Open Access   Article Go Back

A Security of Cloud Data Storage Using AF Crawler Algorithm in Cloud Computing Systems

N.Sheeba Pershi1 , G.Sathish Kumar2

Section:Review Paper, Product Type: Journal Paper
Volume-4 , Issue-4 , Page no. 327-332, Apr-2016

Online published on Apr 27, 2016

Copyright © N.Sheeba Pershi, G.Sathish Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: N.Sheeba Pershi, G.Sathish Kumar, “A Security of Cloud Data Storage Using AF Crawler Algorithm in Cloud Computing Systems,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.327-332, 2016.

MLA Style Citation: N.Sheeba Pershi, G.Sathish Kumar "A Security of Cloud Data Storage Using AF Crawler Algorithm in Cloud Computing Systems." International Journal of Computer Sciences and Engineering 4.4 (2016): 327-332.

APA Style Citation: N.Sheeba Pershi, G.Sathish Kumar, (2016). A Security of Cloud Data Storage Using AF Crawler Algorithm in Cloud Computing Systems. International Journal of Computer Sciences and Engineering, 4(4), 327-332.

BibTex Style Citation:
@article{Pershi_2016,
author = {N.Sheeba Pershi, G.Sathish Kumar},
title = {A Security of Cloud Data Storage Using AF Crawler Algorithm in Cloud Computing Systems},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {4},
Issue = {4},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {327-332},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=941},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=941
TI - A Security of Cloud Data Storage Using AF Crawler Algorithm in Cloud Computing Systems
T2 - International Journal of Computer Sciences and Engineering
AU - N.Sheeba Pershi, G.Sathish Kumar
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 327-332
IS - 4
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1396 1281 downloads 1390 downloads
  
  
           

Abstract

Gradually more furthermore, more associations are opting for outsourcing information to remote cloud administration providers (CSPs). clients can rent the CSPs capacity foundation to store furthermore, get back almost limitless sum of information by paying sum per month. On behalf of an improved level of scalability, availability, furthermore, durability, some clients may want their information to be virtual on distinctive servers over distinctive information centers. The more duplicates the CSP is asked to store, the more sum the clients are charged. As a result, clients need to have a solid assurance that the CSP is storing all information duplicates that are chosen upon in the administration contract, furthermore, all these duplicates are reliable with the most later changes issued by the clients. Map-based provable multi-copy dynamic information ownership (MB-PMDDP) technique is being proposed in this paper furthermore, comprises of the following features: 1) it affords an proof to the clients that the CSP is not degenerate by storing less copies; 2) it bolsters outsourcing of dynamic data, i.e., it bolsters block-level functions, such as square alteration, addition, deletion, furthermore, append; furthermore, 3) it licenses official clients to easily access the record duplicates stored by the CSP. In addition, we discuss the security against conspiring servers, furthermore, discuss how to perceive tainted duplicates by a little revising the projected scheme.

Key-Words / Index Term

loud Computing, Dynamic Environment, Data Copy, Outsourcing Data Storage

References

[1] Zhou Peng; Jinhua Zheng; Juan Zou, “A population diversity maintaining strategy based on dynamic environment evolutionary model for dynamic multi objective optimization”, 2014 IEEE Congress on Evolutionary Computation (CEC),Year: 2014, Pages: 274 – 281.
[2] Shivlal Mewada, Umesh Kumar Singh, Pradeep Sharma, “Security Based Model for Cloud Computing”, International Journal of Computer Networks and Wireless Communications Vol. 1(1), pp (13-19), December 2011.
[3] Ling Zhang; Yan-bin Liu, “The influence of dynamic environment and resource allocation on enterprises financial performance”, Management Science and Engineering (ICMSE), 2012 International Conference on, Year: 2012, Pages: 1314 – 1320.
[4] Inderjeet Singh Dogra; Ziad Kobti, “Improving prediction accuracy in agent based modeling systems under dynamic environment”, 2013 IEEE Congress on Evolutionary Computation, Year: 2013, Pages: 2114 – 2121.
[5] C. E. Campbell; G. McCulley, “Terrain reasoning challenges in the CCTT dynamic environment”, AI Simulation, and Planning in High Autonomy Systems, 1994. Distributed Interactive Simulation Environments, Proceedings of the Fifth Annual Conference on, Year: 1994,Pages: 55 – 61.
[6] Aameek Singh; Ling Liu, “Sharoes: A Data Sharing Platform for Outsourced Enterprise StorageEnvironments”, 2008 IEEE 24th International Conference on Data Engineering, Year: 2008, Pages: 993 – 1002.
[7] Shaheen Ayyub and Devshree Roy, "Cloud Computing Characteristics and Security Issues", International Journal of Computer Sciences and Engineering, Volume-01, Issue-04, Page No (18-22), Dec -2013,
[8] Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Vol.-01, Issue-01, pp (31-37), Jan -Feb 2013
[9] Harsh Yadav; Mayank Dave, “Secure data storage operations with verifiable outsourced decryption for mobile cloud computing”, Recent Advances and Innovations in Engineering (ICRAIE), 2014, Year: 2014, Pages: 1 – 5.
[10] B.Subasri, P.Vijayalakshmi, P.Yurega and E.Revathi, "Improving Zero Knowledge in Cloud Storage Auditing System", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (204-207), Mar -2014
[11] Juan Camilo Corena; Anirban Basu; Shinsaku Kiyomoto; Yutaka Miyake; Tomoaki Ohtsuki, “Beyond proofs of data possession: Finding defective blocks in outsourced storage”, 2014 IEEE Global Communications Conference, Year: 2014,Pages: 2381 - 2386
[12] Ayad F. Barsoum; M. Anwar Hasan, “Provable Multicopy Dynamic Data Possession in Cloud Computing Systems”, IEEE Transactions on Information Forensics and Security, Year: 2015, Volume: 10, Issue: 3, Pages: 485 – 497.
[13] Qia Wang; Wenjun Zeng; Jun Tian, “A Compressive Sensing Based Secure Watermark Detection and Privacy Preserving Storage Framework”, IEEE Transactions on Image Processing, Year: 2014, Volume: 23, Issue: 3, Pages: 1317 – 1328.
[14] Xiuxia Tian; Ling Huang; Tony Wu; Xiaoling Wang; Aoying Zhou, “CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework”, IEEE Transactions on Knowledge and Data Engineering, Year: 2015, Volume: 27, Issue: 12, Pages: 3217 – 3230.
[15] Ankita Lathey; Pradeep K. Atrey; Nishant Joshi, “Homomorphic Low Pass Filtering on Encrypted Multimedia over Cloud”, Semantic Computing (ICSC), 2013 IEEE Seventh International Conference on, Year: 2013, Pages: 310 – 313.