Current Issue : January - March Volume : 2016 Issue Number : 1 Articles : 6 Articles
In this paper, we present a hybrid cloud architecture which combines public cloud, private\ncloud computing and cryptography to minimize the bank�s operational costs, maximizing the\nflexibility, scalability, availability and reliability of the services provided by the bank and\nguarantees the privacy, confidentiality and safety of the client�s record. A smart card which\ncontains a secret key is produced for each client upon creating a new account. A smart card\nwhich contains a pair of public/private keys is produced for each bank. A smart card which\ncontains a secret key is produced for the auditor to decrypt the database of the banks�\npublic/private keys for auditing purposes. The secret key is used to encrypt and decrypt the\nclient�s account data The bank uses its public key to double encrypt the client�s data that are\ntemporarily stored in the bank�s private cloud before being transmitted to be stored\npermanently in the public cloud. In order to perform any transaction on a client�s account, the\nclient�s record must be retrieved from the public cloud and stored temporarily in the bank�s\nprivate cloud in order to be decrypted with the bank�s private key and then decrypted using the\nclient�s secret key in order to perform the required transaction in the private cloud....
Data retrieval on encrypted documents is a very important technology in cloud storage, where encryption on\nsensitive data is a necessary operation to protect documents privacy before they are outsourced to cloud. Most of\nexisting searchable encryption schemes concentrate on single-user scenario. In this paper, we focus on the multiple\nsender and multiple user application scenario to provide a flexible search authorization searchable encryption (SE)\nscheme. The attribute based encryption (ABE) technology is used to support fine-grained access control and the\nsynonym keyword search is enabled in the new scheme. The new primitive is named as attribute based searchable\nencryption with synonym keyword search function (SK-ABSE). The formally definition of SK-ABSE is given together\nwith a concrete construction. This scheme also enables convenient user revocation mechanism....
As the Internet of Things continues to expand in the coming years, the need for services that span multiple IoT application domains\nwill continue to increase in order to realize the efficiency gains promised by the IoT. Today, however, service developers looking\nto add value on top of existing IoT systems are faced with very heterogeneous devices and systems. These systems implement\na wide variety of network connectivity options, protocols (proprietary or standards-based), and communication methods all of\nwhich are unknown to a service developer that is new to the IoT. Even within one IoT standard, a device typically has multiple\noptions for communicating with others. In order to alleviate service developers from these concerns, this paper presents a cloudbased\nplatform for integrating heterogeneous constrained IoT devices and communication models into services. Our evaluation\nshows that the impact of our approach on the operation of constrained devices is minimal while providing a tangible benefit in\nservice integration of low-resource IoT devices. A proof of concept demonstrates the latter by means of a control and management\ndashboard for constrained devices that was implemented on top of the presented platform. The results of our work enable service\ndevelopers to more easily implement and deploy services that span a wide variety of IoT application domains....
We present a novel approach to solve the cloud storage issues and provide a fast load balancing algorithm. Our approach is based\non partitioning and concurrent dual direction download of the files from multiple cloud nodes. Partitions of the files are saved on\nthe cloud rather than the full files, which provide a good optimization to the cloud storage usage. Only partial replication is used\nin this algorithm to ensure the reliability and availability of the data. Our focus is to improve the performance and optimize the\nstorage usage by providing the DaaS on the cloud. This algorithm solves the problem of having to fully replicate large data sets,\nwhich uses up a lot of precious space on the cloud nodes. Reducing the space needed will help in reducing the cost of providing\nsuch space. Moreover, performance is also increased since multiple cloud servers will collaborate to provide the data to the cloud\nclients in a faster manner....
As one of the core issues for cloud computing, resource management adopts virtualization technology to shield the underlying\nresource heterogeneity and complexity which makes the massive distributed resources form a unified giant resource pool. It\ncan achieve efficient resource provisioning by using the rational implementing resource management methods and techniques.\nTherefore, how to manage cloud computing resources effectively becomes a challenging research topic. By analyzing the executing\nprogress of a user job in the cloud computing environment, we proposed a novel resource provisioning scheme based on the\nreinforcement learning and queuing theory in this study. With the introduction of the concepts of Segmentation Service Level\nAgreement (SSLA) and Utilization Unit Time Cost (UUTC), we viewed the resource provisioning problem in cloud computing as a\nsequential decision issue, and then we designed a novel optimization object function and employed reinforcement learning to solve\nit. Experiment results not only demonstrated the effectiveness of the proposed scheme, but also proved to out perform the common\nmethods of resource utilization rate in terms of SLA collision avoidance and user costs....
Cloud computing is delivery of computing resources such as processing power, storage and networking as a service to users. Data stored on the cloud can be accessed by cloud service provider if stored in clear text, so data on public clouds should be encrypted and stored to avoid unauthorized access. Cloud users storing his PHR on the cloud can be targeted and misused by advertising agencies and doctors for in advent actions. For securing user PHR stored on public cloud we have proposed a system which uses homomorphic key encryption. Our proposed system provides protection, integrity, privacy preservation, role based access control, homomorphic key encryption for user PHR stored on public cloud. In role based access control we have divided our system into multiple security domains. Each security domain provides access to authorized users based on roles. In case of emergency break glass access is provided to users from emergency department. Using the solutions quoted above we provide highly secure system for outsourcing and sharing users PHR on public cloud....
Loading....