Articles liés à Cloud Computing. Strategies for Improving the Performance...

Cloud Computing. Strategies for Improving the Performance and Security - Couverture souple

 
9783346065582: Cloud Computing. Strategies for Improving the Performance and Security

Synopsis

Doctoral Thesis / Dissertation from the year 2019 in the subject Computer Science - Internet, New Technologies, language: English, abstract: Continuous advancement in software field and widespread use of software products many innovative applications have emerged, cloud computing is one of them. In cloud computing users need not to install software they just log in the cloud and pay for their required service. As many users are frequently using cloud computing a big question arises here is the security of user's personal data present at cloud. Therefore, we need to safeguard the data in the midst of untrusted processes. On keeping these issues in mind, a security model is designed in this thesis. The whole model is divided into three sections: one is data encryption, second is secure data storage and the third one is maintenance of data integrity. In first section before uploading the file on cloud, file is encrypted by RSA Partial Homomorphic algorithm. Two keys public and private are generated after encryption. Between these two keys public key is known to all but private key is known to only authorize users. In second section, the data owner uploads the encrypted file moreover with this one access permission list containing names of authorized user and their respective permission. In this model two access permissions (Read Only and Read and Write) are defined by the data owner. In third section the cloud provider calculates hash value of uploaded file using MD5 hash algorithm. This hash value is transferred back to the data owner to use it for verification purpose. As Owner performs verification, hash value of the desired data present at cloud is again calculated. Now this new hash value matches with old hash value which is present at owner end. If it matches no modification is performed, if hash value does not match then some modifications has been performed on the uploaded data. After uploading the file on cloud this file is visible to all users. They can

Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.

À propos de l?auteur

Dr. Parashu Ram Pal, obtained Ph.D. in Computer Science. He is working as a Professor in Department of Information Technology, ABES Engineering College, Ghaziabad, India. He has published three books and more than 40 Research Papers in various International, National Journals & Conferences. He is devoted to Education, Research & Development for more than twenty years and always try to create a proper environment for imparting quality education with the spirit of service to the humanity. He believes in motivating the colleagues and students to achieve excellence in the field of education and research.

Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.

Acheter neuf

Afficher cet article
EUR 47,95

Autre devise

EUR 10,99 expédition depuis Allemagne vers France

Destinations, frais et délais

Résultats de recherche pour Cloud Computing. Strategies for Improving the Performance...

Image fournie par le vendeur

Priyanka Ora
Edité par GRIN Verlag, 2020
ISBN 10 : 3346065588 ISBN 13 : 9783346065582
Neuf Taschenbuch

Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Taschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - Doctoral Thesis / Dissertation from the year 2019 in the subject Computer Science - Internet, New Technologies, , language: English, abstract: Continuous advancement in software field and widespread use of software products many innovative applications have emerged, cloud computing is one of them. In cloud computing users need not to install software they just log in the cloud and pay for their required service. As many users are frequently using cloud computing a big question arises here is the security of user's personal data present at cloud. Therefore, we need to safeguard the data in the midst of untrusted processes. On keeping these issues in mind, a security model is designed in this thesis. The whole model is divided into three sections: one is data encryption, second is secure data storage and the third one is maintenance of data integrity.In first section before uploading the file on cloud, file is encrypted by RSA Partial Homomorphic algorithm. Two keys public and private are generated after encryption. Between these two keys public key is known to all but private key is known to only authorize users. In second section, the data owner uploads the encrypted file moreover with this one access permission list containing names of authorized user and their respective permission. In this model two access permissions (Read Only and Read and Write) are defined by the data owner. In third section the cloud provider calculates hash value of uploaded file using MD5 hash algorithm. This hash value is transferred back to the data owner to use it for verification purpose. As Owner performs verification, hash value of the desired data present at cloud is again calculated. Now this new hash value matches with old hash value which is present at owner end. If it matches no modification is performed, if hash value does not match then some modifications has been performed on the uploaded data.After uploading the file on cloud this file is visible to all users. They can easily download the file but cannot decrypt it as all users don't have private key. Private key is sent to authenticate users by e-mail so that they can get original data. Data modification is controlled by the owner as cloud stores data in encrypted form. The whole architecture is compared with combination of Triple DES and SHA. The results generated by proposed model have shown that it takes less encryption and decryption time as compare to 3DES and SHA combination. Therefore, the proposed model provides better security and maintains data integrity of the uploaded data on cloud. N° de réf. du vendeur 9783346065582

Contacter le vendeur

Acheter neuf

EUR 47,95
Autre devise
Frais de port : EUR 10,99
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : 1 disponible(s)

Ajouter au panier

Image fournie par le vendeur

Priyanka Ora
Edité par GRIN Verlag Jan 2020, 2020
ISBN 10 : 3346065588 ISBN 13 : 9783346065582
Neuf Taschenbuch
impression à la demande

Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Doctoral Thesis / Dissertation from the year 2019 in the subject Computer Science - Internet, New Technologies, , language: English, abstract: Continuous advancement in software field and widespread use of software products many innovative applications have emerged, cloud computing is one of them. In cloud computing users need not to install software they just log in the cloud and pay for their required service. As many users are frequently using cloud computing a big question arises here is the security of user's personal data present at cloud. Therefore, we need to safeguard the data in the midst of untrusted processes. On keeping these issues in mind, a security model is designed in this thesis. The whole model is divided into three sections: one is data encryption, second is secure data storage and the third one is maintenance of data integrity.In first section before uploading the file on cloud, file is encrypted by RSA Partial Homomorphic algorithm. Two keys public and private are generated after encryption. Between these two keys public key is known to all but private key is known to only authorize users. In second section, the data owner uploads the encrypted file moreover with this one access permission list containing names of authorized user and their respective permission. In this model two access permissions (Read Only and Read and Write) are defined by the data owner. In third section the cloud provider calculates hash value of uploaded file using MD5 hash algorithm. This hash value is transferred back to the data owner to use it for verification purpose. As Owner performs verification, hash value of the desired data present at cloud is again calculated. Now this new hash value matches with old hash value which is present at owner end. If it matches no modification is performed, if hash value does not match then some modifications has been performed on the uploaded data.After uploading the file on cloud this file is visible to all users. They can easily download the file but cannot decrypt it as all users don't have private key. Private key is sent to authenticate users by e-mail so that they can get original data. Data modification is controlled by the owner as cloud stores data in encrypted form. The whole architecture is compared with combination of Triple DES and SHA. The results generated by proposed model have shown that it takes less encryption and decryption time as compare to 3DES and SHA combination. Therefore, the proposed model provides better security and maintains data integrity of the uploaded data on cloud. 120 pp. Englisch. N° de réf. du vendeur 9783346065582

Contacter le vendeur

Acheter neuf

EUR 47,95
Autre devise
Frais de port : EUR 11
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : 2 disponible(s)

Ajouter au panier

Image fournie par le vendeur

Priyanka Ora
ISBN 10 : 3346065588 ISBN 13 : 9783346065582
Neuf Taschenbuch

Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Taschenbuch. Etat : Neu. Neuware -Doctoral Thesis / Dissertation from the year 2019 in the subject Computer Science - Internet, New Technologies, , language: English, abstract: Continuous advancement in software field and widespread use of software products many innovative applications have emerged, cloud computing is one of them. In cloud computing users need not to install software they just log in the cloud and pay for their required service. As many users are frequently using cloud computing a big question arises here is the security of user¿s personal data present at cloud. Therefore, we need to safeguard the data in the midst of untrusted processes. On keeping these issues in mind, a security model is designed in this thesis. The whole model is divided into three sections: one is data encryption, second is secure data storage and the third one is maintenance of data integrity. In first section before uploading the file on cloud, file is encrypted by RSA Partial Homomorphic algorithm. Two keys public and private are generated after encryption. Between these two keys public key is known to all but private key is known to only authorize users. In second section, the data owner uploads the encrypted file moreover with this one access permission list containing names of authorized user and their respective permission. In this model two access permissions (Read Only and Read and Write) are defined by the data owner. In third section the cloud provider calculates hash value of uploaded file using MD5 hash algorithm. This hash value is transferred back to the data owner to use it for verification purpose. As Owner performs verification, hash value of the desired data present at cloud is again calculated. Now this new hash value matches with old hash value which is present at owner end. If it matches no modification is performed, if hash value does not match then some modifications has been performed on the uploaded data. After uploading the file on cloud this file is visible to all users. They can easily download the file but cannot decrypt it as all users don¿t have private key. Private key is sent to authenticate users by e-mail so that they can get original data. Data modification is controlled by the owner as cloud stores data in encrypted form. The whole architecture is compared with combination of Triple DES and SHA. The results generated by proposed model have shown that it takes less encryption and decryption time as compare to 3DES and SHA combination. Therefore, the proposed model provides better security and maintains data integrity of the uploaded data on cloud. 120 pp. Englisch. N° de réf. du vendeur 9783346065582

Contacter le vendeur

Acheter neuf

EUR 47,95
Autre devise
Frais de port : EUR 15
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : 2 disponible(s)

Ajouter au panier

Image d'archives

Pal, Parashu Ram; Ora, Priyanka
Edité par Grin Verlag, 2020
ISBN 10 : 3346065588 ISBN 13 : 9783346065582
Neuf Couverture souple

Vendeur : California Books, Miami, FL, Etats-Unis

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Etat : New. N° de réf. du vendeur I-9783346065582

Contacter le vendeur

Acheter neuf

EUR 66,30
Autre devise
Frais de port : EUR 6,87
De Etats-Unis vers France
Destinations, frais et délais

Quantité disponible : Plus de 20 disponibles

Ajouter au panier

Image fournie par le vendeur

Priyanka Ora (u. a.)
Edité par GRIN Verlag, 2020
ISBN 10 : 3346065588 ISBN 13 : 9783346065582
Neuf Taschenbuch

Vendeur : preigu, Osnabrück, Allemagne

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

Taschenbuch. Etat : Neu. Cloud Computing. Strategies for Improving the Performance and Security | Priyanka Ora (u. a.) | Taschenbuch | Englisch | 2020 | GRIN Verlag | EAN 9783346065582 | Verantwortliche Person für die EU: preigu, Ansas Meyer, Lengericher Landstr. 19, 49078 Osnabrück, mail[at]preigu[dot]de | Anbieter: preigu. N° de réf. du vendeur 117961626

Contacter le vendeur

Acheter neuf

EUR 47,95
Autre devise
Frais de port : EUR 45
De Allemagne vers France
Destinations, frais et délais

Quantité disponible : 5 disponible(s)

Ajouter au panier