Advanced Cryptographic Standards-Based Secure Data Protocol for Distributed Data Storage and Communication in the Cloud
In this research, an ACS-based secure data protocol (ACS-based secure data protocol) is introduced for distributed data storage and communication in cloud. The component is constructed using the Owner’s Machine (OM), Data Processing Section (DPS), Cloud Monitoring Server (CMS), Metadata table, Key M...
Gespeichert in:
Veröffentlicht in: | International journal of cloud applications and computing 2022-04, Vol.12 (1), p.1-16 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 16 |
---|---|
container_issue | 1 |
container_start_page | 1 |
container_title | International journal of cloud applications and computing |
container_volume | 12 |
creator | Pawar, Ankush Balaram Ghumbre, Shashikant U Jogdand, Rashmi M |
description | In this research, an ACS-based secure data protocol (ACS-based secure data protocol) is introduced for distributed data storage and communication in cloud. The component is constructed using the Owner’s Machine (OM), Data Processing Section (DPS), Cloud Monitoring Server (CMS), Metadata table, Key Management Server (KMS) and Receiver’s Machine (RM). The session key is generated by exchanging the data between the client and server using the mathematical operations, such as interpolation, hashing, Walsh transform and Elliptic curve cryptography. The Triple Data Encryption Algorithm (3DES) is used for performing the activities, like assigning index, uploading and slicing file and encrypting the sliced files. The fuzzy cluster-based mechanism and the angular distance are performed for indexing and retrieval. The metrics, such as E2E delay, time and detection rate are used for evaluating the developed ACS based secure data protocol in the presence of inside attack, password spoofing attack and Denial-of-Service (DoS) attack. |
doi_str_mv | 10.4018/IJCAC.297097 |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2807868894</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A759922874</galeid><sourcerecordid>A759922874</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2054-7bdb9d92f82b2d3f29cefc84ab027e1818b720d3be7d16e777b08bd3fb440efe3</originalsourceid><addsrcrecordid>eNptkV1LwzAUhosoOHR3_oCAt3Ymadekl7PzYzJQmF6HfLXL2JqZpMr-vdkqfoDnIidwnrwnvG-SXCA4yiGi17PHalKNcElgSY6SAUbjIkUUF8ff9yw_TYber2CscU5hlg-Sj4l6563UClRutw22cXy7NBIsAm8Vd8qnN9zH6ULLzmkw5YGDZ2eDlXYNauvA1PjgjOhChA7TRbCONxrE96Cym03XGsmDsS0wLQhLDaq17dR5clLztdfDr36WvN7dvlQP6fzpflZN5qnE8Y8pEUqUqsQ1xQKrrMal1LWkORcQE40oooJgqDKhiUKFJoQISEUERZ5DXevsLLnsdbfOvnXaB7aynWvjSoYpJLSgtMwjddVTDV9rJjpvWu3j4U2zDL7hnfdsQsZliTElv3DprPdO12zrzIa7HUOQ7cNghzBYH0bEqx43jflZvzed_TGd9ab_p4Fw9gmO75RD</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2807868894</pqid></control><display><type>article</type><title>Advanced Cryptographic Standards-Based Secure Data Protocol for Distributed Data Storage and Communication in the Cloud</title><source>ProQuest Central</source><creator>Pawar, Ankush Balaram ; Ghumbre, Shashikant U ; Jogdand, Rashmi M</creator><creatorcontrib>Pawar, Ankush Balaram ; Ghumbre, Shashikant U ; Jogdand, Rashmi M</creatorcontrib><description>In this research, an ACS-based secure data protocol (ACS-based secure data protocol) is introduced for distributed data storage and communication in cloud. The component is constructed using the Owner’s Machine (OM), Data Processing Section (DPS), Cloud Monitoring Server (CMS), Metadata table, Key Management Server (KMS) and Receiver’s Machine (RM). The session key is generated by exchanging the data between the client and server using the mathematical operations, such as interpolation, hashing, Walsh transform and Elliptic curve cryptography. The Triple Data Encryption Algorithm (3DES) is used for performing the activities, like assigning index, uploading and slicing file and encrypting the sliced files. The fuzzy cluster-based mechanism and the angular distance are performed for indexing and retrieval. The metrics, such as E2E delay, time and detection rate are used for evaluating the developed ACS based secure data protocol in the presence of inside attack, password spoofing attack and Denial-of-Service (DoS) attack.