This paper is published in Volume-4, Issue-2, 2018
Area
Computer Science
Author
Parihar Vimladevi Mishrilal, Rohini Dattatrey Patil, Supriya Shrikant Shete, Bhargavi Rai, Babita Bhagat
Org/Univ
Pillai HOC College of Engineering and Technology, Rasayani, Maharashtra, India
Pub. Date
12 April, 2018
Paper ID
V4I2-1821
Publisher
Keywords
Cloud storage, Coding, security, Integrity, Performance, Pollution attack.

Citationsacebook

IEEE
Parihar Vimladevi Mishrilal, Rohini Dattatrey Patil, Supriya Shrikant Shete, Bhargavi Rai, Babita Bhagat. Securing coding-based cloud storage against pollution attacks, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Parihar Vimladevi Mishrilal, Rohini Dattatrey Patil, Supriya Shrikant Shete, Bhargavi Rai, Babita Bhagat (2018). Securing coding-based cloud storage against pollution attacks. International Journal of Advance Research, Ideas and Innovations in Technology, 4(2) www.IJARIIT.com.

MLA
Parihar Vimladevi Mishrilal, Rohini Dattatrey Patil, Supriya Shrikant Shete, Bhargavi Rai, Babita Bhagat. "Securing coding-based cloud storage against pollution attacks." International Journal of Advance Research, Ideas and Innovations in Technology 4.2 (2018). www.IJARIIT.com.

Abstract

At present Cloud Computing has become a popular computing paradigm. Though Cloud Computing architectures lack support for computer forensic investigations. Inspecting various logs such as process logs, network logs etc plays an important role in computer forensics. Pollution Attack, whereby is an arrangement of noxious substances endeavor to degenerate put away information, are one of the many dangers that influence cloud information security. Pollution attack occurs when along with the data packets, malicious packets are injected into the network. In this paper we manage pollution attack in coding-based square level distributed storage frameworks, i.e. frameworks that utilize straight codes to part, encode, and scatter virtual circle areas over an arrangement of capacity hubs to accomplish wanted levels of repetition and to enhance unwavering quality and accessibility without giving up on execution. Shockingly, the impacts of a pollution attack on straight coding can be unfortunate, since a solitary dirtied piece can proliferate unavoidably in the interpreting stage, along these lines hampering the entire division. The alarm triggers a procedure that locates the polluting nodes using the proposed detection mechanism along with statistical inference. The packets which fail the verification are detected and discarded by considering they are malicious packets or polluted packets in the network. Therefore the pollution in the network is removed before the packets reach the destination. Hence the pollution attack is reduced and this, in turn, will increase the throughput and performance of the data transmitted across the coding based network in cloud storage.