ABSTRACT
Recent years have seen a rapid growth in the number of virtual machines and virtual machine images that are managed to support infrastructure as a service (IaaS). For example, Amazon Elastic Compute Cloud (EC2) has 6,521 public virtual machine images. This creates several challenges in management of image files in a cloud computing environment.
In particular, a large amount of duplicate data that exists in image files consumes significant storage space. To address this problem, we propose an effective image file storage technique using data de-duplication with a modified fixed-size block scheme. When a user requests to store an image file, this technique first calculates the fingerprint for the image file, and then compares the fingerprint with the fingerprints in a fingerprint library. If the fingerprint of the image is already in the library, a pointer to the existing fingerprint is used to store this image. Otherwise this image will be processed using the fixed-size block image segmentation method.
The experiments show that this technique can significantly reduce the transmission time of image files that have already existed in storage. Also the deletion rate for image groups which have the same version of operating systems but different versions of software applications is up about 58%.
Keywords: cloud computing, image files, data deduplication.
CHAPTER 1
INTRODUCTION
Cloud Computing enables universal, expedient network access to a shared
Cloud computing is an emerging technology. With its huge demand, it is rapidly growing. Cloud computing is defined as "a type of Internet-based computing", where different services such as servers, storage and applications are delivered to an organization’s technological infrastructure through the Internet.
[15] W. K. Ng, Y. Wen, and H. Zhu. Private data deduplicationprotocols in cloud storage. In S. Ossowski and P. Lecca, editors,Proceedings of the 27th Annual ACM Symposium on Applied Computing,pages 441–446. ACM, 2012.
As computers became commonplace in the business world, data storage on using desktop software became the norm. This method is one of the most common storage mediums today, but there are drawbacks that should be known.
One of the primary benefits of files as a data source is the ability to separate and analyze the types of files, which creates a specific signature based on the content and user (Marcella & Menendez, 2008). Data can be pulled from deleted files, slack space on a system’s hard drive, or free space, all of which provides information that can be useful to investigators. The directory location and allocation type for each file informs the data that has been collected, including a time stamp and whether tools have been used to hide the data. Each of these characteristics provides investigators easy-to-access information about a system. In addition, there are a variety of hardware tools that can be used to access data. This technology is fairly common, meaning that associated costs tend to be minimal when retrieving data from files (Purita, 2006).
Moving from physical machines to Virtual machines can be a daunting task and many companies will take into account unforeseen issues that can be mitigated but there are instances that issues will arise and there are tested and tried methods available to move from physical to Virtual machines as well as hosting your own virtualized cloud. We are going to talk about some of the deployment methods as well as how cloud computing is going to be beneficial for the organization to include traditional Computing and our own computing. Will also contrast how major companies such as Amazon and IBM perform their migration and how companies will perform the migration on their own without their help. Next we will examine a few challenges as well as security concerns that might arise due to hosting your own cloud and migrating from Legacy servers and physical servers into newer virtualize machines.
The specification of file format is play very important role in digital preservation. The files format are continuously grow new feature and function. Maximum organization and institution are preserving the digital records. It is called digital repository and it is preserve for long term. These repositories are preserved in
In the version of security analysis and experimental results our proposed encryption scheme is fast and on the other hand provides good security and adds very less overhead on the data, this today is the requirement of most of the multimedia applications.
Today web is going towards the multimedia data in which image covers the highest percentage of it. But with the ever-increasing growth of multimedia applications, security is an important aspect in communication and storage of images, and encryption is the way to ensure security [1]-[2]. Image encryption techniques try to convert original image to another image that is hard to understand and to keep the image confidential between users, in other word, it’s important that without decryption key no one can access the content. Image encryption has applications in internet communication,
This paper proposes the Google File System (GFS). They introduced GFS to handle Google's massive data processing needs. GFS considers the following goals: higher performance, scalability, reliability and availability. However, it's not easy to reach these goals, there are many obstacles. Thus, in order to tackle challenges, they have considered using constant monitoring, error detection, fault tolerance, and automatic recover to tackle component failures that can affect the system's reliability and availability. The need to handle bigger files is becoming very important because data is keep growing radically. Therefore, they considered changing I/O operation and block sizes. They also consider using appending operations rather than
Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security [1]. With the extensive use of virtualization technologies combined with self-service potentialities cloud service providers are providing services to their customers through the Internet. In these service provider surroundingses, virtual machines from different multiple organizations have to be co-located on the same physical server in order to optimally maximize the effectiveness and efficiencies of virtualization. Cloud service
Unlike text memos, picture data have distinct features such as bulk capacity, elevated redundancy, and elevated correlation amid pixels, not to remark that they normally are huge in size, that jointly make established encryption methods tough to apply and sluggish to process. From time to time picture requests additionally have their own necessities like real-time processing, fidelity reservation, picture format consistence, and data compression for transmission. Simultaneous fulfillments of these necessities, alongside alongside elevated protection and elevated quality
In contrast to single images, the large video bandwidth means that long messages can be embeded in video. Speed is also an important trouble due to the huge quantities of facts that need to be processed. Except for video production (which takes place before distribution), digital video is typically stored and distributed in compressed form (e.g., MPEG). Hence, it is often desired that the marked, compressed video have to no longer require greater bandwidth than the unmarked, compressed video. This bit-price constraint can also be a trouble for unmarried photographs. Compressed-domain video watermarking is especially appealing. Operating at the compressed bit stream obviates the need for compute-extensive, time-eating decompression and recompression, such that the watermark can be embedded on the time of distribution or reception. An example of a compressed-domain video watermarking system is briefly described here; a more thorough treatment appears in. This gadget operates on video compressed the use of the MPEG-2 compression widespread. MPEG-2 uses block movement reimbursement (BMC) to suggest motion and block discrete cosine remodel (DCT) compression to explain the residual mistakes after BMC. This is referred to as a hybrid video compression machine. In BMC, decompressed picture blocks available to both the encoder and decoder are translated to
Abstract— Data de-duplication is one of essential data com-pression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of sensitive data while supporting de-duplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. The main motivation behind using this technique is making convergent encryption practical to capably and consistently manage a huge number of convergent keys and achieving competent and consistent key management in secure de-duplication. At we first introduce a baseline approach in which each user holds an independent master key for encrypting
We assume that the public cloud infrastructure provides proper security and data backup solutions with a Service Level Agreement (SLA) and mechanisms to fairly share its virtual resources among all its running VMs. The last few years have witnessed the emergence of cloud computing as a rapid, limitlessly scalable, and cost-efficient alternative in contrast to the in-house data centers. The IaaS model delegates more control to the customers over the provisioned resources. Hosting Internet applications in the IaaS environment is an efficient way to start a new and a sustainable business that expands the IT infrastructure gradually with the business growth.
Abstract— For preserving the security of data there has been tremendous research areas evolved and explored since few years. Cryptography is seen to be the dominant strategy in the information security domain. To differentiate security of multimedia data, visual cryptography is seen as the prominent way for data confidentiality and secrecy of information being distributed.