Privacy Preserving and Loss Data Retrieval in Cloud Computing Using Bucket Algorithm

  • Conference paper
  • First Online:
Advances in Systems, Control and Automations (ETAEERE 2020)

Abstract

Cloud data is maintained, stored, and managed from all over the global network. The suggestions about the information will not be given by the cloud provider. Encryption-based technology is used to protect the schemes like privacy. To prevent leakage of data from the cloud, there are many different types of privacy preserving methods. In order to overcome the drawback, we propose a framework based on fog computing known as three-layer storage. The framework that is proposed takes total advantage of protecting the privacy of data and cloud storage. So, we will be using the Hash-Solomon algorithm code, which is designed for partition of data into equal and separate parts. If any part of the data is lost, we will remain with other parts of the data which is insufficient. Here, we will be using algorithms based on bucket concept in this framework to secure the information of the data and then provide the security and efficiency in our scheme. After that, based on the computational intelligence, this algorithm can analyze the distribution parts stored in cloud server, fog server, and local device. Software as a service on a hosting environment, client releases their application which can be accessed through network by application users from various clients. Except for limited user-specific application configuration settings, the client cannot manage or control the cloud structure and data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Z. **a, X. Wang, L. Zhang, Z. Qin, X. Sun, K. Ren, A privacy preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016)

    Article  Google Scholar 

  2. T.P. Jacob, T. Ravi, An optimal technique for reducing the effort of regression test. Indian J. Sci. Technol. 6(8), 5065–5069 (2013)

    Article  Google Scholar 

  3. D. Narmadha, A. Pravin, An intelligent computer-aided approach for target protein prediction in infectious diseases. Soft Comput. 1–14 (2020)

    Google Scholar 

  4. J.S. Plank, T1: erasure codes for storage applications, in Proceedings of 4th USENIX Conference on File Storage Technology (2005), pp. 1–74

    Google Scholar 

  5. R. Kulkarni, A. Forster, G. Venayagamoorthy, Computational intelligence in wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials 13(1), 68–96 (First Quarter 2011)

    Google Scholar 

  6. L. **ao, Q. Li, J. Liu, Survey on secure cloud storage. J. Data Acquis. Process. 31(3), 464–472 (2016)

    Google Scholar 

  7. R.J. McEliece, D.V. Sarwate, On sharing secrets and Reed-Solomon codes. Commun. ACM 24(9), 583–584 (1981)

    Article  Google Scholar 

  8. G. Nagarajan, R.I. Minu, V. Vedanarayanan, S.S. Jebaseelan, K. Vasanth, CIMTEL-mining algorithm for big data in telecommunication. Int. J. Eng. Technol. (IJET) 7(5), 1709–1715 (2015)

    Google Scholar 

  9. S.P. Mary, E. Baburaj, Genetic based approach to improve E-commerce web site usability, in 2013 Fifth International Conference on Advanced Computing (ICoAC) (IEEE, 2013), pp. 395–399

    Google Scholar 

  10. S. Jancy, Discovering unpredictable changes in business process. J. Comput. Theor. Nanosci. 16(8), 3228–3231 (2019)

    Article  Google Scholar 

  11. A. Jesudoss, M.J. Daniel, J.J. Richard, Intelligent medicine management system and surveillance in IoT environment, in IOP Conference Series: Materials Science and Engineering, vol. 590, no. 1 (IOP Publishing, UK, 2019), p. 012005

    Google Scholar 

  12. V.R. Krishna, R. Subhashini, Mimicking attack by botnet and detection at gateway. Peer-to-Peer Networking Appl. 13, 1–1 (2020). https://doi.org/10.1007/s12083-019-00854-9

  13. R. Neha, J.Y. Bevish, A survey on security challenges and malicious vehicle detection in vehicular ad hoc networks. Contemp. Eng. Sci. 8(5), 235–240 (2015)

    Google Scholar 

  14. A. Sivasangari, S. Poonguzhali, M.I. Rajkumar, Face photo recognition using sketch image for security system, 8(9S2) (2019). ISSN: 2278-3075

    Google Scholar 

  15. R. Subhashini, R. Sethuraman, V. Milani, Providing mother and child care telemedicine through interactive voice response, in Intelligent Computing, Communication and Devices (Springer, New Delhi, 2015), pp. 771–778

    Google Scholar 

  16. M. Selvi, P.M. Joe Prathap, WSN data aggregation of dynamic routing by QoS analysis. J. Adv. Res. Dyn. Control Syst. 9(18), 2900–2908 (2017)

    Google Scholar 

  17. J. Refonaa, M. Lakshmi, Cognitive computing techniques based rainfall prediction—a study, in 2017 International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC) (IEEE, 2017), pp. 142–144

    Google Scholar 

  18. H.T. Dinh, C. Lee, D. Niyato, P. Wang, A survey of mobile cloud computing. Mobile Comput. 13(18), 1587–1611 (2013)

    Google Scholar 

  19. J. Chase, R. Kaewpuang, W. Yonggang, D. Niyato, Joint virtualmachine and bandwidth allocation in software defined network (sdn) andcloud computing environments, in Proceedings of IEEE International Conference on Communications (2014), pp. 2969–2974

    Google Scholar 

  20. H. Li, W. Sun, F. Li, B. Wang, Secure and privacy-preserving datastorage service in public cloud. J. Comput. Res. Dev. 51(7), 1397–1409 (2014)

    Google Scholar 

  21. Y. Li, T.Wang, G.Wang, J. Liang, H. Chen, Efficient data collection in sensor-cloud system with multiple mobile sinks, in Proceedings of Advances in Services Computing, 10th Asia-Pacific Services Computing Conference (2016), pp. 130–143

    Google Scholar 

  22. P. Mell, T. Grance, The NIST definition of cloud computing. Nat. Inst. Stand. Technol. 53(6), 50 (2009)

    Google Scholar 

Download references

Acknowledgements

We are happy to confess our heartfelt gratitude to Board of Management of SATHYABAMA to their amiable motivation to this successful project completion. We are thankful to them.

We send our gratitude to Dr. T. Sasikala, M.E., Ph.D., Dean, School of Computing and Dr. S. Vigneshwari, M.E., Ph.D. and Dr. L.Lakshmanan M.E., Ph.D., Head of the Department, Department of Computer Science and Engineering for giving us vital assistance and information on correct time for the continuous assessments.

We are pleased convey our heartfelt thanks to our Project Mentor A. C. Santha Sheela, M.E., Assistant Professor, Department of Computer Science and Engineering to her precious advice, ideas and continuous support for the prosperousaccomplishment of our project work.

We would like to sendour gratitude to all Teaching and Non-teaching staff members of the Department of Computer Science and Engineering who were supportive in more ways for the fulfillment of the project.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. C. Santha Sheela .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Durga Nagarjuna, T., Anil Kumar, T., Santha Sheela, A.C. (2021). Privacy Preserving and Loss Data Retrieval in Cloud Computing Using Bucket Algorithm. In: Bhoi, A.K., Mallick, P.K., Balas, V.E., Mishra, B.S.P. (eds) Advances in Systems, Control and Automations . ETAEERE 2020. Lecture Notes in Electrical Engineering, vol 708. Springer, Singapore. https://doi.org/10.1007/978-981-15-8685-9_32

Download citation

Publish with us

Policies and ethics

Navigation