International Journal on Recent and Innovation Trends in Computing and Communication
Massively scalable facilities may be accessed online with ease due to "Cloud Computing (CC)&... more Massively scalable facilities may be accessed online with ease due to "Cloud Computing (CC)". The CC resources are primarily characterized by the fact that "Cloud User (CU)" information is often kept on "Cloud Server (CS)" that the CU doesn't even possess or control. The CUs' apprehension about the loss of management of their information may lead to a substantial roadblock in their acceptance of CC offerings. In an attempt to highlight the effectiveness of CC security, the "Cloud Service Providers (CSP)" need to empower the CU to control and evaluate their data. The focus of this research chooses to highlight a key aspect of CC platforms employed to handle CU information on unrecognized CSs at remote locations. Concerns about compromising personal information arise from this feature's importance. In this research, a novel swarm-based "Enhanced BAT Optimization (EBO)" for key generating in "Cloud Computing Accountabil...
The increasing growth of storage data in the cloud and virtual reality allows it a significant ch... more The increasing growth of storage data in the cloud and virtual reality allows it a significant challenge to maintain the security of data that is outsourced by the data owners. The existing protocols for the auditing of cloud storage normally use post-quantum cryptography to monitor data integrity to solve this issue. Nevertheless, these protocols use strong cryptography to create data tags that reduce their reliability and extensibility. In this research work, we propose a novel protocol named "Advanced Distribution Verification Protocol (ADVP)" to design secure cloud storage to track the quality of cloud-saved data with the help of "Multiple-Third Party Auditors" (mTPAs) and not a "Single-TPA" (sTPA). This protocol requires several SUBTPAs that operate throughout the single TPA, which then needs to be spread equally throughout the SUBTPAs to guarantee that every SUBTPA is checked throughout the entire section. It then has strict safety evidence of mal...
International Journal on Recent and Innovation Trends in Computing and Communication
Massively scalable facilities may be accessed online with ease due to "Cloud Computing (CC)&... more Massively scalable facilities may be accessed online with ease due to "Cloud Computing (CC)". The CC resources are primarily characterized by the fact that "Cloud User (CU)" information is often kept on "Cloud Server (CS)" that the CU doesn't even possess or control. The CUs' apprehension about the loss of management of their information may lead to a substantial roadblock in their acceptance of CC offerings. In an attempt to highlight the effectiveness of CC security, the "Cloud Service Providers (CSP)" need to empower the CU to control and evaluate their data. The focus of this research chooses to highlight a key aspect of CC platforms employed to handle CU information on unrecognized CSs at remote locations. Concerns about compromising personal information arise from this feature's importance. In this research, a novel swarm-based "Enhanced BAT Optimization (EBO)" for key generating in "Cloud Computing Accountabil...
The increasing growth of storage data in the cloud and virtual reality allows it a significant ch... more The increasing growth of storage data in the cloud and virtual reality allows it a significant challenge to maintain the security of data that is outsourced by the data owners. The existing protocols for the auditing of cloud storage normally use post-quantum cryptography to monitor data integrity to solve this issue. Nevertheless, these protocols use strong cryptography to create data tags that reduce their reliability and extensibility. In this research work, we propose a novel protocol named "Advanced Distribution Verification Protocol (ADVP)" to design secure cloud storage to track the quality of cloud-saved data with the help of "Multiple-Third Party Auditors" (mTPAs) and not a "Single-TPA" (sTPA). This protocol requires several SUBTPAs that operate throughout the single TPA, which then needs to be spread equally throughout the SUBTPAs to guarantee that every SUBTPA is checked throughout the entire section. It then has strict safety evidence of mal...
Uploads
Papers by Libin Joseph