The improved DROP security based on hard AI problem in cloud

Authorising data to administrative control through third-party, is employed in the cloud, gives growth to security concerns. The data mollification may occur due to attacks by other users and nodes within the cloud. Therefore, high safety measures are essential to protect data within the cloud. In this paper, we present a new security primitive based on hard AI problems explicitly novel relations of a graphical secret key system built on top of Captcha technology, which we call Captcha as graphical passwords Carp. CaRP also narrative an approach to address the familiar image hotspot problem in popular graphical password systems, such as PassPoints, that often leads to weak password choices. The DROP methodology fragments the file and replicates the fragmented data over the cloud nodes. Each of the nodes stores only a single fragment of a particular data that pledges that even if there should be an attack no substantial data is uncovered to the attacker. Furthermore, the nodes storing the fragments are divided with certain expanse by means of graph T-colouring to prohibit an attacker of predicting the locations of the fragments. So, this paper extends DROP methodology with AES algorithm to protect the outsourced data in the cloud and integrate them with CaRP to improve the online security by 14.4%.

[1]  Pradeep K. Khosla,et al.  Selecting the Right Data Distribution Scheme for a Survivable Storage System (CMU-CS-01-120) , 2001 .

[2]  Nasir D. Memon,et al.  PassPoints: Design and longitudinal evaluation of a graphical password system , 2005, Int. J. Hum. Comput. Stud..

[3]  Mazliza Othman,et al.  A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.

[4]  P. Venkata Krishna,et al.  A Joint FED Watermarking System Using Spatial Fusion for Verifying the Security Issues of Teleradiology , 2014, IEEE Journal of Biomedical and Health Informatics.

[5]  Ishfaq Ahmad,et al.  Comparison and analysis of ten static heuristics-based Internet data replication techniques , 2008, J. Parallel Distributed Comput..

[6]  Mark Newman,et al.  Networks: An Introduction , 2010 .

[7]  Albert Y. Zomaya,et al.  On the Characterization of the Structural Robustness of Data Center Networks , 2013, IEEE Transactions on Cloud Computing.

[8]  Viswanathan Perumal,et al.  A Survey on Various Problems and Techniques for Optimizing Energy Efficiency in Cloud Architecture , 2017 .

[9]  Yang Tang,et al.  Secure Overlay Cloud Storage with Access Control and Assured Deletion , 2012, IEEE Transactions on Dependable and Secure Computing.

[10]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[11]  Krzysztof Golofit Click Passwords Under Investigation , 2007, ESORICS.

[12]  Miss Laiha Mat Kiah,et al.  Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing , 2013, The Journal of Supercomputing.

[13]  Peng Li,et al.  On the optimal placement of secure data objects over Internet , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[14]  Albert Y. Zomaya,et al.  Energy-efficient data replication in cloud computing datacenters , 2013, GLOBECOM Workshops.

[15]  Benny Pinkas,et al.  Securing passwords against dictionary attacks , 2002, CCS '02.

[16]  Robert Biddle,et al.  Graphical passwords: Learning from the first twelve years , 2012, CSUR.

[17]  P. Viswanathan,et al.  A green energy optimized scheduling algorithm for cloud data centers , 2015, 2015 International Conference on Computing and Network Communications (CoCoNet).

[18]  Yves Deswarte,et al.  Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[19]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[20]  Hai Tao,et al.  Pass-Go: A Proposal to Improve the Usability of Graphical Passwords , 2008, Int. J. Netw. Secur..

[21]  Ishfaq Ahmad,et al.  Static and adaptive distributed data replication using genetic algorithms , 2004, J. Parallel Distributed Comput..

[22]  Michael K. Reiter,et al.  The Design and Analysis of Graphical Passwords , 1999, USENIX Security Symposium.

[23]  Albert Y. Zomaya,et al.  Quantitative comparisons of the state‐of‐the‐art data center architectures , 2013, Concurr. Comput. Pract. Exp..

[24]  P Sanjeevi,et al.  Towards energy-aware job consolidation scheduling in cloud , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).

[25]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[26]  Nasir D. Memon,et al.  Modeling user choice in the PassPoints graphical password scheme , 2007, SOUPS '07.

[27]  P Sanjeevi,et al.  A 24 hour IoT framework for monitoring and managing home automation , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).