</description><identifier>ISSN: 2156-1834</identifier><identifier>EISSN: 2156-1826</identifier><identifier>DOI: 10.4018/IJCAC.297097</identifier><language>eng</language><publisher>Hershey: IGI Global</publisher><subject>Algorithms ; Cloud computing ; Cryptography ; Curves ; Data processing ; Data security ; Data storage ; Denial of service attacks ; Information storage and retrieval ; Interpolation ; Servers ; Spoofing ; Walsh transforms</subject><ispartof>International journal of cloud applications and computing, 2022-04, Vol.12 (1), p.1-16</ispartof><rights>COPYRIGHT 2022 IGI Global</rights><rights>Copyright © 2022, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c2054-7bdb9d92f82b2d3f29cefc84ab027e1818b720d3be7d16e777b08bd3fb440efe3</citedby><cites>FETCH-LOGICAL-c2054-7bdb9d92f82b2d3f29cefc84ab027e1818b720d3be7d16e777b08bd3fb440efe3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2807868894?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21367,27901,27902,33721,43781</link.rule.ids></links><search><creatorcontrib>Pawar, Ankush Balaram</creatorcontrib><creatorcontrib>Ghumbre, Shashikant U</creatorcontrib><creatorcontrib>Jogdand, Rashmi M</creatorcontrib><title>Advanced Cryptographic Standards-Based Secure Data Protocol for Distributed Data Storage and Communication in the Cloud</title><title>International journal of cloud applications and computing</title><description>In this research, an ACS-based secure data protocol (ACS-based secure data protocol) is introduced for distributed data storage and communication in cloud. The component is constructed using the Owner’s Machine (OM), Data Processing Section (DPS), Cloud Monitoring Server (CMS), Metadata table, Key Management Server (KMS) and Receiver’s Machine (RM). The session key is generated by exchanging the data between the client and server using the mathematical operations, such as interpolation, hashing, Walsh transform and Elliptic curve cryptography. The Triple Data Encryption Algorithm (3DES) is used for performing the activities, like assigning index, uploading and slicing file and encrypting the sliced files. The fuzzy cluster-based mechanism and the angular distance are performed for indexing and retrieval. The metrics, such as E2E delay, time and detection rate are used for evaluating the developed ACS based secure data protocol in the presence of inside attack, password spoofing attack and Denial-of-Service (DoS) attack.</description><subject>Algorithms</subject><subject>Cloud computing</subject><subject>Cryptography</subject><subject>Curves</subject><subject>Data processing</subject><subject>Data security</subject><subject>Data storage</subject><subject>Denial of service attacks</subject><subject>Information storage and retrieval</subject><subject>Interpolation</subject><subject>Servers</subject><subject>Spoofing</subject><subject>Walsh transforms</subject><issn>2156-1834</issn><issn>2156-1826</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>N95</sourceid><sourceid>BENPR</sourceid><recordid>eNptkV1LwzAUhosoOHR3_oCAt3Ymadekl7PzYzJQmF6HfLXL2JqZpMr-vdkqfoDnIidwnrwnvG-SXCA4yiGi17PHalKNcElgSY6SAUbjIkUUF8ff9yw_TYber2CscU5hlg-Sj4l6563UClRutw22cXy7NBIsAm8Vd8qnN9zH6ULLzmkw5YGDZ2eDlXYNauvA1PjgjOhChA7TRbCONxrE96Cym03XGsmDsS0wLQhLDaq17dR5clLztdfDr36WvN7dvlQP6fzpflZN5qnE8Y8pEUqUqsQ1xQKrrMal1LWkORcQE40oooJgqDKhiUKFJoQISEUERZ5DXevsLLnsdbfOvnXaB7aynWvjSoYpJLSgtMwjddVTDV9rJjpvWu3j4U2zDL7hnfdsQsZliTElv3DprPdO12zrzIa7HUOQ7cNghzBYH0bEqx43jflZvzed_TGd9ab_p4Fw9gmO75RD</recordid><startdate>20220401</startdate><enddate>20220401</enddate><creator>Pawar, Ankush Balaram</creator><creator>Ghumbre, Shashikant U</creator><creator>Jogdand, Rashmi M</creator><general>IGI Global</general><scope>AAYXX</scope><scope>CITATION</scope><scope>N95</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20220401</creationdate><title>Advanced Cryptographic Standards-Based Secure Data