Consistency Maintenance in Replication: A Novel Strategy Based on Diamond Topology in Cloud Storage

2017 ◽  
Vol 26 (1) ◽  
pp. 192-198 ◽  
Author(s):  
Siwei Luo ◽  
Mengshu Hou ◽  
Siyu Zhan ◽  
Mengjie Lyu ◽  
Ming Li
Author(s):  
D. Priyadarshini Et.al

Multiple corporations and people frequently launching their data in the cloud environment. With the huge growth of data mining and the cloud storage paradigm without checking protection policies and procedures that can pose a great risk to their sector. The data backup in the cloud storage would not only be problematic for the cloud user but also the Cloud Service Provider (CSP). The unencrypted handling of confidential data is likely to make access simpler for unauthorized individuals and also by the CSP. Normal encryption algorithms need more primitive computing, space and costs for storage. It is also of utmost importance to secure cloud data with limited measurement and storage capacity. Till now, different methods and frameworks to maintain a degree of protection that meets the requirements of modern life have been created. Within those systems, Intrusion Detection Systems (IDS) appear to find suspicious actions or events which are vulnerable to a system's proper activity. Today, because of the intermittent rise in network traffic, the IDS face problems for detecting attacks in broad streams of links. In existing the Two-Stage Ensemble Classifier for IDS (TSE-IDS) had been implemented. For detecting trends on big data, the irrelevant data characteristics appear to decrease both the velocity of attack detection and accuracy. The computing resource available for training and testing of the IDS models is also increased. We have put forward a novel strategy in this research paper to the above issues to improve the balance of the server load effectively with protected user allocation to a server, and thereby minimize resource complexity on the cloud data storage device, by integrating the Authentication based User-Allocation with Merkle based Hashing-Tree (AUA-MHT) technique. Through this, the authentication attack and flood attack are detected and restrict unauthorized users. By this proposed model the cloud server verifies, by resolving such attacks, that only approved users are accessing the cloud info. The proposed framework AUA-MHT performs better than the existing model TSE-IDS for parameters such as User Allocation Rate, Intrusion Detection Rate and Space Complexity


2019 ◽  
Vol 2 (2) ◽  
pp. 158-169
Author(s):  
Ha Huy Cuong Nguyen ◽  
◽  
Tung Trong Nguyen ◽  
Trung Hai Trinh

Author(s):  
K. Makanyadevi, Et. al.

Cloud computing is developing as the following disruptive utility worldview. It gives broad capacity capabilities and an environment for application engineers through virtual machines. Third-party inspectors (TPAs) are becoming more common in cloud computing implementations. Consequently, including reviewers comes with its issues such as belief and preparing overhead To achieve productive examining, we ought to (1) fulfill efficiently auditing without asking the information area or introducing preparing overhead to the cloud client; (2) avoid presenting unused security vulnerabilities amid the auditing handle There are various security models for safeguarding the CCs (Cloud Client) information within the cloud. The TPA methodically analyzes the prove of compliance with set up security criteria within the connection between the CC and the Cloud Benefit Supplier (CSP). A novel strategy to create the record for a copy check, and utilize a modern methodology to create the key for the record encryption. In expansion, the client as it were must perform lightweight computation to produce information authenticators, verify cloud information keenness, and recover the information from the cloud.


2019 ◽  
Vol 3 (1) ◽  
pp. 97-105
Author(s):  
Mary Zuccato ◽  
Dustin Shilling ◽  
David C. Fajgenbaum

Abstract There are ∼7000 rare diseases affecting 30 000 000 individuals in the U.S.A. 95% of these rare diseases do not have a single Food and Drug Administration-approved therapy. Relatively, limited progress has been made to develop new or repurpose existing therapies for these disorders, in part because traditional funding models are not as effective when applied to rare diseases. Due to the suboptimal research infrastructure and treatment options for Castleman disease, the Castleman Disease Collaborative Network (CDCN), founded in 2012, spearheaded a novel strategy for advancing biomedical research, the ‘Collaborative Network Approach’. At its heart, the Collaborative Network Approach leverages and integrates the entire community of stakeholders — patients, physicians and researchers — to identify and prioritize high-impact research questions. It then recruits the most qualified researchers to conduct these studies. In parallel, patients are empowered to fight back by supporting research through fundraising and providing their biospecimens and clinical data. This approach democratizes research, allowing the entire community to identify the most clinically relevant and pressing questions; any idea can be translated into a study rather than limiting research to the ideas proposed by researchers in grant applications. Preliminary results from the CDCN and other organizations that have followed its Collaborative Network Approach suggest that this model is generalizable across rare diseases.


Author(s):  
Taddese Mekonnen Ambay ◽  
Philipp Schick ◽  
Michael Grimm ◽  
Maximilian Sager ◽  
Felix Schneider ◽  
...  

2020 ◽  
Author(s):  
Ana Beloqui ◽  
Francesco Suriano ◽  
Matthias Hul ◽  
Yining Xu ◽  
Véronique Préat ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document