A Security of Cloud Data Storage Using AF Crawler Algorithm in Cloud Computing Systems
Keywords:
Cloud Computing, Dynamic Environment, Data Copy, Outsourcing Data StorageAbstract
Gradually more furthermore, more associations are opting for outsourcing information to remote cloud administration providers (CSPs). clients can rent the CSPs capacity foundation to store furthermore, get back almost limitless sum of information by paying sum per month. On behalf of an improved level of scalability, availability, furthermore, durability, some clients may want their information to be virtual on distinctive servers over distinctive information centers. The more duplicates the CSP is asked to store, the more sum the clients are charged. As a result, clients need to have a solid assurance that the CSP is storing all information duplicates that are chosen upon in the administration contract, furthermore, all these duplicates are reliable with the most later changes issued by the clients. Map-based provable multi-copy dynamic information ownership (MB-PMDDP) technique is being proposed in this paper furthermore, comprises of the following features: 1) it affords an proof to the clients that the CSP is not degenerate by storing less copies; 2) it bolsters outsourcing of dynamic data, i.e., it bolsters block-level functions, such as square alteration, addition, deletion, furthermore, append; furthermore, 3) it licenses official clients to easily access the record duplicates stored by the CSP. In addition, we discuss the security against conspiring servers, furthermore, discuss how to perceive tainted duplicates by a little revising the projected scheme.
References
Zhou Peng; Jinhua Zheng; Juan Zou, “A population diversity maintaining strategy based on dynamic environment evolutionary model for dynamic multi objective optimization”, 2014 IEEE Congress on Evolutionary Computation (CEC),Year: 2014, Pages: 274 – 281.
Shivlal Mewada, Umesh Kumar Singh, Pradeep Sharma, “Security Based Model for Cloud Computing”, International Journal of Computer Networks and Wireless Communications Vol. 1(1), pp (13-19), December 2011.
Ling Zhang; Yan-bin Liu, “The influence of dynamic environment and resource allocation on enterprises financial performance”, Management Science and Engineering (ICMSE), 2012 International Conference on, Year: 2012, Pages: 1314 – 1320.
Inderjeet Singh Dogra; Ziad Kobti, “Improving prediction accuracy in agent based modeling systems under dynamic environment”, 2013 IEEE Congress on Evolutionary Computation, Year: 2013, Pages: 2114 – 2121.
C. E. Campbell; G. McCulley, “Terrain reasoning challenges in the CCTT dynamic environment”, AI Simulation, and Planning in High Autonomy Systems, 1994. Distributed Interactive Simulation Environments, Proceedings of the Fifth Annual Conference on, Year: 1994,Pages: 55 – 61.
Aameek Singh; Ling Liu, “Sharoes: A Data Sharing Platform for Outsourced Enterprise StorageEnvironments”, 2008 IEEE 24th International Conference on Data Engineering, Year: 2008, Pages: 993 – 1002.
Shaheen Ayyub and Devshree Roy, "Cloud Computing Characteristics and Security Issues", International Journal of Computer Sciences and Engineering, Volume-01, Issue-04, Page No (18-22), Dec -2013,
Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Vol.-01, Issue-01, pp (31-37), Jan -Feb 2013
Harsh Yadav; Mayank Dave, “Secure data storage operations with verifiable outsourced decryption for mobile cloud computing”, Recent Advances and Innovations in Engineering (ICRAIE), 2014, Year: 2014, Pages: 1 – 5.
B.Subasri, P.Vijayalakshmi, P.Yurega and E.Revathi, "Improving Zero Knowledge in Cloud Storage Auditing System", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (204-207), Mar -2014
Juan Camilo Corena; Anirban Basu; Shinsaku Kiyomoto; Yutaka Miyake; Tomoaki Ohtsuki, “Beyond proofs of data possession: Finding defective blocks in outsourced storage”, 2014 IEEE Global Communications Conference, Year: 2014,Pages: 2381 - 2386
Ayad F. Barsoum; M. Anwar Hasan, “Provable Multicopy Dynamic Data Possession in Cloud Computing Systems”, IEEE Transactions on Information Forensics and Security, Year: 2015, Volume: 10, Issue: 3, Pages: 485 – 497.
Qia Wang; Wenjun Zeng; Jun Tian, “A Compressive Sensing Based Secure Watermark Detection and Privacy Preserving Storage Framework”, IEEE Transactions on Image Processing, Year: 2014, Volume: 23, Issue: 3, Pages: 1317 – 1328.
Xiuxia Tian; Ling Huang; Tony Wu; Xiaoling Wang; Aoying Zhou, “CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework”, IEEE Transactions on Knowledge and Data Engineering, Year: 2015, Volume: 27, Issue: 12, Pages: 3217 – 3230.
Ankita Lathey; Pradeep K. Atrey; Nishant Joshi, “Homomorphic Low Pass Filtering on Encrypted Multimedia over Cloud”, Semantic Computing (ICSC), 2013 IEEE Seventh International Conference on, Year: 2013, Pages: 310 – 313.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
