Skip to main content

File Distribution Preparation with File Retrieval and Error Recovery in Cloud Environment

  • Conference paper
  • First Online:
Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1 ( ICTIS 2017)

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 83))

Abstract

Many studies have derived multiple ways to achieve security in the server and integrating the data in multiple servers by detecting the misbehavior in the server. The data is secured on server using encryption techniques before dividing into fragments before storing on virtual cloud. The fragments in which data is divided could be big or small. For encryption technique I had used Reed Solomon codes to encrypt fragmented data. After using encryption they are stored into different servers. Whenever user will challenge for its particular file, Cloud Service Provider will provide that file in original form. If that data chunk from particular file or file is corrupted on any server so using Reed Solomon Code we can repair our corrupted data or file. So, whenever attacker might attack on the server he might get small portion of that file in encrypted form which is not useful for him. He did not get original file from one server because that particular file fragments are dispersed on different servers. This ensures data security to cloud servers, cloud customers important information. It will also provide security from cloud service provider. And if any misbehavior of server is occurred or any file fragment is corrupted can be detected with automated tools and it can be also traced that on which server the file fragment is corrupted. Hence, in any way the data stored on server is more secure on cloud platform.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)

    Article  Google Scholar 

  2. Ashalatha, R., Agarkhed, J., Patil, S.: Data storage security algorithms for multi cloud environment. In: 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB 2016) (2016)

    Google Scholar 

  3. Azougaghe, A., Kartit, Z., Hedaboui, M., Belkasmi, M., El Marraki, M.: An efficient algorithm for data security in cloud storage. In: 15th International Conference on Intelligent Systems Design and Applications (ISDA) (2015)

    Google Scholar 

  4. Gupta, R.R., Katara, S., Sarkar, M.K., Mishra, G., Agarwal, A., Das, R., Kumar, S.: Data storage security in cloud computing using container clustering. In: IEEE 7th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (2016)

    Google Scholar 

  5. Wu, S., Xu, Y., Li, Y., Yang, Z.: I/O-Efficient scaling schemes for distributed storage systems with CRS codes. IEEE Trans. Parallel Distrib. Syst. 27(9), 2477–2491 (2016)

    Article  Google Scholar 

  6. Liu, J.K., Liang, K., Susilo, W., Liu, J., Xiang, Y.: Two-factor data security protection mechanism for cloud storage system. IEEE Trans. Comput. 65(6), 1992–2004 (2016). IEEE

    Article  MathSciNet  MATH  Google Scholar 

  7. Shen, S.-T., Lin, H.-Y., Tzeng, W.-G.: An effective integrity check scheme for secure erasure code-based storage systems. IEEE Trans. Reliab. 64(3), 840–851 (2015)

    Article  Google Scholar 

  8. Mishra, V., Pateriya, R.K., Bhopal, M.: Efficient data administration with reed-Solomon code. Int. J. Sci. Res. Manag. (IJSRM) 4, 4929–4935 (2016)

    Google Scholar 

  9. Jogdand, R.M., Goudar, R.H., Sayed, G.B., Dhamanekar, P.B.: Enabling public verifiability and availability for secure data storage in cloud computing. Evolving Syst. 6(1), 55–65 (2015)

    Article  Google Scholar 

  10. https://downloads.cloudsecurityalliance.org/

  11. Khan, O., Burns, R., Plank, J., Pierce, W.: Rethinking Erasure Codes for Cloud File Systems: Minimizing I/O for Recovery and Degraded Reads. http://dwww.cs.jhu.edu/~okhan/fast12.pd

  12. Khedkar, S.V., Gawande, A.D.: Data partitioning technique to improve cloud data storage security. Int. J. Comput. Sci. Inf. Technol. 5(3), 3347–3350 (2014)

    Google Scholar 

  13. Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn.

