Secure Communication with DNS through Cloud

نویسنده

  • Akash Bajaj
چکیده

Internet in today’s world has become one of the most prominent ways to communicate through text, voice, pictures, video and many more ways. Millions of MB of data is exchanged over internet in a single day all over the world. And lots of those data is sensitive and private. Thus internet provides as point to intrude in someone’s private life or intercept some sensitive data. With the increasing use of Smartphone, a big amount of data is being stored and exchange through the application running on its operating system. This have only increased the data exchange over the network. That’s why the importance of security over the exchange as well as storage of data has increased dramatically over the past few years. For providing security many different methods or ways are taken. Over those methods use of cryptography is one of the widely used methods. Our application is designed to provide secure transmission of data like text or image over the network with the help of cryptographic algorithm. This application can be easily run on the android operating Smartphone as well as the computer with other operating system. Through this application the user can also encrypt the file or image and store it in the system memory as well as over the cloud and retrieve it whenever needed. __________________________________________________*****_________________________________________________

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Lost in the Edge: Finding Your Way with Signposts

The de facto architecture of today’s Internet services all but removes users’ ability to establish inter-device connectivity except through centrally controlled “cloud” services. Whilst undeniably convenient, the centralised data silos of the cloud remain opaque and an attractive target for attackers. A range of mechanisms exist for establishing secure peer-to-peer connections, but are inaccess...

متن کامل

A framework for DNS naming services for Internet-of-Things devices

This paper proposes a new naming framework for Domain Name System (DNS) Name Autoconfiguration (calledDNSNA) for Internet of Things (IoT) devices in Internet Protocol (IP) version 6 (IPv6) and IP version 4 (IPv4) networks. As the number of IoT devices increases, it can be a burden for users tomanually configure the DNS names of the IoT devices. We propose DNSNA to provide an efficient DNS namem...

متن کامل

Secure Cloud Communication for Effective Cost Management System through MSBE

In Cloud Computing Architecture, Brokers are responsible to provide services to the end users. An Effective Cost Management System (ECMS) which works over Secure Cloud Communication Paradigm (SCCP) helps in finding a communication link with overall minimum cost of links. We propose an improved Broker Cloud Communication Paradigm (BCCP) with integration of security issues. Two algorithms are inc...

متن کامل

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015