We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

An Enhanced Framework for Storage of Packets Securely on Cloud using Channel Quality Measure

by Kannan A., Sukanya D., Elakya K.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 35
Year of Publication: 2020
Authors: Kannan A., Sukanya D., Elakya K.
10.5120/ijca2020920434

Kannan A., Sukanya D., Elakya K. . An Enhanced Framework for Storage of Packets Securely on Cloud using Channel Quality Measure. International Journal of Computer Applications. 176, 35 ( Jul 2020), 34-39. DOI=10.5120/ijca2020920434

@article{ 10.5120/ijca2020920434,
author = { Kannan A., Sukanya D., Elakya K. },
title = { An Enhanced Framework for Storage of Packets Securely on Cloud using Channel Quality Measure },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2020 },
volume = { 176 },
number = { 35 },
month = { Jul },
year = { 2020 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number35/31428-2020920434/ },
doi = { 10.5120/ijca2020920434 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:44:16.167700+05:30
%A Kannan A.
%A Sukanya D.
%A Elakya K.
%T An Enhanced Framework for Storage of Packets Securely on Cloud using Channel Quality Measure
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 35
%P 34-39
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The data which is outsourced is done based on cloud computing and there can be security reasons, the data can be compromised by performing attacks by other user and then among sensing points in the cloud. This project implements Optimized Centrality method which is energy efficient and also has good throughput. In the approach the sensing points are chosen based on residual energy and high channel quality, the sensing points which are not used in the path are then used for replication. The entire file is divided into fragments and then stored in the sensing points. The distance between the sensing points is computed by making use of T-color methods by making use of combination of (x,y). x is x position for the sensing point and y is y position of the sensing point. The proposed optimized centrality method is then compared against E-Centrality, Closeness Centrality and Between Centrality and then proved that proposed method is better with respect to delay, hops, energy consumption, efficient sensing points, in-efficient sensing points, security bytes’ usage. The proposed also stores the packets by making use of DES method which is more secure as compared to AES used by compared methods.

References
  1. K. Bilal, S. U. Khan, L. Zhang, H. Li, K. Hayat, S. A. Madani, N. Min-Allah, L. Wang, D. Chen, M. Iqbal, C. Z. Xu, and A. Y. Zomaya, “Quantitative comparisons of the state of the art data center architectures,” Concurrency and Computation: Practice and Experience, Vol. 25, No. 12, 2013, pp. 1771-1783.
  2. K. Bilal, M. Manzano, S. U. Khan, E. Calle, K. Li, and A. Zomaya, “On the characterization of the structural robustness of data center networks,” IEEE Transactions on Cloud Computing, Vol. 1, No. 1, 2013, pp. 64-77.
  3. D. Boru, D. Kliazovich, F. Granelli, P. Bouvry, and A. Y. Zomaya, “Energy-efficient data replication in cloud computing datacenters,” In IEEE Globecom Workshops, 2013, pp. 446-451.
  4. Y. Deswarte, L. Blain, and J-C. Fabre, “Intrusion tolerance in distributed computing systems,” In Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, Oakland CA, pp. 110-121, 1991.
  5. B. Grobauer, T.Walloschek, and E. Stocker, “Understanding cloud computing vulnerabilities,” IEEE Security and Privacy, Vol.9, No. 2, 2011, pp. 50-57.
  6. W. K. Hale, “Frequency assignment: Theory and applications ” Proceedings of the IEEE, Vol. 68, No. 12, 1980, pp. 1497-1514.
  7. K. Hashizume, D. G. Rosado, E. Fernndez-Medina, and E. B. Fernandez, “An analysis of security issues for cloud computing,” Journal of Internet Services and Applications, Vol. 4, No. 1, 2013, pp. 1-13.
  8. W. A. Jansen, “Cloud hooks: Security and privacy issues in cloud computing,” In 44th Hawaii IEEE International Conference onSystem Sciences (HICSS), 2011, pp. 1-10.
  9. A. Juels and A. Opera, “New approaches to security and availability for cloud data,” Communications of the ACM, Vol.56, No. 2, 2013, pp. 64-73.
  10. G. Kappes, A. Hatzieleftheriou, and S. V. Anastasiadis, “Dike: Virtualization-aware Access Control for Multitenant Filesystems,” University of Ioannina, Greece, Technical Report No. DCS2013-1, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Between Centrality Closeness Centrality E-Centrality Sensing point Deployment