Flaw less coding and authentication of user data using multiple clouds

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 03 | Mar -2017

www.irjet.net

e-ISSN: 2395 -0056 p-ISSN: 2395-0072

FLAW LESS CODING AND AUTHENTICATION OF USER DATA USING MULTIPLE CLOUDS 1

J. Danny Anurisha and 2A.Lalitha 1 Student, 2

Associate Professor Department of Computer Science and Engineering, 1,2Valliammai Engineering College SRM Nagar, Kattankulathur-603203, TamilNadu, India. -------------------------------------------------------------------****----------------------------------------------------------------------1,2

Abstract-Nowadays more clients store their data in

It was reported that cloud computing had become a highly demanded service or utility since it has the advantages as follows as such of high computing power, East to use, high performance, scalability, accessibility as well as availability. Cloud computing services can be private, public or hybrid clouds. This model offers versatility and convenience while preserving the management control and security allocated to common to local data centers.In the public cloud, a third party provider delivers the cloud service over the internet for the user. Public cloud services are sold on demand, typically by the minute or hour for the CPU cycles, storage and bandwidth they consume. Hybrid cloud is the combination of public cloud services and on-premises private cloud. Sensitive applications and confidential information are stored on the private cloud while using the public cloud. The hybrid cloud aims to create a unified network that automated in a scalable environment that takes advantage of all that a public cloud infrastructure. IaaS providers such as AWS supply a virtual server and storage instance as well as application program interfaces (API) that let users migrate workloads to a virtual machine. User filess have an allocated storage capacity that can start, stop, access and configure the VM and storage as desired. IaaS providers offer customised memory or optimized instances in addition to customized instances for various workload needs. In the PaaS model, providers host development tools on their infrastructures in which the user access these tools over the internet using APIs, web portals or gateway software. The PaaS deployed is used for general software development and many PaaS provider hosts the software after the development phase is completed. SaaS is a distribution model that delivers software applications over the internet are called web services. Microsoft Office 365 is a software that offers SaaS for software productivity and email services. Users will be able to access SaaS applications

public cloud servers (PCSs).New security problems have to be solved in order to help more clients process their data in public cloud computing. The users are allowed to store data in the cloud, using services provided by multiple cloud storage providers (CSPs) which is a promising approach to increase the level of data availability and confidentiality. The data is stored by the splitting and merging concepts during storage in cloud environment. During file access private keys are generated using pseudo key generator. The keys are transmitted in a cipher text format to the users using 3DES encryption algorithm. This proposed system will solve the problem of storing data with reliability and security in multiple clouds in accordance to user budgets. To provide data confidentiality we use secure data hiding and image compression technique in cloud storage. Our main contribution will be image compression with reversible data hiding technique while storing in the real cloud. For image data hiding & image compression we use the Discrete Wavelet Transform (DWT) algorithm. Keywords-Public cloud servers, private key, data

hiding, image compression, Data encryption etc. 1. INTRODUCTION Cloud computing is an internet based computing that provides shared computer processing resources and data to computers and other devices on demand.Cloud providers typically use a pay service model. This will lead to unexpectedly high charges if administrators do not adapt to the pricing model in cloud. The availability of high-capacity networks, low-cost computers and storage devices which is the widespread adoption of hardware virtualization and its service-oriented architecture leads to autonomic and utility computing. Companies can scale up when computing needs increase rapidly and then scale down again as demands decrease.

Š 2017, IRJET

|

Impact Factor value: 5.181

|

ISO 9001:2008 Certified Journal

|

Page 363


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.