A JOURNAL ON USER CENTRIC DATA PROTECTION METHOD FOR CLOUD STORAGE BASED ON INVERTIBLE DWT
DOI:
https://doi.org/10.61841/m1h80g65Keywords:
Selective encryption, Security in Cloud storage, GPGPU, DWT, Security analysisAbstract
The principle point of this paper is to talk about how, using distributed storage contributions, clients can spare their data inside the cloud to avoid the use of close-by realities for storage and upkeep. To ensure the honesty of the realities spared in the cloud, numerous realities trustworthiness examining plans were proposed. In most, if not all, of the current plans, an individual wants to contract his private key to create the insights authenticators for knowing the data trustworthiness reviewing. Security on end customers' data set away in cloud servers transforms into a noteworthy issue in the present cloud conditions. In this paper, we present a novel data security strategy joining Selective Encryption (SE) thought with brokenness and dispersing on limit. Our methodology relies upon the invertible discrete wavelet transform (DWT) to isolate doubter data into three segments with three exceptional degrees of confirmation. By then, these three pieces can be dispersed over different accumulating zones with different degrees of dependability to verify end customers' data by restricting potential gaps in clouds. In this manner, our methodology streamlines the limit cost by saving expensive, private, and secure additional rooms and utilizing humble yet low-trustworthy additional rooms. We have heightened security examinations performed to affirm the high security level of our method. Moreover, the viability is shown by the utilization of sending tasks among the CPU and General Purpose Graphic Processing Unit (GPGPU) in a propelled way.
Downloads
References
1. F. Hu, M. Qiu, J. Li, T. Grant, D. Taylor, S. McCaleb, L. Butler, and R. Hamner, “A review on cloud computing: Design challenges in architecture and security,” Journal of Computing and Information Technology, vol. 19, no. 1, pp. 25–55, 2011.
2. H. Li, K. Ota, and M. Dong, “Virtual network recognition and optimization in SDN-enabled cloud environments,” IEEE Transactions on Cloud Computing, 2018.
3. Y. Li, W. Dai, Z. Ming, and M. Qiu, “Privacy protection for preventing data over-collection in smart cities,” IEEE Transactions on Computers, vol. 65, no. 5, pp. 1339–1350, 2016.
4. L. Kuang, L. Yang, J. Feng, and M. Dong, “Secure tensor decomposition using a fully homomorphic encryption scheme,” IEEE Transactions on Cloud Computing, 2015.
5. J. Wu, M. Dong, K. Ota, J. Li, and Z. Guan, “Big data analysis-based secure cluster management for optimized control planes in software-defined networks,” IEEE Transactions on Network and Service Management, vol. 15, no. 1, pp. 27–38, 2018.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.