Enhancement of Security for Data Storage in Cloud
Journal: International Journal of Science and Research (IJSR) (Vol.2, No. 4)Publication Date: 2013-04-05
Authors : M. Hemaanand; K.Varalakshmi;
Page : 80-82
Keywords : cloud computing; data sharing; jar; logger; steganography;
Abstract
Cloud computing is the use of computing resources such as hardware and software that are delivered as a service over the internet. Since the user�s data are usually processed or stored remotely in unknown machines, user may not have full control over the data and it can be accessed by some third party. The data stored in the cloud should be decentralized in order to adapt to nature of cloud. In the existing system the jar file is used to hide the data which can be subjected to attack. To overcome the above problem the proposed system uses the Steganography method. In this method the data is hidden behind the image and the image is converted into a Jar file and stored in the Cloud, when the data access take place the reverse process is carried out to get the original data and the user is allowed to access the contents in the data. When the data is accessed by the user a separate logger is created to keep track of the user and it is periodically sent to the data owner.
Other Latest Articles
- Mobile Ad hoc Network
- Cell Phone Tower: A Gift or Curse
- Antennal Sensilla of Cashew Stem and Root Borers Plocaederus Ferrugenius and P.obesus (Coleoptera: Cerambycidae)
- Novel Highspeed Architecture for Median Filter
- Can C - reactive protein As a Marker for Fasting Hyperinsulinemia in Subclinical Hypothyroidism
Last modified: 2021-06-30 20:15:34