Open Access Open Access  Restricted Access Subscription Access

Attribute-based encryption for cloud IoT with accountability and privacy protection

Rakesh S, Sarfarazahmed Somsagar

Abstract


In this paper, we introduce a novel "CHARM" heterogeneous multi-cloud solution to cost-effective data hosting with high availability. It intelligently distributes data over various clouds with no financial expenditure and guaranteed availability. We explicitly incorporate the two widely used redundancy mechanisms, replication and erasure coding, into a coherent model to provide the required availability in the presence of diverse data access patterns. The optimal data storage choices (including clouds and redundancy systems) are then chosen using a robust heuristic-based approach. Additionally, we perform the required storage mode transition process (for effectively redistributing data) by keeping track of changes in pricing and data access patterns. CHARM's performance is assessed using both prototype experiments and trace driven simulations.


Full Text:

PDF

References


Sonali Mishra , “SQL Injection Detection using Machine Learning ”, from https:

//scholarworks.sjsu.edu/cgi/viewcontent.cgi?arti c le = 1727context = etdprojects, on 23 May 2019 pp.10 - 29.

BojkenShehu and Aleksander Xhuvani ,”A Literature Review and Comparative Analyses on SQL Injection: Vulnerabilities, Attacks and their Prevention and Detection Techniques” from https

://pdfs.semanticscholar.org , Vol. 11, Issue 4, No 1,July 2014 pp 20 - 34.

Suhaimi Ibrahim , ” SQL Injection Detection and Prevention Techniques” from https

://pdfs.semanticscholar.org/ Volume 3, Number 7, August 2011 , pp 85 - 89.

G. Wassermann, Z. Su, “An analysis framework for security in web applications,” In: Proceedings of the FSE Workshop on Specification and Verification of Component-Based Systems, fromhttps://link.springer.com/chapter/1

1007/978 − 0 − 387 − 44599 − 15 SAVCBS, pp. 70–78, 2004.

Mei Junjin, “An Approach for SQL Injection Vulnerability Detection,” Proceedings. of the 6th Int. Conf. on

Information Technology: New Generations, Las Vegas, Nevada, pp. 14-19, Apr. 2009.

G Buehrer, B.W. Weide, P.A.G Sivilotti, Using Parse Tree Validation to Prevent SQL Injection Attacks, in: 5th InternationalWorkshop on SoftWore Engineering and Middlere, Lisbon, Portugal, 2005, pp. 106-113.

Shikhar Jain Alwyn R. Pais,” Model Based Approach to Prevent SQL Injection Attacks on.NET Applications”

International Journal of Computer Science Informatics, Volume-1, Issue-11, 2011.

Haripriya Rana and Shelly Sachdeva , ”Analysis of SQL Injection Detection and Prevention” vol 10 , August 2017, Proceeding

from Indian Journal of Science and Technology,pp 5-9

Suhas G.K., Devananda S.N., Jagadeesh R., Pareek P.K., Dixit S. (2021) Recommendation-Based Interactivity Through Cross Platform Using Big Data. In: Tavares J.M.R.S., Chakrabarti S., Bhattacharya A., Ghatak S. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 164. Springer, Singapore. https://doi.org/10.1007/978-981-15-9774-9_60

N R, Deepak and G K, Dr. Suhas and B, Bhagappa and Kumar Pareek, Piyush, A Framework for Food recognition and predicting its Nutritional value through Convolution neural network (February 22, 2022). Available at SSRN: https://ssrn.com/abstract=4040968 or http://dx.doi.org/10.2139/ssrn.4040968


Refbacks

  • There are currently no refbacks.