Gopinath et al., 2015 - Google Patents
Dynamic Block Level Error Recovery to Trust Multimedia Data for E-learning Cloud Based Storage ServicesGopinath et al., 2015
View PDF- Document ID
- 2709217345194989689
- Author
- Gopinath R
- Geetha B
- Publication year
- Publication venue
- Research Journal of Applied Sciences, Engineering and Technology
External Links
Snippet
The purpose of the study is to design a cloud storage service to detect the maximum probability of disrupted data blocks in a timely manner for any dynamic changes of multimedia data that does not affect the cloud environment. In the current scenario, the cloud …
- 238000003860 storage 0 title abstract description 74
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/30144—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/3015—Redundancy elimination performed by the file system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30091—File storage and access structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
- G06F17/2288—Version control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Wang et al. | Toward publicly auditable secure cloud data storage services | |
| Ren et al. | Dynamic proofs of retrievability for coded cloud storage systems | |
| Sookhak et al. | Towards dynamic remote data auditing in computational clouds | |
| Nithiavathy | Data integrity and data dynamics with secure storage service in cloud | |
| Meena et al. | Survey on various data integrity attacks in cloud environment and the solutions | |
| Bakro et al. | Hybrid blockchain-enabled security in cloud storage infrastructure using ECC and AES algorithms | |
| Mehak et al. | Security aspects of database-as-a-service (DBaaS) in cloud computing | |
| Srisakthi et al. | Towards the design of a secure and fault tolerant cloud storage in a multi-cloud environment | |
| Balmany et al. | Dynamic proof of retrievability based on public auditing for coded secure cloud storage | |
| Thakur et al. | Data integrity techniques in cloud computing: an analysis | |
| Gopinath et al. | Dynamic Block Level Error Recovery to Trust Multimedia Data for E-learning Cloud Based Storage Services | |
| Vishnupriya et al. | Secure multicloud storage with policy based access control and cooperative provable data possession | |
| Twum et al. | A Proposed New Framework for Securing Cloud Data on Multiple Infrastructures using Erasure Coding, Dispersal Technique and Encryption | |
| Lopez-Falcon et al. | Bi-objective analysis of an adaptive secure data storage in a multi-cloud | |
| Chandran et al. | Data management issues in cloud integrated computing: A big picture | |
| Monti et al. | An alternative information plan | |
| Vijaya Kmari et al. | Cloud storage auditing by utilizing provable data possession method | |
| Barbi et al. | Recast: Random entanglement for censorship-resistant archival storage | |
| Reddy et al. | Secure Storage Services and Erasure Code Implementation in Cloud Servers | |
| Jiang et al. | Proof of Storage with Corruption Identification and Recovery for Dynamic Group Users | |
| Kumari et al. | A Review on Challenges of Security for Secure Data Storage in Cloud | |
| Patil et al. | Integrity Verification in Multi-Cloud Storage Using Cooperative Provable DataPossession | |
| George et al. | Safest Secure and Consistent Data Services in the Storage of Cloud Computing | |
| Bian et al. | The Jigsaw secure distributed file system | |
| Milkkal et al. | Sheltered Data Storage Services in Cloud Computing |