An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks IJTSRD
The widespread diffusion of distributed and cloud storage solutions has changed dramatically the way users, system designers, and service providers manage their data. Outsourcing data on remote storage provides indeed many advantages in terms of both capital and operational costs. To provide solutions for the above pollution attack and user data breach, we propose an early pollution detection algorithm able to spot the presence of an attack while fetching the data from cloud storage during the normal disk reading operations. Thus each fragment is check for malicious content and passed over to the server for processing. The alarm triggers a procedure that locates the polluting nodes in early stage of processing to avoid the intrusion. Also to detect the polluted content hashing methods are used. In this way, after network peers receive the transmitted data, hash value is calculated by hash functions and then the result is compared with the received hash value from the content distribution network (CDN) servers to determine whether the transmitted data is polluted or not. I proposed system to addresses in preserving user data confidentiality and integrity after outsourcing. For this concern, we present our design for a new cloud storage encryption scheme that enables cloud storage providers to create convincing fake user secrets to protect user privacy.
By Vani. S | Priya Radhika Devi. T”An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks”
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018,
An Efficient Securing Code Based Cloud Storage using RC5 Encryption Algorithm against Pollution Attacks IJTSRD IEEE PAPER
Real Time Intrusion Detection System Using Computational Intelligence and Neural Network: A Review IJTSRD
Cooling by using Earthen Pot IJTSRD