Public Cloud User Authentication and Data Confidentiality Using Image Steganography with Hash Function
Bidisha Goswami,
Ravichandra G.
Issue:
Volume 3, Issue 1-2, January 2015
Pages:
1-8
Received:
24 July 2014
Accepted:
2 September 2014
Published:
27 December 2014
DOI:
10.11648/j.ajam.s.2015030102.11
Downloads:
Views:
Abstract: Public cloud is an environment in which many users share resources, but the consumer has to sacrifice security owing to the multi - tenancy feature of cloud computing. However, maintaining Confidentiality and Security for critical data is highly challenging. Taking account of the static nature of user validation, this paper address authentication and confidentiality issues. A methodology has been proposed for user authentication to make cloud server, dynamic in nature, based on the time stamp and other parameters. The confidential data are embedded randomly in images using steganography as a basic technique, in which a new method of encryption and decryption is proposed. The methodology of encryption or decryption uses odd Fibonacci series values and a hash function to prepare hash value series. This hash value series is multiplied with ASCII codes of the original data which need to embed, in decryption process and similar technique have been used here, rather than the technique of multiplying ASCII codes with hash value using division operation.
Abstract: Public cloud is an environment in which many users share resources, but the consumer has to sacrifice security owing to the multi - tenancy feature of cloud computing. However, maintaining Confidentiality and Security for critical data is highly challenging. Taking account of the static nature of user validation, this paper address authentication a...
Show More
Digital Restoration of Archaeological Heritage
Supriya P. Deshpande,
Preeti Sangamesh
Issue:
Volume 3, Issue 1-2, January 2015
Pages:
9-13
Received:
14 November 2014
Accepted:
6 December 2014
Published:
19 December 2014
DOI:
10.11648/j.ajam.s.2015030102.12
Downloads:
Views:
Abstract: Virtual Restoration of archaeological heritage stems from the need to create a clearer and better image of the beautiful historic monuments now in ruins. It gives the viewer a sense and feel of how the heritage originally looked. For this, there are many restoration projects of the major historic sites, paintings etc, going on across the world. Computers have been introduced to archaeology and cultural heritage as tools for promoting scientific work and as electronic aids for providing users with substantial information on archaeological heritage. Small holes and breakages in the monuments/paintings can severely degrade its appeal to viewers. Image restoration is the operation of taking a corrupted/noisy image and estimating the clean original image. In this work, we have proposed a method to automatically detect the defect in the corrupted image using Perona Malik Anisotropic Diffusion and Binary Thresholding, followed by Image Inpainting with Navier-Stokes Method, which have been found to be effective in the art of restoring lost/selected parts of an image based on the background information in a visually plausible way.
Abstract: Virtual Restoration of archaeological heritage stems from the need to create a clearer and better image of the beautiful historic monuments now in ruins. It gives the viewer a sense and feel of how the heritage originally looked. For this, there are many restoration projects of the major historic sites, paintings etc, going on across the world. Com...
Show More
A Survey on Various Task Scheduling Algorithms Toward Load Balancing in Public Cloud
Pradeep Naik,
Surbhi Agrawal,
Srikanta Murthy
Issue:
Volume 3, Issue 1-2, January 2015
Pages:
14-17
Received:
14 November 2014
Accepted:
9 December 2014
Published:
30 December 2014
DOI:
10.11648/j.ajam.s.2015030102.13
Downloads:
Views:
Abstract: Cloud computing is one of the real innovation in giving a shared pool of resources globally. In cloud computing there exist diverse sorts of architectures in particular private, public, hybrid and so on. The cloud computing is also meant for providing service via platform (PaaS), Infrastructure (IaaS), Software (SaaS). The term capacity planning is used to dynamically upscale or downscale the computing resources accordingly. There will be many job requests which require to get executed among the available resources in a particular cloud in order to achieve the maximum throughput, minimum waiting time and best overall performance. In this paper a systematic review is made on various job scheduling algorithms along with their working procedure and a comparison among these algorithms is presented. The paper concludes with a proposed system with improvised QoS parameters to provide a load balanced task scheduling algorithm for public clouds.
Abstract: Cloud computing is one of the real innovation in giving a shared pool of resources globally. In cloud computing there exist diverse sorts of architectures in particular private, public, hybrid and so on. The cloud computing is also meant for providing service via platform (PaaS), Infrastructure (IaaS), Software (SaaS). The term capacity planning is...
Show More