+

Gopinath et al., 2015 - Google Patents

Dynamic Block Level Error Recovery to Trust Multimedia Data for E-learning Cloud Based Storage Services

Gopinath et al., 2015

View PDF
Document ID
2709217345194989689
Author
Gopinath R
Geetha B
Publication year
Publication venue
Research Journal of Applied Sciences, Engineering and Technology

External Links

Snippet

The purpose of the study is to design a cloud storage service to detect the maximum probability of disrupted data blocks in a timely manner for any dynamic changes of multimedia data that does not affect the cloud environment. In the current scenario, the cloud …
Continue reading at pdfs.semanticscholar.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/30144Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/3015Redundancy elimination performed by the file system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30091File storage and access structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • G06F17/2288Version control
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Similar Documents

Publication Publication Date Title
Wang et al. Toward publicly auditable secure cloud data storage services
Ren et al. Dynamic proofs of retrievability for coded cloud storage systems
Sookhak et al. Towards dynamic remote data auditing in computational clouds
Nithiavathy Data integrity and data dynamics with secure storage service in cloud
Meena et al. Survey on various data integrity attacks in cloud environment and the solutions
Bakro et al. Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms
Mehak et al. Security aspects of database-as-a-service (DBaaS) in cloud computing
Srisakthi et al. Towards the design of a secure and fault tolerant cloud storage in a multi-cloud environment
Balmany et al. Dynamic proof of retrievability based on public auditing for coded secure cloud storage
Thakur et al. Data integrity techniques in cloud computing: an analysis
Gopinath et al. Dynamic Block Level Error Recovery to Trust Multimedia Data for E-learning Cloud Based Storage Services
Vishnupriya et al. Secure multicloud storage with policy based access control and cooperative provable data possession
Twum et al. A Proposed New Framework for Securing Cloud Data on Multiple Infrastructures using Erasure Coding, Dispersal Technique and Encryption
Lopez-Falcon et al. Bi-objective analysis of an adaptive secure data storage in a multi-cloud
Chandran et al. Data management issues in cloud integrated computing: A big picture
Monti et al. An alternative information plan
Vijaya Kmari et al. Cloud storage auditing by utilizing provable data possession method
Barbi et al. Recast: Random entanglement for censorship-resistant archival storage
Reddy et al. Secure Storage Services and Erasure Code Implementation in Cloud Servers
Jiang et al. Proof of Storage with Corruption Identification and Recovery for Dynamic Group Users
Kumari et al. A Review on Challenges of Security for Secure Data Storage in Cloud
Patil et al. Integrity Verification in Multi-Cloud Storage Using Cooperative Provable DataPossession
George et al. Safest Secure and Consistent Data Services in the Storage of Cloud Computing
Bian et al. The Jigsaw secure distributed file system
Milkkal et al. Sheltered Data Storage Services in Cloud Computing
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载