R&D: Storage Enhancement in Cloud Using ML Technique and Novel Hash Algorithm for Cloud Data Security
Proposed method surpasses existing methods in terms of computational complexity and security levels, based on results of testing.
This is a Press Release edited by StorageNewsletter.com on October 5, 2022 at 2:00 pmSpringer Nature Switzerland AG has published, in ICMSEM 2022: Proceedings of the Sixteenth International Conference on Management Science and Engineering Management – Volume 1 pp 516–526, an article written by C. Hema, Department of Computer Science and Engineering, B.S. Abdur Rahman Crescent Institute of Science and Technology, Chennai, 600048, Tamilnadu, India, and Fausto Pedro Garcia Marquez, Ingenium Research Group, Universidad Castilla-La Mancha, Ciudad Real, Ciudad Real, Spain.
Abstract: “Cloud computing refers to the supply of a variety of services through the Internet, including data storage, servers, databases, networking, and software. Cloud-based storage allows files to be saved to a remote database instead of being stored on a proprietary hard drive or local storage device. In cloud-fog storage integrated situations, data redundancy is a major issue that wastes a lot of data storage. By removing redundant data from cloud storage systems, data redundancy issues can be efficiently decreased and handled. In a cloudcomputing environment, implementing redundant data over encrypted data is always a significant issue. This study builds secure non-redundant systems using the SHA-512 cryptographic hash algorithm in a cloud environment. The proposed Bayesian model concentrates on the two most important objectives of the system, first is the data redundancy must be reduced to a bare minimum; and the second is a strong encryption strategy must be created to assure data security. The experimental results of the Bayesian technique enable the cloud users to effectively fulfil their cloud data storage space by avoiding the storage of duplicated data and saving bandwidth. The proposed method surpasses existing methods in terms of computational complexity and security levels, based on the results of the testing.“