Book Details

CONTENT BASED DATA TRANSFER IN CLOUD COMPUTING

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

The primary goal of this work is to build a secure and efficient protocol that ensures tight security for owner content while also supporting secure data transportation from one Cloud Service Provider to another in an untrusted cloud environment. To address the issues raised, this paper introduced the Content Based Policy (CBP) technique, which is highly resilient and efficient for secure/credential metric data. This CBP technique lowers critical complications while providing tight content security at a cheap communication cost. Here, the data holder can upload a significant amount of content to the cloud, complete with content names and descriptions. A trustworthy user can directly retrieve data with content from this location.

References

[1]. Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou, (2014), “Cost-Effective Authentic and Anonymous Data Sharing with Forward Security” IEEE Transactions on Computers, Vol. 64 , Issue 4, Pages 971 – 983.

[2]. Cheng-Kang Chu, Sherman S.M. Chow, Wen-GueyTzeng, Jianying Zhou, and Robert H. Deng, (2014), “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage” IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 2, Pages 468 – 477.

[3]. SanjoliSingla& Jasmeet Singh, (2013), “Implementing Cloud Data Security by Encryption using Rijndael Algorithm”, Global Journal of Computer Science and Technology Cloud and Distributed, Vol. 13 Issue 4, Pages 18-22.

[4]. Manpreet Kaur, and Rajbir Singh, (2013), “Implementing Encryption Algorithms to Enhance Data Security of Cloud in Cloud Computing”, International Journal of Computer Applications, Vol. 70, No.18, Pages 16-21.

[5]. AbhaSachdev and MohitBhansali, (2013), “Enhancing Cloud Computing Security using AES Algorithm”, International Journal of Computer Applications, Vol. 67, No.9, Pages19-23.

[6]. Sarfraz Nawaz Brohi, MervatAdibBamiah, SuriayatiChuprat, Jamalul-lail and Ab Manan, (2014), “Design and Implementation of A Privacy Preserved Off-Premises Cloud Storage”, Journal of Computer Science, Vol. 10 No. 02, Pages 210-223.

[7]. Sonal Guleria1, and Dr. Sonia Vatta, (2013), “To Enhance Multimedia Security in Cloud Computing Environment using Crossbreed Algorithm” International Journal of Application or Innovation in Engineering & Management (IJATEM), Vol. 2, Issue 6, Pages 562-568.

[8]. Abdul, D. S., Elminaam, H. M. A. K., &Hadhoud, M. M, (2009), “Performance Evaluation of Symmetric Encryption Algorithms”, Communications of the IBIMA, Vol. 8, Pages 58-64.

[9]. Madnani , B. R., &Sreedevi N., (2013), “Attribute Based Encryption for Scalable and Secure Sharing of Medical Records in Cloud Computing Design and Implementation”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 3, Pages 523-530.

[10]. Ramakrishnan, R., &Mathivanan, V., “A Criticism of Contemporary Cloud Computing Productions and Encounters”,International Journal of Computer Engineering & Technology (IJCET), ISSN NO 09766375 /67 Volume 06, Issue 07, pp. 41-50, 2015(Impact factor 8.99).

[11]. Ramakrishnan, R., &Mathivanan, V., “Content Based Security Policy in Cloud Environment”, International Journal of Applied Engineering Research (IJAER), , ISSN: 0973 4562, Volume 10, No. 14, pp. 34658 – 34663, 2015 (Impact factor 0.130) .

[12]. Ramakrishnan, R., &Mathivanan, V., “Privacy Proof of Data Transportability from one Cloud to another Cloud Service Provider”, International Journal of Control Theory and Applications, ISSN No: 0974 5572, Volume 08, Issue 02, 2015 pp. 38.

[13]. MATHIVANAN, PALANISAMY, R. A. M. E. S. H., VIMAL, SENTHIL, & RAFI. (22AD). Cloud Computing Distinctiveness In The Real-Time Environment. International Journal of Scientific Research & Engineering Trends, 8(3). https://doi.org/ ISSN (Online): 2395-566X .

[14]. Stephen, V. K., V, M., Kaliyamoorthy, K., Ullah, M. T., & Palanisamy, R. (2022). Challenges of implementing industry 4.0 in financial sector of Oman. International Journal of Economics and Management Studies, 9(1), 35–38. https://doi.org/10.14445/23939125/ijems-v9i1p106.

Keywords

Cloud Service Provider, Content Based Policy, Retrieve Data, Security.

Image
  • Format Volume 10, Issue 2, No 7, 2022
  • Copyright All Rights Reserved ©2022
  • Year of Publication 2022
  • Author Mathivanan V, Ramakrishnan R, Mohamed Osman Alkaram, Ramesh Palanisamy
  • Reference IJCS-455
  • Page No 3086-3090

Copyright 2024 SK Research Group of Companies. All Rights Reserved.