and uses AES, ABE and IBE for key and data encryption is proposed. Furthermore, to validate and to do the security investigation of our plan we have verified our results using AVISPA tools.

2014 ◽  
Vol 631-632 ◽  
pp. 210-217 ◽  
Author(s):  
Jian Jun Jiang ◽  
Zhi Feng Ding

Cloud computing model, based on cloud technologies, is an evolution to traditional computing model. It fully separates device, operating system, application and user data from each other while freely combines these components to form different computing paths. In cloud computing platform, storage cloud, desktop cloud and application cloud are built in the backend, while user data, operating systems, and applications are deployed in the data center. Therefore, user only needs to focus on data, and is able to access, process and share data with any device, from anywhere and at anytime.


Author(s):  
Fangfang Shan ◽  
Hui Li ◽  
Fenghua Li ◽  
Yunchuan Guo ◽  
Jinbo Xiong

With the rapid development of cloud computing, it has been increasingly attractive for individuals and groups to store and share data via cloud storage. Once stored in the third-party cloud storage service providers, the privacy and integrity of outsourced data should be attached with more attention as a challenging task. This article presents the attribute-based assured deletion scheme (AADS) which aims to protect and assuredly delete outsourced data in cloud computing. It encrypts outsourced data files with standard cryptographic techniques to guarantee the privacy and integrity, and assuredly deletes data upon revocations of attributes. AADS could be applied to solve important security problems by supporting fine-grained attribute-based policies and their combinations. According to the comparison and analysis, AADS provides efficient data encryption and flexible attribute-based assured deletion for cloud-stored data with an acceptable concession in performance cost.


2011 ◽  
Vol 71-78 ◽  
pp. 4501-4505
Author(s):  
Ming Chen ◽  
Wan Zhou

Although modern bridge are carefully designed and well constructed, damage may occur in them due to unexpected causes. Currently, many different techniques have been proposed and investigated in bridge condition assessment. However, evaluation efficiency of condition assessment has not been paid much attention by the researchers. A fast evaluation of the urban railway bridge condition based on the cloud computing is presented. In this paper dynamic FE model and Artificial neural networks technique is applied to model updating. The cloud computing model provides the basis for fast analyses. It was found that when applied to the actually railway bridges, the proposed method provided results similar to those obtained by experts, but can improve efficiency of bridge


Electronics ◽  
2021 ◽  
Vol 10 (5) ◽  
pp. 621
Author(s):  
Giuseppe Psaila ◽  
Paolo Fosci

Internet technology and mobile technology have enabled producing and diffusing massive data sets concerning almost every aspect of day-by-day life. Remarkable examples are social media and apps for volunteered information production, as well as Open Data portals on which public administrations publish authoritative and (often) geo-referenced data sets. In this context, JSON has become the most popular standard for representing and exchanging possibly geo-referenced data sets over the Internet.Analysts, wishing to manage, integrate and cross-analyze such data sets, need a framework that allows them to access possibly remote storage systems for JSON data sets, to retrieve and query data sets by means of a unique query language (independent of the specific storage technology), by exploiting possibly-remote computational resources (such as cloud servers), comfortably working on their PC in their office, more or less unaware of real location of resources. In this paper, we present the current state of the J-CO Framework, a platform-independent and analyst-oriented software framework to manipulate and cross-analyze possibly geo-tagged JSON data sets. The paper presents the general approach behind the J-CO Framework, by illustrating the query language by means of a simple, yet non-trivial, example of geographical cross-analysis. The paper also presents the novel features introduced by the re-engineered version of the execution engine and the most recent components, i.e., the storage service for large single JSON documents and the user interface that allows analysts to comfortably share data sets and computational resources with other analysts possibly working in different places of the Earth globe. Finally, the paper reports the results of an experimental campaign, which show that the execution engine actually performs in a more than satisfactory way, proving that our framework can be actually used by analysts to process JSON data sets.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


2014 ◽  
Vol 513-517 ◽  
pp. 2107-2110 ◽  
Author(s):  
Zhi Jian Diao ◽  
Song Guo

Cloud computing is a novel network-based computing model, in which the cloud infrastructure is constructed in bottom level and provided as the support environment for the applications in upper cloud level. The combination of clouding computing and GIS can improve the performance of GIS, and it can also provide a new prospect of GIS information storage, processing and utilization. By integrating cloud computing and GIS, this paper presented a cloud computing based GIS model based on two features of cloud computing: data storage and transparent custom service. The model contains two layers: service layer and application layer. With this two-layer model, GIS can provide stable and efficient services to end users by optimized network resource allocation of underlying data and services in cloud computing.


Sign in / Sign up

Export Citation Format

Share Document