A JOURNAL ON USER CENTRIC DATA PROTECTION METHOD FOR CLOUD STORAGE BASED ON INVERTIBLE DWT

Authors

  • Uooha P. Student, Saveetha School of Engineering, SIMATS, Chennai, India Author
  • Aishwarya Professor, Saveetha School of Engineering, SIMATS, Chennai, India Author

DOI:

https://doi.org/10.61841/m1h80g65

Keywords:

Selective encryption, Security in Cloud storage, GPGPU, DWT, Security analysis

Abstract

The principle point of this paper is to talk about how, using distributed storage contributions, clients can spare their data inside the cloud to avoid the use of close-by realities for storage and upkeep. To ensure the honesty of the realities spared in the cloud, numerous realities trustworthiness examining plans were proposed. In most, if not all, of the current plans, an individual wants to contract his private key to create the insights authenticators for knowing the data trustworthiness reviewing. Security on end customers' data set away in cloud servers transforms into a noteworthy issue in the present cloud conditions. In this paper, we present a novel data security strategy joining Selective Encryption (SE) thought with brokenness and dispersing on limit. Our methodology relies upon the invertible discrete wavelet transform (DWT) to isolate doubter data into three segments with three exceptional degrees of confirmation. By then, these three pieces can be dispersed over different accumulating zones with different degrees of dependability to verify end customers' data by restricting potential gaps in clouds. In this manner, our methodology streamlines the limit cost by saving expensive, private, and secure additional rooms and utilizing humble yet low-trustworthy additional rooms. We have heightened security examinations performed to affirm the high security level of our method. Moreover, the viability is shown by the utilization of sending tasks among the CPU and General Purpose Graphic Processing Unit (GPGPU) in a propelled way. 

Downloads

Download data is not yet available.

References

1. F. Hu, M. Qiu, J. Li, T. Grant, D. Taylor, S. McCaleb, L. Butler, and R. Hamner, “A review on cloud computing: Design challenges in architecture and security,” Journal of Computing and Information Technology, vol. 19, no. 1, pp. 25–55, 2011.

2. H. Li, K. Ota, and M. Dong, “Virtual network recognition and optimization in SDN-enabled cloud environments,” IEEE Transactions on Cloud Computing, 2018.

3. Y. Li, W. Dai, Z. Ming, and M. Qiu, “Privacy protection for preventing data over-collection in smart cities,” IEEE Transactions on Computers, vol. 65, no. 5, pp. 1339–1350, 2016.

4. L. Kuang, L. Yang, J. Feng, and M. Dong, “Secure tensor decomposition using a fully homomorphic encryption scheme,” IEEE Transactions on Cloud Computing, 2015.

5. J. Wu, M. Dong, K. Ota, J. Li, and Z. Guan, “Big data analysis-based secure cluster management for optimized control planes in software-defined networks,” IEEE Transactions on Network and Service Management, vol. 15, no. 1, pp. 27–38, 2018.

Downloads

Published

30.04.2020

How to Cite

P., U., & Aishwarya. (2020). A JOURNAL ON USER CENTRIC DATA PROTECTION METHOD FOR CLOUD STORAGE BASED ON INVERTIBLE DWT. International Journal of Psychosocial Rehabilitation, 24(2), 4618-4626. https://doi.org/10.61841/m1h80g65