Protocol for Distributed Data Storage and Communication in the Cloud</title><author>Pawar, Ankush Balaram ; Ghumbre, Shashikant U ; Jogdand, Rashmi M</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2054-7bdb9d92f82b2d3f29cefc84ab027e1818b720d3be7d16e777b08bd3fb440efe3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Cloud computing</topic><topic>Cryptography</topic><topic>Curves</topic><topic>Data processing</topic><topic>Data security</topic><topic>Data storage</topic><topic>Denial of service attacks</topic><topic>Information storage and retrieval</topic><topic>Interpolation</topic><topic>Servers</topic><topic>Spoofing</topic><topic>Walsh transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Pawar, Ankush Balaram</creatorcontrib><creatorcontrib>Ghumbre, Shashikant U</creatorcontrib><creatorcontrib>Jogdand, Rashmi M</creatorcontrib><collection>CrossRef</collection><collection>Gale Business: Insights</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>International journal of cloud applications and computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Pawar, Ankush Balaram</au><au>Ghumbre, Shashikant U</au><au>Jogdand, Rashmi M</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Advanced Cryptographic Standards-Based Secure Data Protocol for Distributed Data Storage and Communication in the Cloud</atitle><jtitle>International journal of cloud applications and computing</jtitle><date>2022-04-01</date><risdate>2022</risdate><volume>12</volume><issue>1</issue><spage>1</spage><epage>16</epage><pages>1-16</pages><issn>2156-1834</issn><eissn>2156-1826</eissn><abstract>In this research, an ACS-based secure data protocol (ACS-based secure data protocol) is introduced for distributed data storage and communication in cloud. The component is constructed using the Owner’s Machine (OM), Data Processing Section (DPS), Cloud Monitoring Server (CMS), Metadata table, Key Management Server (KMS) and Receiver’s Machine (RM). The session key is generated by exchanging the data between the client and server using the mathematical operations, such as interpolation, hashing, Walsh transform and Elliptic curve cryptography. The Triple Data Encryption Algorithm (3DES) is used for performing the activities, like assigning index, uploading and slicing file and encrypting the sliced files. The fuzzy cluster-based mechanism and the angular distance are performed for indexing and retrieval. The metrics, such as E2E delay, time and detection rate are used for evaluating the developed ACS based secure data protocol in the presence of inside attack, password spoofing attack and Denial-of-Service (DoS) attack.</abstract><cop>Hershey</cop><pub>IGI Global</pub><doi>10.4018/IJCAC.297097</doi><tpages>16</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2156-1834 |
ispartof | International journal of cloud applications and computing, 2022-04, Vol.12 (1), p.1-16 |
issn | 2156-1834 2156-1826 |
language | eng |
recordid | cdi_proquest_journals_2807868894 |
source | ProQuest Central |
subjects | Algorithms Cloud computing Cryptography Curves Data processing Data security Data storage Denial of service attacks Information storage and retrieval Interpolation Servers Spoofing Walsh transforms |
title | Advanced Cryptographic Standards-Based Secure Data Protocol for Distributed Data Storage and Communication in the Cloud |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T06%3A18%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Advanced%20Cryptographic%20Standards-Based%20Secure%20Data%20Protocol%20for%20Distributed%20Data%20Storage%20and%20Communication%20in%20the%20Cloud&rft.jtitle=International%20journal%20of%20cloud%20applications%20and%20computing&rft.au=Pawar,%20Ankush%20Balaram&rft.date=2022-04-01&rft.volume=12&rft.issue=1&rft.spage=1&rft.epage=16&rft.pages=1-16&rft.issn=2156-1834&rft.eissn=2156-1826&rft_id=info:doi/10.4018/IJCAC.297097&rft_dat=%3Cgale_proqu%3EA759922874%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2807868894&rft_id=info:pmid/&rft_galeid=A759922874&rfr_iscdi=true |