Enhanced Secure Big Data in Distributed Mobile Cloud Computing Using Fuzzy Encryption Model
Journal Title: Bonfring International Journal of Software Engineering and Soft Computing - Year 2018, Vol 8, Issue 2
Abstract
This paper proposes a novel architecture for adaptive encryption of public cloud databases that offers a proxy-free alternative to the system. cloud system is difficult to synchronize login and authentication data between external clouds and internal systems without exposing internal security data. The cloud technologies are rapidly being adopted throughout the Information Technology (IT) due to their various attractive properties. In spite of their spread, they have raised a range of significant security and privacy concerns which interrupt their adoption in sensitive environments. The cloud computing technology provides IT services and resources to the customers through public network such as internet. The cloud computing services and infrastructure are mostly owned by a third party called cloud service providers. Cloud computing provides an innovative model for the organizations to use software applications, storage and processing capabilities of cloud without investing on the infrastructure. Mobile cloud computing provides a novel ecommerce mode for organizations without any upfront investment. Since cloud computing uses distributed resources in open environment, it is important to provide secure keys to share the data for developing cloud computing applications. To ensure a correctness of users? data in the cloud, we propose an effective and secure distributed model including a Self-Proxy Server (SPS) with self-created algorithm. The model resolves a communication bottleneck due to re-encryption of a shared data in the cloud whenever users are revoked. It offers to reduce security risks and protect their resources because a distributed SPS dynamically interacts with Key Manager (KM) when the mobile users take on cloud services. This paper presents a comprehensive mobile cloud design which provides an effective and secure cloud computing services on mobile devices. This proposed system provides fuzzy authorization technique to ensure the correctness of username and the password for that fuzzy technique is used. This technique includes if the fake user to know the details about the password that is using the hint given. If the hacker know about the original password when he reenter. To avoid this type of the situation fuzzy authorization uses the technique if the entered password partially matches the user can get the video that is the fake video. After that hacker stop retrying the username and the password. The original data is taken after real password is given by the real user.
Authors and Affiliations
Pavithra P, Balamurugan K
Topic Categorization on Social Network Using Latent Dirichlet Allocation
Topic modelling is a powerful technique for analysis of large document collection. Topic modelling is used for finding hidden topic from the collection of document. In the twitter api, it is essential all the tweet docum...
Block Chain Technology for Privacy Protection for Cloudlet-based Medical Data Sharing
With the popularity of wearable devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing block chain of medical data mainly incl...
3D Adventure Game Using Unity
3D game with a First Person Shooting as well as Third Person Shooting mode available in which the player has to search the enemies on an amazing terrain map and kill the enemies using own wit and action.Project mainly de...
An Overview of Applications of Big Data Analytics
In recent years, the volume, variety and velocity of data is increased in all the applications. To discover information from large volume of data is a challenging task. Big Data Analytics helps to find useful information...