Abstract
Electronic data has been created today in large quantities requiring data recovery services organization’s work may experience the various type of disasters whether it was natural or man-made, which may result in huge loss of data. In an experimental evaluation, the encryption and spatial scrambling performance and the average response time have been estimated in terms of the data file size. The Data user verifies the document with the proof and decrypts the encrypted file if verification is correct. Finally, it describes a prototype system configuration for several practical network applications, including the hybrid utilization of cloud computing facilities and environments which are already commercialized.
References
[1] Vahid Ashktorab and Seyed Reza Taghizadeh, Security Threats and Countermeasuresin Cloud Computingǁ, International Journal of Application or Innovation in Engineering and Management (IJAIEM), Volume 1, Issue 2, October 2018.
[2] Cloud Security Alliances, ―Top Threats to Cloud Computing V1.0ǁ, Cloud Security Alliances, Version 1, Page No. 3, March 2017.
[3] Wiiliam R Claycomb and Alex Nicoll,InsiderThreatstoNewResearchChallengesǁ,CERT. Wayne A. Janssen, Cloud Hooks: Security and Privacy Issues in Cloud Computing , 44th Hawaii International Conference on System Sciences, January 2015.
[4] Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, and MateiZahria, A view of Cloud Computingǁ, Communications of the ACM, Volume 53, Issue 4, April 2016.
[5] E. Kirda, C. Kruegel and G. Vigna, Cross- Site Scripting Prevention with Dynamic Data Tainting and Static Analysisǁ, Proceeding of the Network and Distributed System. 2014. Mayas Publication 24 Emperor Journal of Applied Scientific Research
[6] Shengmei Luo, Zhaoji Lin, Xiaohua Chen, Zhuolin Yang and JianyongChen,Virtualization Security for Cloud Computing Servicesǁ,International Conference on Cloud and Service Computing, December 2011.
[7] Albert B Jeng, Chien Chen Tseng, Der-Feng Tseng and Jiunn-Chin Wang, A Study of CAPTCHA and its Application to user Authenticationǁ, Proceedingof2ndInternationalConferenceonComputational Collective Intelligence: Technologies and Applications, 2010.
[8] A. Liu, Y. Yuan and A Stavrou, ǁSQLProb:A Proxybased Architecture toward Preventing SQL Injection Attacksǁ, SAC, March 2009.
[9] D. Gollmann, Securing Web Applicationsǁ, Information Security Technical Report, Volume 13, Issue 1, 2008 153.
[10] ZouheirTrabelsi, Hamza Rahmani, Kamel Kaouech and Mounir Frikha, Malicious Sniffing System Detection Platformǁ, Proceedings of the 2004 International Symposium on Applications and the Internet, 2004.
[11] Flavio Lombardi and Roberto di Pietro, Secure Virtualization for Cloud Computingǁ, Journal of Network and Computer Applications, Academic Press Ltd. London, UK, Volume 34, Issue 4, July 2011.
[12] Hanqian Wu, Yi Ding, Winer C. and Li Yao,ǁNetwork Security for Virtual Machine in Cloud Computingǁ, 5th International Conference Information Technology, Seoul, December 2010.
[13] SAVVIS, Securing the Cloud A Review of Cloud ComputingSecurity Implications and Best Practicesǁ, VMWARE WHITE PAPER, SAVVIS.
[14] Ruiping Lua and Kin Choong Yow, Mitigating DDoS Attacks with Transparent and Intelligent Fast-Flux Swarm Networkǁ, IEEE Network, Volume 25, Number 4, August 2011.
[15] Ramaiah, Y. Govinda, and G. VijayaKumari. "Efficient public key homomorphic encryption over integer plaintexts." Information Securityand Intelligence Control (ISIC), 2012 International Conference on. IEEE, 2012.