For Queries/Clarification

alameenpublications@gmail.com

e-ISSN 2455-9288

Why publish with

ijaser

IJASER publishes high-quality, original research papers, brief reports, and critical reviews in all theoretical, technological, and interdisciplinary studies that make up the fields of advanced science and engineering and its applications.

Enhanced Secure Data Distribution With Big Data Using Fuzzy Encryption Model

Abstract

ABSTRACT--A cloud system is difficult to synchronize login and authentication data between external clouds and internal systems without exposing internal security data. The cloud technologies are rapidly being adopted throughout the Information Technology (IT) due to their various attractive properties. In spite of their spread, they have raised a range of significant security and privacy concerns which interrupt their adoption in sensitive environments. The cloud computing technology provides IT services and resources to the customers through public network such as internet. The cloud computing services and infrastructure are mostly owned by a third party called cloud service providers. Mobile cloud computing provides a novel ecommerce mode for organizations without any upfront investment. Since cloud computing uses distributed resources in open environment, it is important to provide, we propose an effective and secure distributed model including a Self-Proxy Server (SPS) with self-created algorithm. The model resolves a communication bottleneck due to re-encryption of a shared data in the cloud whenever users are revoked. It offers to reduce security risks and protect their resources because a distributed SPS dynamically interacts with Key Manager (KM) when the mobile users take on cloud services. This technique includes if the fake user to know the details about the password that is using the
hint given. To avoid the hacker fuzzy authorization uses the technique if the entered password partially matches the user can get the video that is the fake video. After that hacker stop retrying the username and the password. The original data is taken a fter real password is given by the real user.

Author

MUTHUVEL SURESH KUMAR VIVEKANDHAN MOHAMED MOIDEEN Dr.MOHAMMED MUSTHAFA

 

[1]A.N.Khana,                   M.L.M.Kiaha,                    S.U.Khanb                    and                    S.A.Madanic,                   “Towards

 

Secure Mobile Cloud Computing: A Survey”, Future Generation Computer Systems, vol.29, Issues 5, July 2013.

 

[2] M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, A. Konwinski, G. Lee,

 

D.A. Patterson, A. Rabkin, I. Stoica, M. Zaharia, Above the clouds: a Berkeley view of cloud computing, Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley, Feb. 2009.

 

[3]R. Ranjan, A. Harwood, R. Buyya, Grid federation: an economy based distributedresourcemanagementsystemforlarge-scaleresourcecoupling,Technical Report GRIDS-TR-2004-10, Grid Computing and Distributed Systems Laboratory, University of Melbourne, Australia, 2004.

 

[4] R. Buyya, R. Ranjan, Federated resource management in grid and cloud computing systems, Future Generation Computer Systems 26 (8) (2006) 11891191.

-->