A Security of Cloud Data Storage Using AF Crawler Algorithm in Cloud Computing Systems

Authors

  • N Sheeba Pershi M.Tech Scholar, Department of Computer Science & Engineering, MNSK College of Engineering, Pudukkottai
  • G Sathish Kumar Head, Department of Computer Science & Engineering, MNSK College of Engineering, Pudukkottai

Keywords:

Cloud Computing, Dynamic Environment, Data Copy, Outsourcing Data Storage

Abstract

Gradually more furthermore, more associations are opting for outsourcing information to remote cloud administration providers (CSPs). clients can rent the CSPs capacity foundation to store furthermore, get back almost limitless sum of information by paying sum per month. On behalf of an improved level of scalability, availability, furthermore, durability, some clients may want their information to be virtual on distinctive servers over distinctive information centers. The more duplicates the CSP is asked to store, the more sum the clients are charged. As a result, clients need to have a solid assurance that the CSP is storing all information duplicates that are chosen upon in the administration contract, furthermore, all these duplicates are reliable with the most later changes issued by the clients. Map-based provable multi-copy dynamic information ownership (MB-PMDDP) technique is being proposed in this paper furthermore, comprises of the following features: 1) it affords an proof to the clients that the CSP is not degenerate by storing less copies; 2) it bolsters outsourcing of dynamic data, i.e., it bolsters block-level functions, such as square alteration, addition, deletion, furthermore, append; furthermore, 3) it licenses official clients to easily access the record duplicates stored by the CSP. In addition, we discuss the security against conspiring servers, furthermore, discuss how to perceive tainted duplicates by a little revising the projected scheme.

References

Zhou Peng; Jinhua Zheng; Juan Zou, “A population diversity maintaining strategy based on dynamic environment evolutionary model for dynamic multi objective optimization”, 2014 IEEE Congress on Evolutionary Computation (CEC),Year: 2014, Pages: 274 – 281.

Shivlal Mewada, Umesh Kumar Singh, Pradeep Sharma, “Security Based Model for Cloud Computing”, International Journal of Computer Networks and Wireless Communications Vol. 1(1), pp (13-19), December 2011.

Ling Zhang; Yan-bin Liu, “The influence of dynamic environment and resource allocation on enterprises financial performance”, Management Science and Engineering (ICMSE), 2012 International Conference on, Year: 2012, Pages: 1314 – 1320.

Inderjeet Singh Dogra; Ziad Kobti, “Improving prediction accuracy in agent based modeling systems under dynamic environment”, 2013 IEEE Congress on Evolutionary Computation, Year: 2013, Pages: 2114 – 2121.

C. E. Campbell; G. McCulley, “Terrain reasoning challenges in the CCTT dynamic environment”, AI Simulation, and Planning in High Autonomy Systems, 1994. Distributed Interactive Simulation Environments, Proceedings of the Fifth Annual Conference on, Year: 1994,Pages: 55 – 61.

Aameek Singh; Ling Liu, “Sharoes: A Data Sharing Platform for Outsourced Enterprise StorageEnvironments”, 2008 IEEE 24th International Conference on Data Engineering, Year: 2008, Pages: 993 – 1002.

Shaheen Ayyub and Devshree Roy, "Cloud Computing Characteristics and Security Issues", International Journal of Computer Sciences and Engineering, Volume-01, Issue-04, Page No (18-22), Dec -2013,

Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Vol.-01, Issue-01, pp (31-37), Jan -Feb 2013

Harsh Yadav; Mayank Dave, “Secure data storage operations with verifiable outsourced decryption for mobile cloud computing”, Recent Advances and Innovations in Engineering (ICRAIE), 2014, Year: 2014, Pages: 1 – 5.

B.Subasri, P.Vijayalakshmi, P.Yurega and E.Revathi, "Improving Zero Knowledge in Cloud Storage Auditing System", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (204-207), Mar -2014

Juan Camilo Corena; Anirban Basu; Shinsaku Kiyomoto; Yutaka Miyake; Tomoaki Ohtsuki, “Beyond proofs of data possession: Finding defective blocks in outsourced storage”, 2014 IEEE Global Communications Conference, Year: 2014,Pages: 2381 - 2386

Ayad F. Barsoum; M. Anwar Hasan, “Provable Multicopy Dynamic Data Possession in Cloud Computing Systems”, IEEE Transactions on Information Forensics and Security, Year: 2015, Volume: 10, Issue: 3, Pages: 485 – 497.

Qia Wang; Wenjun Zeng; Jun Tian, “A Compressive Sensing Based Secure Watermark Detection and Privacy Preserving Storage Framework”, IEEE Transactions on Image Processing, Year: 2014, Volume: 23, Issue: 3, Pages: 1317 – 1328.

Xiuxia Tian; Ling Huang; Tony Wu; Xiaoling Wang; Aoying Zhou, “CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework”, IEEE Transactions on Knowledge and Data Engineering, Year: 2015, Volume: 27, Issue: 12, Pages: 3217 – 3230.

Ankita Lathey; Pradeep K. Atrey; Nishant Joshi, “Homomorphic Low Pass Filtering on Encrypted Multimedia over Cloud”, Semantic Computing (ICSC), 2013 IEEE Seventh International Conference on, Year: 2013, Pages: 310 – 313.

Downloads

Published

2025-11-11

How to Cite

[1]
N. Sheeba Pershi and G. Sathish Kumar, “A Security of Cloud Data Storage Using AF Crawler Algorithm in Cloud Computing Systems”, Int. J. Comp. Sci. Eng., vol. 4, no. 4, pp. 327–332, Nov. 2025.

Issue

Section

Review Article