Evaluation of Reliable Data Storage in Cloud Using an Efficient Encryption Technique

Evaluation of Reliable Data Storage in Cloud Using an Efficient Encryption Technique

Saswati Sarkar (Computer Innovative Research Society, India), Anirban Kundu (Netaji Subhash Engineering College, India) and Ayan Banerjee (Computer Innovative Research Society, India)
DOI: 10.4018/978-1-5225-8407-0.ch012
OnDemand PDF Download:
No Current Special Offers


Cloud-based reliable and protected data storage technique is proposed in this chapter. The proposed technique encrypts and protects data with less time consumption. Power consumption of storage is dependent upon capacity of storage and physical size of storage. Time analysis is presented graphically in this chapter. Reliable data storage is represented in cloud based proposed approach. Data is encrypted with minimum time complexity due to usage of proposed cloud-based reliable data storage. The competent ratio of time complexity is graphically observed in proposed data storage technique. Power consumption of storage has been typically dependent on the basis of capacity of storage and amount of storage. A ratio of power consumption and capacity of storage is presented in cloud-based approach. An efficient usage of energy is shown depending on current consumption and voltage in proposed reliable approach.
Chapter Preview



Storage devices (as found in “https://www.quora.com/How-do-hard-drives-of-the-same-physical-size-vary-in-capacity-of-storage”). Storage device is consisting of computer components used to retain digital data.

Storage devices are typcally utilized in internet based hardware and software reources, information technology paradigm shift, and cloud computing (Daniel J. A., 2009). There are different types of cloud computing services are available today such as Amazon EC2, Google Apps, Apple iCloud etc.. There are two factors such as advanced software applications and high-end networks of server-side computer systems are required for maintaining the reliability of services(Aboroujilah A., Amusa A.S.,2017). There are several components such as development of grid computing, parallel computing, distributed computing, big data analysis (Alsghaier H., Akour M., Shehabat I., Aldiabat S.,2017), and utility computing have been ncorporated in cloud computing(Agarwal H., Sharma A.2016). Cloud based services have been extended in distinct fields such as virtual IT, software and network storage (Kandukuri B. R., Paturi R. V., Rakshit A., 2009).

Reliability is a attribute, which has been measured depending on consistent performance of different computer related component such as network, software, hardware (Subashini S., Kavitha V., 2011) (Zhang X., Wuwong N., Li H., and Zhang X. J., 2010). Mean Time to Data Loss (MTTDL) matrix is required to calculate reliability. The amount of expected elapse time has been described by this matrix untill first data loss. There are two purposes such as encryption (IGI global,2017) of backed-up data, and decryption of backed-up data have been resolved by using two-way function called encryption. Encryption(IGI Global, 2016) has been incorporated as a characterstics of storage security (Das D., Misra R., 2011). There are two dfferent message formats such as plaintext and ciphertext have been required to perform encryption algorithm and decryption algorithm (Parsi K., Sudha S., 2012).

Power (as found in “http://www.tomshardware.com/reviews/geforce-radeon-power, 2122-7.html”) is energy over time. The unit of power is watt. Power (Watts) is Joules per second.

Power (Watts) = E/T = Energy (Joules) / Time (Seconds). Energy, E = P*T, where P = Power, and T = Time.

A watt hour is a unit of Energy, an alternative to Joules (Pinheiro E., Bianchini R., Dubnicki C., 2006). Voltage is known as electromotive force which is a quantitative expression of the potential difference in charge between two points in an electrical field.P = IV (Power = Current * Voltage)(http://www.tomshardware.com/reviews/desktop-hdd.15-st4000dm000-4tb,3494-6.html).

Complete Chapter List

Search this Book: