5 research outputs found

    Secure data sharing in cloud computing: a comprehensive review

    Get PDF
    Cloud Computing is an emerging technology, which relies on sharing computing resources. Sharing of data in the group is not secure as the cloud provider cannot be trusted. The fundamental difficulties in distributed computing of cloud suppliers is Data Security, Sharing, Resource scheduling and Energy consumption. Key-Aggregate cryptosystem used to secure private/public data in the cloud. This key is consistent size aggregate for adaptable decisions of ciphertext in cloud storage. Virtual Machines (VMs) provisioning is effectively empowered the cloud suppliers to effectively use their accessible resources and get higher benefits. The most effective method to share information resources among the individuals from the group in distributed storage is secure, flexible and efficient. Any data stored in different cloud data centers are corrupted, recovery using regenerative coding. Security is provided many techniques like Forward security, backward security, Key-Aggregate cryptosystem, Encryption and Re-encryption etc. The energy is reduced using Energy-Efficient Virtual Machines Scheduling in Multi-Tenant Data Centers

    Secure Data Sharing in Cloud Computing: A Comprehensive Review

    Get PDF
    Cloud Computing is an emerging technology, which relies on sharing computing resources. Sharing of data in the group is not secure as the cloud provider cannot be trusted. The fundamental difficulties in distributed computing of cloud suppliers is Data Security, Sharing, Resource scheduling and Energy consumption. Key-Aggregate cryptosystem used to secure private/public data in the cloud. This key is consistent size aggregate for adaptable decisions of ciphertext in cloud storage. Virtual Machines (VMs) provisioning is effectively empowered the cloud suppliers to effectively use their accessible resources and get higher benefits. The most effective method to share information resources among the individuals from the group in distributed storage is secure, flexible and efficient. Any data stored in different cloud data centers are corrupted, recovery using regenerative coding. Security is provided many techniques like Forward security, backward security, Key-Aggregate cryptosystem, Encryption and Re-encryption etc. The energy is reduced using Energy-Efficient Virtual Machines Scheduling in Multi-Tenant Data Centers

    Resource allocation in the cloud for video-on-demand applications using multiple cloud service providers

    Get PDF
    Abstract Video-on-demand (VoD) applications have become extensively used nowadays. YouTube is one of the most extensively used VoD application. These applications are used for various purposes like entertainment, education, media, etc., of all age groups. Earlier, these applications were supported by private data centers and application servers. Sufficient infrastructure had to be bought and maintained, to support the demand even during unexpected peak times. This approach caused huge loss of resources when the demand is normal as a large portion of the resources remained idle. To overcome this, VoD application providers moved to the cloud, to host their video content’s. This approach reduced the wastage of resources and the maintenance cost of the VoD application provider. The problem is to determine the number of resources to handle the demand while maintaining QoS for every instance. We have designed two algorithms in this paper, namely the multiple cloud resource allocation (MCRA) algorithm and the hybrid MCRA algorithm. Most of the cloud service providers (CSPs) basically provide two types of resource allocation schemes: (i) the reservation scheme and (ii) the on-demand scheme. The reservation scheme provides time-based tariff prices, where the discount is provided for the resources depending on their quantity and reservation time. This scheme is used in the MCRA algorithm to reduce the cost of the VoD application provider. In Hybrid MCRA algorithm both the reservation scheme and on-demand scheme are implemented, to overcome the drawbacks of the MCRA algorithm which are under-subscription and over-subscription. We have analyzed both the algorithms in terms of cost and allocation of resources. These algorithms can help allocate resources in of cloud for VoD applications in a cost-effective way and at the same time not compromise on the QoS of the video content

    Secured privacy data using multi key encryption in cloud storage

    No full text
    In the distributed systems security of data is a vital functionality, sharing of information in cloud storage is a provident technique. Nowadays, the main challenges is data security in cloud computing. To overcome this problem we proposed a novel Dynamic Privacy Aggregate Key Re-Encryption (DPAK-RE) algorithm. The DPAK-RE algorithm provides security to sharing the information in the cloud. We describe a secure data sharing with other users in cloud storage. Data corner is authorized to the admittance approach related with individual information that is to be stored within jurisdiction. The authenticate users can aggregate several groups of top-secret keys and makes them as enfold together a solitary key and potential of entire keys being aggregated. This aggregate key is Re-encrypted and generates the personal key as a constant key size. This Personal key provides more secure of the privacy information for

    Coirs: cost optimized identity based ring signature with forward secrecy in cloud computing

    Get PDF
    In recent days Cloud computing is a rising technique which offers data sharing with more efficient, effective and economical approaches between group members. To create an authentic and anonymous data sharing, IDentity based Ring Signature (ID-RS) is one of the promising technique between the groups. Ring signature scheme permits the manager or data owner to authenticate into the system in anonymous manner. In conventional Public Key Infrastructure (PKI) data sharing scheme contains certificate authentication process, which is a bottleneck because of its high cost. To avoid this problem, we proposed Cost Optimized Identity based Ring Signature with forward secrecy (COIRS) scheme. This scheme helps to remove the traditional certificate verification process. Only once the user needs to be verified by the manager giving his public details. The cost and time required for this process is comparatively less than traditional public key infrastructure. If the secret key holder has been compromised, all early generated signatures remains valid (Forward Secrecy). This paper discuss about how to optimize the time and cost when sharing the files to the cloud. We provide a protection from collision attack, which means revoked users will not get the original documents. In general better efficiency and secrecy can be provided for group sharing by applying above approache
    corecore