111 research outputs found

    Contents

    Get PDF

    A Novel Auditing Scheme And Efficient Data Repairing Process In Multiple Clouds

    Get PDF
    We propose an public auditing system for the recovering code-based distributed storage. To answer the recovery issue of fizzled authenticators in the nonattendance of information proprietors, we show an intermediary, which is advantaged to recover the authenticators, into the anticipated open evaluating framework display. Likewise, we anticipate another open obvious authenticator, which is delivered by several keys and can be recovered utilizing incomplete keys. Accordingly, our plan can absolutely discharge information proprietors from online weight. Furthermore, we randomize the encode coefficients with a pseudorandom assignment to save information protection. TPA convention is introduced to review the cloud information. For consistency checking TPA is introduced without investment of information proprietor. In conclusion future technique is productive regarding correspondence and calculation and also protection

    Data Recovery and Integrity Checking By Proxy In Cloud

    Get PDF
    Cloud is a collection of data centres which provides effective services to cloud clients. Now a day’s users and organizations are forwarding the data to cloud. But problem is repairing cloud data along with integrity checking is challenging issue. Provable information ownership (PDP) and confirmation of retrievability (POR) to discharge the data owner from online weight for check, considered general society auditability in the PDP model interestingly. In any case, their variation convention uncovered the straight blend of tests and in this way gives no information protection ensure.Existing methods only support private auditing means data owner only audit the cloud data and always to stay online for repairing cloud data. In order to overcome this problem introducing public auditing instead of data owner a proxy can repair the corrupted data by using public verifiable authenticator. For cloud data auditing TPA can use the enhanced privacy auditing protocol. This new protocol is introduced to audit the cloud data by TPA. But he can’t know the original data. For security and Integrity checking AES-256 bit as well as SHA-1 Algorithm is used Finally proposed technique is efficient in terms of communication and computation as well as privacy

    A Framework for Security Transparency in Cloud Computing

    Get PDF
    Individuals and corporate users are persistently considering cloud adoption due to its significant benefits compared to traditional computing environments. The data and applications in the cloud are stored in an environment that is separated, managed and maintained externally to the organisation. Therefore, it is essential for cloud providers to demonstrate and implement adequate security practices to protect the data and processes put under their stewardship. Security transparency in the cloud is likely to become the core theme that underpins the systematic disclosure of security designs and practices that enhance customer confidence in using cloud service and deployment models. In this paper, we present a framework that enables a detailed analysis of security transparency for cloud based systems. In particular, we consider security transparency from three different levels of abstraction, i.e., conceptual, organisation and technical levels, and identify the relevant concepts within these levels. This allows us to provide an elaboration of the essential concepts at the core of transparency and analyse the means for implementing them from a technical perspective. Finally, an example from a real world migration context is given to provide a solid discussion on the applicability of the proposed framework

    Distributed data possession checking for securing multiple replicas in geographically-dispersed clouds

    Get PDF
    In this paper, we provide a novel efficient Distributed Multiple Replicas Data Possession Checking (DMRDPC) scheme to validate the availability and data integrity in the cloud computing environment. In the DMRDPC scheme, the problem of Finding an Optimal Spanning Tree in a Complete Bidirectional Directed Graph (the FOSTCBDG problem) is vital, since the optimal spanning tree can be used to improve communication efficiency by optimizing the partial order of scheduling multiple replicas data possession checking. Particularly, on the Internet, data routing often aims to minimize the number of hops; but in a clouds environment, multi-hop among clouds may be more efficient than a single hop. With the increasing number of clouds, the FOSTCBDG problem is becoming more and more critical to improve the performance of cloud computing. Thus, we provide basic theories for the FOSTCBDG problem. We also propose an efficient Replace the Smallest Bandwidth Edge (RSBE) algorithm to approximately resolve the FOSTCBDG problem. The effectiveness of our proposed DMRDPC is validated by an experimental study, where bandwidths of a CBDG are simulated by checking the download speeds of several Google websites from the non-Google clouds at multiple locations around the world. JCSS Special Issue: Cloud Computing 201