    Google Scholar 

  14. Westall, J., Martin, J.: An Introduction to Galois Fields and Reed-Solomon Coding

    Google Scholar 

  15. Erl, T., Mahmood, Z., Puttini, R.: Cloud Computing Concepts, Technology and Architecture

    Google Scholar 

  16. Haiping, X., Bhalerao, D.: Reliable and secure distributed cloud data storage using reed-Solomon codes. Int. J. Softw. Eng. Knowl. Eng. 25, 1611 (2015)

    Article  Google Scholar 

  17. Ganatra, A., Panchal, G., Kosta, Y., Gajjar, C.: Initial classification through back propagation in a neural network following optimization through GA to evaluate the fitness of an algorithm. Int. J. Comput. Sci. Inf. Technol. 3(1), 98–116 (2011)

    Google Scholar 

  18. Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Forecasting employee retention probability using back propagation neural network algorithm. In: IEEE 2010 Second International Conference on Machine Learning and Computing (ICMLC), Bangalore, India, pp. 248–251 (2010)

    Google Scholar 

  19. Panchal, G., Ganatra, A., Shah, P., Panchal, D.: Determination of over-learning and over-fitting problem in back propagation neural network. Int. J. Soft Comput. 2(2), 40–51 (2011)

    Article  Google Scholar 

  20. Panchal, G., Ganatra, A., Kosta, Y., Panchal, D.: Behaviour analysis of multilayer perceptrons with multiple hidden neurons and hidden layers. Int. J. Comput. Theor. Eng. 3(2), 332–337 (2011)

    Article  Google Scholar 

  21. Panchal, G., Panchal, D.: Solving NP hard problems using genetic algorithm. Int. J. Comput. Sci. Inf. Technol. 6(2), 1824–1827 (2015)

    Google Scholar 

  22. Panchal, G., Panchal, D.: Efficient attribute evaluation, extraction and selection techniques for data classification. Int. J. Comput. Sci. Inf. Technol. 6(2), 1828–1831 (2015)

    Google Scholar 

  23. Panchal, G., Panchal, D.: Forecasting electrical load for home appliances using genetic algorithm based back propagation neural network. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1503–1506 (2015)

    Google Scholar 

  24. Panchal, G., Panchal, D.: Hybridization of genetic algorithm and neural network for optimization problem. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 4(4), 1507–1511 (2015)

    Google Scholar 

  25. Panchal, G., Samanta, D.: Comparable features and same cryptography key generation using biometric fingerprint image. In: 2nd IEEE International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 1–6 (2016)

    Google Scholar 

  26. Panchal, G., Samanta, D.: Directional area based minutiae selection and cryptographic key generation using biometric fingerprint. In: 1st International Conference on Computational Intelligence and Informatics, pp. 1–8. Springer (2016)

    Google Scholar 

  27. Panchal, G., Samanta, D., Barman, S.: Biometric-based cryptography for digital content protection without any key storage. In: Multimedia Tools and Application, pp. 1–18. Springer (2017)

    Google Scholar 

  28. Panchal, G., Kosta, Y., Ganatra, A., Panchal, D.: Electrical load forecasting using genetic algorithm based back propagation network. In: 1st International Conference on Data Management, IMT Ghaziabad. MacMillan Publication (2009)

    Google Scholar 

  29. Patel, G., Panchal, G.: A chaff-point based approach for cancelable template generation of fingerprint data. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), p. 6 (2017)

    Google Scholar 

  30. Patel, J., Panchal, G.: An IoT based portable smart meeting space with real-time room occupancy. In: International Conference on Internet of Things for Technological Development (IoT4TD-2017), pp. 1–6 (2017)

    Google Scholar 

  31. Soni, K., Panchal, G.: Data security in recommendation system using homomorphic encryption. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017)

    Google Scholar 

  32. Patel, N., Panchal, G.: An approach to analyze data corruption and identify misbehaving server. In: International Conference on ICT for Intelligent Systems (ICTIS 2017), pp. 1–6 (2017)

    Google Scholar 

  33. Kosta, Y., Panchal, D., Panchal, G., Ganatra, A.: Searching most efficient neural network architecture using Akaikes information criterion (AIC). Int. J. Comput. Appl. 1(5), 41–44 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurang Panchal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Mehta, S., Panchal, G. (2018). File Distribution Preparation with File Retrieval and Error Recovery in Cloud Environment. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1. ICTIS 2017. Smart Innovation, Systems and Technologies, vol 83. Springer, Cham. https://doi.org/10.1007/978-3-319-63673-3_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63673-3_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63672-6

  • Online ISBN: 978-3-319-63673-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics