6 research outputs found

    Security Enhancement on Cloud to multi Cloud using Audio Cryptography

    Get PDF
    Nowadays, cloud computing is most popular and modern technology of storing the large amount of information on the internet and accessing it from anywhere. Costs reduction, universal access, availability of number of applications and flexibility is a number of reasons for popularity of cloud computing. Users store sensitive information on cloud, providing security becomes important aspect as these cloud service providers cannot be trusted one. As the cloud computing assures user to provide the data, the cloud computing environment failure may result in loss or unavailability of data so the concept of Multi-Clouds is introduces. Dealing with single cloud” service providers are anticipated to become infamous with customers due to scare of service availability failure and the possibility of malicious intruders in the individual cloud. Multi-clouds guarantee to provide service at any cost if there is any failure at any cloud due to any reason. The use of multi-clouds as it can tackle the security and mainly availability issues much effectively than single cloud that affects cloud computing user. The proposed work surveys recent research related to single and multi cloud security and addresses possible solutions. This work aims to promote the use of multi clouds to solve problem of data availability due to failure in individual cloud. To provide data confidentiality as well as data integrity, security mechanism which uses an image audio secret sharing scheme(ASS) cryptography instead of visual secret sharing scheme(VSS)

    A Novel Approach for Securing Cloud Data Using Cryptographic Approach

    Get PDF
    — Nowadays, many businesses are making use cloud computing facility either directly (e.g. Google or Amazon) or indirectly (e.g. Twitter) instead of traditional on-site alternatives. Costs reduction, universal access, availability of number of applications and flexibility is a number of reasons for popularity of cloud computing. As the cloud service providers cannot be trusted one, enough security is an important aspect to consider so that user can store sensitive information securely. The concept of Multi Clouds is introduces as cloud computing assures user to provide the data, the cloud computing environment failure may result in loss or unavailability of data. Multi clouds guarantee to provide service at any cost if there is any failure at any cloud due to any reason. The use of multi clouds as it can tackle the security and mainly availability issues much effectively than single cloud that affects cloud computing user. This paper presents survey of recent research related to single and multi cloud security and addresses possible solutions. This aims to promote the use of multi clouds to solve problem of data availability due to failure in individual cloud. To provide data confidentiality, data integrity as well as authenticity, security mechanisms such as data encryption, visual secret sharing scheme (VSS)and digital signature are used

    Cryptographic Approach Using Audio for Data Security

    Get PDF
    Abstract - Secret Sharing is a cryptography algorithm. This technique divides secret data into multiple parts, giving each participant its own unique part. To reconstruct secret some or all parts of secret are needed. In order to reconstruct secret, if condition is that all participant is mandatory it becomes impractical due to any reason. Therefore threshold based scheme is used where any k of the participant is sufficient to reconstruct the original secret. The proposed secret sharing scheme use audio data to create shares of secret data. As audio data is large in size, to provide protection using encryption technique it becomes time consuming. So this audio data is used as cover data and divided into shares then shares are distributed among different participants. This is based on audio shares in which audio file is used cover data. If an eavesdropper gets one share and trying to play individual share in a media player, he or she will only hear as original sound like cover sound. But when k shares out of n shares are mixed together the original secret is reconstructed. DOI: 10.17762/ijritcc2321-8169.15028

    Crude Oil Cost Forecasting using Variants of Recurrent Neural Network

    Get PDF
    Crude oil cost plays very important role in the country’s economic growth. It is  having close impact on economical stability of nation. Because of these reasons it is very important to have accurate oil forecasting system. Due to impact of different factors oil cost data is highly nonlinear and in fluctuated manner. Performing prediction on those data using data driven approaches is very complex task which require lots of preprocessing of data. Working on such a non-stationary data is very difficult. This research proposes recurrent neural network (RNN) based approaches such as simple RNN, deep RNN and RNN with LSTM. To compare performance of RNN variants this research has also implemented Naive forecast and Sequential ANN methods. Performance of all these models are evaluated based on root mean square error(RMSE), mean absolute error(MAE) and mean absolute percentage error(MAPE). The experimental result shows that RNN with LSTM is more accurate compare to all other models. Accuracy of LSTM is more than 96% for the dataset of U.S. Energy Information administration from March 1983 to June 2022. On the basis of experimental result, we come to the conclusion that RNN with LSTM is best suitable for time series data which is highly nonlinear

    International Journal on Recent and Innovation Trends in Computing and Communication Cryptographic Approach Using Audio for Data Security

    No full text
    Abstract -Secret Sharing is a cryptography algorithm. This technique divides secret data into multiple parts, giving each participant i ts own unique part. To reconstruct secret some or all parts of secret are needed. In order to reconstruct secret, if condition is t hat all participant is mandatory it becomes impractical due to any reason. Therefore threshold based scheme is used where any k of the participant i s sufficient to reconstruct the original secret. The proposed secret sharing scheme use audio data to create shares of secret data. As audio data is large in size, to provide protection using encryption technique it becomes time consuming. So this audio data is used as cover data and divided into shares then shares are distributed among different participants. This is based on audio shares in which audio file is used cover data. If an eavesdropper gets one share and trying to play individual share in a media player, he or she will only hear as original sound like cover sound. But when k shares out of n shares are mixed together the original secret is reconstructed

    USE OF SOCIAL POSTS FOR DISASTER DETECTION USING NATURAL LANGUAGE PROCESSING

    No full text
    A person’s attitude is reflected using his behavior. If we want to know a person’s behavior, we can ask to his friend about him. With the growing importance of social media, researchers made social media as a business review machine. Using sentiment analysis on reviews, product’s market value, lifespan of product etc. can be predicted. Social media can also be helpful to get reaction of public on some social issue. This will help to politicians for analyzing the impact of social issue on public’s mood. Sentiment analysis of reviews from different social media such as short texts are insufficient for analysis. The main idea behind the proposed system is to make use of social media which is immensely active i.e. Facebook and use the posts which are posted. Using sentiment analysis and Natural Language Processing (NLP) on posts, disasters are extracted (riots, accidents, traffic issue, natural calamities etc.) and using Naïve Bays classification technique disasters are classified. The challenges are processing of unstructured data and finding the annotated data. In this paper we find the solution for above challenges which will be beneficial for our system and provide solution to handle unstructured data easily
    corecore