Protected Data Forwarding by Erasure Coding to Cloud Storage System

Abstract

Present so many mobile services are converting to cloud depended mobile services with highly communications and higher flexibility. We explore a unique mobile cloud infrastructure that attaches mobiles and cloud services. This fresh infrastructure gives mobile instances which are virtual among cloud computing. To enter into marketing level various services containing this type of infrastructure, the people which give providers service have to know about these security openings. In this paper, we initially declare different mobile cloud services get into mobile cloud infrastructure and to discuss the security threats that might be chance through the usage of many service scenarios. Then, we explore architecture and methodology for abnormal behavior detection through the observation of host and network data. To check our methodology, we inserted malicious programs into our mobile cloud test be and utilized a machine learning algorithm to find out from those programs the abnormal behavior that arise.

Authors and Affiliations

Naren Raghavendra Suri , S. Gowtham Bharath

Keywords

Related Articles

 Speaker Independent Recognition System with Mouse Movements

 Speech recognition is potentially a multi-billion dollar industry in the near future. It is a natural alternative interface to computers for people with limited mobility in their arms and hands, sight, hearing limi...

 Efficient Patterns Using Hidden Web Trajectory Concept

 Previous Existing concepts of pattern discovery focus on background knowledge and ranking [1][2][5]. These kinds of patterns are not gives that any kind of benefits in business models. Background knowledge based...

 Fake Access Point Detection and Prevention Techniques

 There are mainly two type of networks, wired and wireless. The wireless network is much vulnerable to security attacks as compared to wired network. In wireless networks there are both active and passive attacks ar...

 Contrast Enhancement for Emissive Display Using Histogram Equalization and Bilateral Tone Adjustment

 Contrast enhancement has an important role in image processing applications. Conventional contrast enhancement techniques often fail to produce satisfactory results for broad variety of low contrast images or canno...

Download PDF file
  • EP ID EP141469
  • DOI -
  • Views 63
  • Downloads 0

How To Cite

Naren Raghavendra Suri, S. Gowtham Bharath (2013). Protected Data Forwarding by Erasure Coding to Cloud Storage System. International Journal of P2P Network Trends and Technology(IJPTT), 3(10), 442-447. https://europub.co.uk./articles/-A-141469