An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks

Abstract

The widespread diffusion of distributed and cloud storage solutions has changed dramatically the way users, system designers, and service providers manage their data. Outsourcing data on remote storage provides indeed many advantages in terms of both capital and operational costs. To provide solutions for the above pollution attack and user data breach, we propose an early pollution detection algorithm able to spot the presence of an attack while fetching the data from cloud storage during the normal disk reading operations. Thus each fragment is check for malicious content and passed over to the server for processing. The alarm triggers a procedure that locates the polluting nodes in early stage of processing to avoid the intrusion. Also to detect the polluted content hashing methods are used. In this way, after network peers receive the transmitted data, hash value is calculated by hash functions and then the result is compared with the received hash value from the content distribution network (CDN) servers to determine whether the transmitted data is polluted or not. I proposed system to addresses in preserving user data confidentiality and integrity after outsourcing. For this concern, we present our design for a new cloud storage encryption scheme that enables cloud storage providers to create convincing fake user secrets to protect user privacy. Vani. S | Priya Radhika Devi. T"An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10744.pdf http://www.ijtsrd.com/engineering/computer-engineering/10744/an-efficient-securing-code-based-cloud-storage-using-rc5-encryption-algorithm-against-pollution-attacks/vani-s

Authors and Affiliations

Keywords

Related Articles

Green Waste Disposal

Green waste includes grass clippings, leaves, tree limbs, Christmas trees, and organic materials. Green waste management practices protect the environment and residents from the detrimental health effects of pollution an...

Strategic Cost and Activating Competitive Advantage

This study aimed to identify the Role of Strategic Costs (SCs) in Activating Competitive Advantage (Field Study in the Paints Companies - Khartoum State). The study tested two hypotheses which are: There is a significant...

Forecasting Stock Market using Multiple Linear Regression

Regression is one of the most powerful statistical methods used in business and marketing researches. This paper shows the important instance of regression methodology called Multiple Linear Regression MLR and proposes a...

Modelling and Analysis of Go Kart Chassis

The best way to evaluate a functioning go kart would be testing its performance under various conditions and points. Therefore, a new go kart called Mech Tech initial was presented in this report. Mech Tech initial was c...

Sarojini Naidu – An Indian English Poetess Played Vital Role for Bengal as Well as Indian Renaissance

In the light of the subject it is approach to provide an adequate analysis of how important role in Bengal as well as Indian Renaissance played by Sarojini Naidu. This paper is an apogee to focus the subject from the dif...

Download PDF file
  • EP ID EP359508
  • DOI -
  • Views 91
  • Downloads 0

How To Cite

(2018). An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks. International Journal of Trend in Scientific Research and Development, 2(2), -. https://europub.co.uk./articles/-A-359508