Fog-Based Delay-Sensitive Data Transmission Algorithm for Data Forwarding and Storage in Cloud Environment for Multimedia Applications

Big Data ◽  
2020 ◽  
Author(s):  
Azath Mubarakali ◽  
Anand Deva Durai ◽  
Mohmmed Alshehri ◽  
Osama AlFarraj ◽  
Jayabrabu Ramakrishnan ◽  
...  
Author(s):  
Shahad Alotaibi ◽  
Khadijah Alharbi ◽  
Balsam Abaalkhail ◽  
Dina M. Ibrahim

Sensitive data has become an essential part of life today. With the increase in sensitive data, the importance of maintaining its confidentiality and integrity has increased. One of the solutions became to store this data in the cloud. But the risk of revealing this data still exists. This is because the rate of attack, leakage and loss of this data has become a serious matter. The importance of sensitive data in our current era is considered our oil, as it is very important in several uses in statistical analyzes and other important matters that help the authorities to know the type of people and their interests, and when publishing this information it is important to know what information should be available and What information should not appear or be used on the sites. In this paper, discuss this issue, which is one of the most important security issues that is sensitive data exposure. We touched on this research and the techniques used to reduce these risks to the data stored in the cloud. Mention the types of sensitive data and the types of attacks that may affect these data, and mention the points of weakness, and then the methods of protecting this data.


The advantage of storing infinite data without giving any attentiontothe available storage restrictions and the liberty that one possesses to use those data when needed from anywhere in the globe, makes cloud environment the most ideal technology. Cloud hadalso became the preferred platform for storing and transferring the intendeddata. Both individuals and organizations were much comfortable in letting their sensitive data across their own generated cloud environments. But apart from the advantages that the cloud environments have imparted, it also have its own limitations. Limitations like risk of maintaining user’s data privacy, integrity, confidentiality and safety were normally existing while using the cloud environments. Besides allof the above said challenges, transferring of data from organization to cloud servers was considered with major importancein many evolving works. Several algorithms and encryption techniques have been developed currently for securing the operation of data transmission. Along this way, this paper proposes a design for thecloud framework that guarantees secured data transmission to serverfrom the source. This paper utilizes an approach called Honey Bee algorithm for encrypting and decrypting the datato be transmitted to the server. This algorithm is basically an encryption scheme which provides flexibility againstthe potential attacks by delivering a reasonable-looking text. But, the reasonable-looking text is a kind ofplain text generated for every wrong key used by an attacker for decrypting the message. Here a count of five keys will be generatedby the PRNG algorithmright after matching the OTP keys, which will be thenrandomly sent to users. The generated five keys aredeployed to promote additional security by the operation of anonymizationagainst the intruderstrying to access the data while under transmission. Here, in this proposed methodology,user cannot view all of his/her information, whereas the admin can have the full privilege of viewing all information about a user.Furthermore, performance metrics such as Key generation time, Encryption time, Decryption time and Message time were taken for the performance analysis to validate the performance of this proposed methodology with the existing considered methodologies.


2014 ◽  
Vol 687-691 ◽  
pp. 2764-2767
Author(s):  
Qiang Li ◽  
Kui Yang ◽  
Li Ma

With the popularity of the cloud computing, network technology obtains unprecedented development and revolution. Cloud computing is the direction of cyberspace storage in the computer and internet filed. Big data and multi-dimensional storage and calculation along with the cloud computing. Therefore, internet data security is the key point. For example, based on the cloud environment, the big data transmission and storage requires encryption technology. This article will research the data security of cloud computing, design the service model of data security encryption, and realize data transmission and storage security service of computer and internet cloud environment.


Sign in / Sign up

Export Citation Format

Share Document