The Securing Coding-based Cloud Storage opposed to malignant Attacks

  • Meena. R
  • Srinithy. S
  • Kavipriya .P
  • R Charanya Assistant Professor(Senior)
Keywords: Checksum Method, RC5 Algorithm, Data Security

Abstract

Nowadays cloud is becoming an emerging technology where the user can store their data and access it remotely using the internet. But the security to the user data has become
a major concern. pollution attack, a set of malicious entities trying to corrupt our stored
data in the cloud, which is considered as one of the major risk that affect data security in cloud storage . In our proposed technique , we show how to prevent the pollution attack and how to store our file safely.. The following techniques and algorithm are implemented
in our projects.. our first technique is ,the user send the data by encrypting it using RC5
ALGORITHM. The user can able to upload the following file format only(.jpg, .txt). The another technique is Checksum Method, a user send an encrypted file to the admin by using this method. This generates a key for that particular encrypted file. The encrypted file has to be verified by the admin. By this verification the checksum method generates a key to the file if the file has same key means the file not hacked or not attached. After verification the admin has to upload the file safely in cloud. If the user need that file means,he has to send a request to the admin.Only after getting the response key from admin the user able to download the file. Our Approach is to very robust and the polluters can be easily isolated.

Downloads

Download data is not yet available.

Author Biographies

Meena. R

Vellore Institute of Technology, Vellore, Tamilnadu, India

Srinithy. S

Vellore Institute of Technology, Vellore, Tamilnadu, India

Kavipriya .P

Vellore Institute of Technology, Vellore, Tamilnadu, India

R Charanya, Assistant Professor(Senior)

Vellore Institute of Technology, Vellore, Tamilnadu, India

References

[1]H. Dewan and R. Hansdah, “A survey of cloud storage facilities,” in IEEE SERVICES, jul 2011, pp. 224 –231.
[2] C. Anglano, R. Gaeta, and M. Grangetto, “Exploiting rateless codes in cloud storage
systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 5, pp. 1313–1322, May 2015.
[3] L. Buttyan, L. Czap, and I. Vajda, “Detection and recovery from pollution attacks in
coding-based distributed storage schemes,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 6, pp. 824–838, 2011.
[4] L. Buttyn, L. Czap, and I. Vajda, “Pollution attack defense for coding based sensor
storage,” in Proceedings of the IEEE Interna- tional Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), 2010.
[5] E. Kehdi and B. Li, “Null keys: Limiting malicious attacks via null space properties of network coding,” in INFOCOM 2009, IEEE.
[6] M. N. Krohn, M. J. Freedman, and D. Mazieres, “On-the-fly verification of rateless erasure codes for efficient content distribution,” Security and Privacy, IEEE Symposium on, 2004.
[7] C. Gkantsidis and P. Rodriguez, “Cooperative security for network coding file distribution,” in IEEE INFOCOM, 2006.
[8] Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, “An efficient signaturebased scheme for securing network coding against pollution attacks,” in INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 2008.
[9] Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, “An efficient scheme for securing xor network
coding against pollution attacks,” in INFOCOM 2009, IEEE.
[10] N. Cao, S. Yu, Z. Yang, W. Lou, and Y. Hou, “LT codes-based secure and reliable cloud
storage service,” in IEEE INFOCOM, 2012, pp. 693–701.
Published
2019-03-31
How to Cite
R, M., S, S., .P, K., & Charanya, R. (2019). The Securing Coding-based Cloud Storage opposed to malignant Attacks. GPH - International Journal Of Computer Science and Engineering, 2(03), 10-16. Retrieved from https://gphjournal.org/index.php/cse/article/view/189