Corpus ID: 6074025

Java Based Resource Sharing with Secure Transaction in User Cloud Environment

  title={Java Based Resource Sharing with Secure Transaction in User Cloud Environment},
  author={Sanjay Kumar Brahman and B. Patel},
The increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. This lead to the demand of cloud computing. But there are some security concerns when we handle and share data in the cloud computing environment. In this paper we proposed a trusted cloud environment. In this environment we upload the data after applying private-key cryptography. In this a secret… Expand

Figures from this paper

Data sharing and Management based on RC4 in User Cloud Environment
There is vast demand of cloud computing are increases in the today’s era because of the on demand service of cloud computing. Our paper main direction is to make data communication better in theExpand
Secure Cloud Data Computing with Third Party Auditor Control
The proposed methodology provides secure centralized control and alert system that achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving clients and it can be control by the servers. Expand
Optimized and Secure Cloud Computing Using Virtualization: A Survey
In today’s grow older the unrestrained proprietorship is to vim adequate amount of data. In conventional approach if we need about several large scale, computing machines it is painful, but spasm aExpand
Assured Data Transfer under Auditing in Distributed Circumstances
Distributed considerations are the major acquiring epitome. The domain abbreviates monetary value related on computation. The service provided on scattered location to its users on demand across theExpand
Assured Data Transfer under Auditing in Distributed Circumstances
To enrich security on data, the security mechanisms are implemented, though the data integrity is unnoticed to user, and the method of auditing is established through Third Party Auditing (TPA). Expand


Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment
A new cloud computing environment where a trusted cloud environment which is controlled by both the client and the cloud environment admin is proposed, which provides a two way security protocol which helps both the cloud and the normal user. Expand
Cloud Computing System Based on Trusted Computing Platform
A new prototype system is proposed, in which cloud computing system is combined with Trusted Platform Support Service (TSS) and TSS is based on Trusted platform Module (TPM), in which better effect can be obtained in authentication, role based access and data protection in cloud computing environment. Expand
Executing SQL over encrypted data in the database-service-provider model
The paper explores an algebraic framework to split the query to minimize the computation at the client site, and explores techniques to execute SQL queries over encrypted data. Expand
Property-Based Remote Attestation Oriented to Cloud Computing
  • Siyuan Xin, Y. Zhao, Yu Li
  • Computer Science
  • 2011 Seventh International Conference on Computational Intelligence and Security
  • 2011
In this method, through the attestation proxy, the remote attestation of the computing platform's security property is realized without disclosing the platform's configuration, and users can validate the security property of the actual computing platform in the virtual cloud computing environment. Expand
Modeling and assessing inference exposure in encrypted databases
This paper presents a simple yet robust single-server solution for remote querying of encrypted databases on external servers based on the use of indexing information attached to the encrypted database, which can be used by the server to select the data to be returned in response to a query without the need of accessing the plaintext database content. Expand
Preserving confidentiality of security policies in data outsourcing
An approach to protect the privacy of the tokens published in the public catalog by combining cryptography and transitive closure information and is an efficient solution allowing token release and traversal of the key derivation structure only to those users authorized to access the underlying resources. Expand
Potential of cloud computing architecture
The paper has compiled up the comparison for major solution for cloud computing and concluded that the architectures of cloud computing do not reflect the user perspectives and with the technical requirements fully but it has potential to capture the market of development and dynamic scaling to datacenters. Expand
A Delegation Solution for Universal Identity Management in SOA
A pseudonym-based signature scheme is first designed where pseudonyms are self-generated and unlinkable for realizing user's privacy and a proxy signature is presented with the pseudonyms as public keys where delegation can be achieved through certificate chains. Expand
Providing database as a service
We explore a novel paradigm for data management in which a third party service provider hosts "database as a service", providing its customers with seamless mechanisms to create, store, and accessExpand
Development of Cloud Based Safety Confirmation System for Great Disaster
  • Hiroaki Yuze, Naoyoshi Suzuki
  • Computer Science
  • 2012 26th International Conference on Advanced Information Networking and Applications Workshops
  • 2012
How the safety confirmation system used under the Great East Japan Earthquake by the analysis of the registrations' logs is reported and the selection of the system's functions by the conditions of the earthquake is reported. Expand