    BALANCING PRIVACY, PRECISION AND PERFORMANCE IN DISTRIBUTED SYSTEMS

    Get PDF
    Privacy, Precision, and Performance (3Ps) are three fundamental design objectives in distributed systems. However, these properties tend to compete with one another and are not considered absolute properties or functions. They must be defined and justified in terms of a system, its resources, stakeholder concerns, and the security threat model. To date, distributed systems research has only considered the trade-offs of balancing privacy, precision, and performance in a pairwise fashion. However, this dissertation formally explores the space of trade-offs among all 3Ps by examining three representative classes of distributed systems, namely Wireless Sensor Networks (WSNs), cloud systems, and Data Stream Management Systems (DSMSs). These representative systems support large part of the modern and mission-critical distributed systems. WSNs are real-time systems characterized by unreliable network interconnections and highly constrained computational and power resources. The dissertation proposes a privacy-preserving in-network aggregation protocol for WSNs demonstrating that the 3Ps could be navigated by adopting the appropriate algorithms and cryptographic techniques that are not prohibitively expensive. Next, the dissertation highlights the privacy and precision issues that arise in cloud databases due to the eventual consistency models of the cloud. To address these issues, consistency enforcement techniques across cloud servers are proposed and the trade-offs between 3Ps are discussed to help guide cloud database users on how to balance these properties. Lastly, the 3Ps properties are examined in DSMSs which are characterized by high volumes of unbounded input data streams and strict real-time processing constraints. Within this system, the 3Ps are balanced through a proposed simple and efficient technique that applies access control policies over shared operator networks to achieve privacy and precision without sacrificing the systems performance. Despite that in this dissertation, it was shown that, with the right set of protocols and algorithms, the desirable 3P properties can co-exist in a balanced way in well-established distributed systems, this dissertation is promoting the use of the new 3Ps-by-design concept. This concept is meant to encourage distributed systems designers to proactively consider the interplay among the 3Ps from the initial stages of the systems design lifecycle rather than identifying them as add-on properties to systems

    Cloud computing with an emphasis on PaaS and Google app engine

    Get PDF
    Thesis on cloud with an emphasis on PaaS and Google App Engin

    IKUWA6. Shared Heritage

    Get PDF
    Celebrating the theme ‘Shared heritage’, IKUWA6 (the 6th International Congress for Underwater Archaeology), was the first such major conference to be held in the Asia-Pacific region, and the first IKUWA meeting hosted outside Europe since the organisation’s inception in Germany in the 1990s. A primary objective of holding IKUWA6 in Australia was to give greater voice to practitioners and emerging researchers across the Asia and Pacific regions who are often not well represented in northern hemisphere scientific gatherings of this scale; and, to focus on the areas of overlap in our mutual heritage, techniques and technology. Drawing together peer-reviewed presentations by delegates from across the world who converged in Fremantle in 2016 to participate, this volume covers a stimulating diversity of themes and niche topics of value to maritime archaeology practitioners, researchers, students, historians and museum professionals across the world

    Mapping Crisis: Participation, Datafication, and Humanitarianism in the Age of Digital Mapping

    Get PDF
    This book brings together critical perspectives on the role that mapping people, knowledges and data now plays in humanitarian work, both in cartographic terms and through data visualisations. Since the rise of Google Earth in 2005, there has been an explosion in the use of mapping tools to quantify and assess the needs of the poor, including those affected by climate change and the wider neo-liberal agenda. Yet, while there has been a huge upsurge in the data produced around these issues, the representation of people remains questionable. Some have argued that representation has diminished in humanitarian crises as people are increasingly reduced to data points. In turn, this data becomes ever more difficult to analyse without vast computing power, leading to a dependency on the old colonial powers to refine the data of the poor, before selling it back to them. These issues are not entirely new, and questions around representation, participation and humanitarianism can be traced back beyond the speeches of Truman, but the digital age throws these issues back to the fore, as machine learning, algorithms and big data centres take over the process of mapping the subjugated and subaltern. This book questions whether, as we map crises, it is the map itself that is in crisis
    • …
    corecore