IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cloud-Enabled Security Adversarial Network Strategies for Public Area Protection

Cloud-Enabled Security Adversarial Network Strategies for Public Area Protection
View Sample PDF
Author(s): Mamta P. Khanchandani (Bhagwan Mahavir University, India), Sanjay H. Buch (Bhagwan Mahavir University, India), Shanti Verma (LJ University, India)and K. Baskar (Kongunadu College of Engineering and Technology, India)
Copyright: 2024
Pages: 13
Source title: Enhancing Security in Public Spaces Through Generative Adversarial Networks (GANs)
Source Author(s)/Editor(s): Sivaram Ponnusamy (Sandip University, Nashik, India), Jilali Antari (Ibn Zohr Agadir University, Morocco), Pawan R. Bhaladhare (Sandip University, Nashik, India), Amol D. Potgantwar (Sandip University, Nashik, India)and Swaminathan Kalyanaraman (Anna University, Trichy, India)
DOI: 10.4018/979-8-3693-3597-0.ch006

Purchase

View Cloud-Enabled Security Adversarial Network Strategies for Public Area Protection on the publisher's website for pricing and purchasing information.

Abstract

In cloud computing, the consideration of the future of IT enterprise involves the centralized application software and database in large data centers. However, this shift raised security challenges that are not well understood. This study focused on ensuring the integrity of data storage in cloud services. Specifically, it examined a third-party auditor acting on behalf of the cloud client can verify the integrity of dynamics data stored in the cloud. This approach allows a third party to check the client's data without the client's direct involvement, which is crucial for achieving economics of scale in cloud computing methodology. Efficient network data dynamically are achieved by enhanced existing proofs of storage models through manipulation of the Merkle Hash based tree construction for block tag authentication. Additionally, to handle multiple audition of tasks efficiently, the chapter explores the use of bilinear aggregate signatures. This extension allows the TPA to perform multiple auditing tasks simultaneously manner in a multi-user setting.

Related Content

Rais Abdul Hamid Khan, Yogesh Kantilal Sharma, Mandar S Karyakarte, Bipin Sule, Aarti Amod Agarkar. © 2024. 11 pages.
Dwijendra Nath Dwivedi, Ghanashyama Mahanty, Shafik Khashouf. © 2024. 14 pages.
Patel Janit Umeshbhai, Panchal Yash Kanubhai, Shaikh Mohammed Bilal, Shanti Verma. © 2024. 13 pages.
Swaminathan Kalyanaraman, Sivaram Ponnusamy, S. Saju, S. Sangeetha, R. Karthikeyan. © 2024. 14 pages.
Delshi Howsalya Devi, P. Santhosh Kumar, M. Aruna, S. Sharmila. © 2024. 23 pages.
Mamta P. Khanchandani, Sanjay H. Buch, Shanti Verma, K. Baskar. © 2024. 13 pages.
Harshita Chourasia, Neha Tiwari, Shraddha Raut, Anansingh Thinakaran, Anirudh A. Bhagwat. © 2024. 13 pages.
Body Bottom