Open Access Open Access  Restricted Access Subscription Access

An Electronic Digital Library Using Integrated Security Methods and Cloud Storages


Affiliations
1 Principal, Sriram College of Arts and Science, Chennai, India
 

In earlier days, the customer retrieved library materialized structured information are difficult due to enormous database acted in particular location. This paper deals the privacy and security concern includes threats, attacks, data integrity, data leakage, data availability, loss of control, vulnerability and flaws during distribution of services, resources and information. This technique verifies customer verification and validation between cloud clients and cloud providers. Storing the library information system in digital manner is essential through cloud technologies. As an outcome, library consumers can access resources from outside of physical library using cloud methods. This proposed method enforces the use control and access log technique to reduce the data leakage, improve the efficiency and user privacy of the confidential information. It evaluates the several challenges and issues of cloud such as user authentication, data availability, data confidentiality in a cloud environment. This paper depicted the various investigation reports and reviews of various researchers on electronic digital information based library and its resources by cloud methods and storages. This system provides a scheme of a cloud storages functional construction for building knowledge based digital library. Client’s confidential data are stored in global data center storage and numerous local data centers through redundant array of independent disk method in this cloud environment that leads to recovery from the user control and data leakage. This new innovative flexible system delivers the combination of methods like multi-level security with data availability on dissimilar storages, encryption and decryption technique with customer verification and validation method. The electronic digital library resources and services create novel development in scheme of multiple storages with respect to information access and distribution of confidential data in cloud. The multiple cloud storage architecture for digital electronic library offers data handling, speedy transmission of information and linking of communication among library patrons and cloud providers. It will endorse the maturity level from official level members to higher administrate that meet user request and identify the defensible development of knowledge based digital library system. This capable digital library system maintains the cloud computing environment with better performance evaluation. This functional structure progressively established electronic digital library knowledge management by means of user participation. This digital library using multiple cloud storage implementations creates well organized data integration, reduced cost, accessible any-where at any time of services and resources, scalability, elasticity and portability. Furthermore, cloud security and privacy enquiries know the ability of the adaptable digital library system using cloud computing techniques and extent abundant effectiveness with protected cloud environment.

Keywords

Digital Library, Authentication, Cloud Storage, Data Integrity, Security, Privacy.
User
Notifications
Font Size

  • Guoman Lin, “Research on Electronic Data Security Strategy Based on Cloud Computing”, 2012 IEEE second International conference on Consumer Electronics,ISBN: 978-1-4577-1415-3, pp.1228-1231, 2012.
  • Akhil Behl, Kanika Behl, “An Analysis of Cloud Computing Security Issues”, 2012 IEEE proceedings World Congress on Information and Communication Technologies, ISBN: 978-1-4673-4805-8, pp.109-114.2012.
  • Uma Somani, Kanika Lakhani, Manish Mundra, ”Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, 2010 IEEE 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010), ISBN: 978-1-4244-7674-9, pp.211-216, 2010.
  • Akhil Behl,” Emerging Security Challenges in Cloud Computing”, 2011 IEEE, ISBN: 978-1-4673-0126-8, pp.217-222,2011.
  • S.Srinivasan, K.Raja, “Preventing Cloud Attacks using Bio-Metric Authentication in Cloud Computing”, Indian Journal of Science and Technology, Vol9(23), : 10.17485 ijst/2016/ v9i23/88322, June 2016
  • Liu, C., Zhao, X. M., & Liu, Y.(2013). Building of cloud computing in university employment information library. Journal of Convergence Information Technology, 8(6), 434-441, 2013.
  • Liu, W., & Cai, H. H.(2013). Embracing the shift to cloud computing: Knowledge and skills for systems librarians. OCLC Systems and Services, 29(1), 22-29, 2013.
  • Nandzik, J. et al, (2013). Contentus-technologies for next generation multimedia libraries:Automatic multimedia processing for semantic search. Multimedia Tools and Applications, 63(2), 287-329,2013..
  • Shafi, M. , Balraj, B., & Kumar, S.(2012). Cloud computing solutions: Library perspectives.International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012; Dubai; United Arab Emirates; 8 December 2012 through 10 December 2012; Code 96492,2012.
  • Singh, S.P., & Veralakshmi, R. S. R. (2012). Cloud computing: A promising economic model for library and information centers. DESIDOC Journal of Library and Information Technology, 32(6), 526-532,2012.
  • Wang, P. Y., et al.(2012). A duplication software for cloud-based web site: An example of Google sites. 4th International Conference on Computational Intelligence, Communication Systems and Networks, CICSyN 2012; Phuket; Thailand; 24 July 2012 through 26 July 2012; Category numberE4821; Code 93137.,2012.
  • Abidi, F. , Abidi, H.J., & Armani, S. (2012). Cloud libraries: A novel application of cloud computing. 2012 International Conference on Education and e-Learning Innovations, ICEELI 2012.
  • Bansode, S.Y., & Pujar, S.M.(2012). Cloud computing and libraries. DESIDOC Journal of Library and Information Technology, 32(6), 506-512,2012.
  • Huang, M. & Du, W.(2011). A service chain for digital library based on cloud computing. Advances in Intelligent and Soft Computing. 123, 261-266,2011.
  • Chun, Y. (2010). Tactics for the library service based on the cloud service. Proceedings of the International Conference on E-Business and E-Government, Guangzhou; China; 7 May 2010 through 9 May 2010; Category numberE3997; Code 82349,2010.
  • Decman, M. & Vintar, M. (2013), “A possible solution for digital preservation of e-government: A centralised repository within a cloud computing framework”, Aslib Proceedings, 65 (4), 406 – 424,2013.
  • Srinivasan. S, K.Raja,” An Advanced Dynamic Authentic Security Method for Cloud Computing”, In: Bokhari M., Agrawal N., Saini D. (eds) Cyber Security - Advances in Intelligent Systems and Computing(AISC) Book Series, Volume 729, (pp.143-152), Springer, Singapore, June 2018.
  • Akhil Behl, ”Emerging Security Challenges in Cloud Computing”, 2011 IEEE, ISBN: 978-1-4673-0126-8, pp.217-222,2011.
  • Decman, M. & Vintar, M. (2013), “A possible solution for digital preservation of e-government: A centralised repository within a cloud computing framework”, Aslib Proceedings, 65 (4), 406- 424,2013.
  • Ramya.D, Dr.Raja.K, and Srinivasan.S, “An analysis of third party auditing techniques in cloud computing”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue No.11, November 2014.
  • Srinivasan.S, K. Raja, “An Innovative Adaptive Method for Reducing Vulnerabilities and Flaws in Cloud Computing Environment”, International Journal of Applied Engineering and Research, Vol.10, No.17,2015.
  • Prof. Jay Dave; Dr. Dhaval Vyas, “Multi- Level Data Security Model for Big Data on Public Cloud: A New Model”, International Journal of Advanced Networking and Applications (IJANA) Volume: 09 Issue: 06 Pages: 3654-3657 (2018) ISSN: 0975-0290

Abstract Views: 146

PDF Views: 1




  • An Electronic Digital Library Using Integrated Security Methods and Cloud Storages

Abstract Views: 146  |  PDF Views: 1

Authors

S. R. Suresh
Principal, Sriram College of Arts and Science, Chennai, India

Abstract


In earlier days, the customer retrieved library materialized structured information are difficult due to enormous database acted in particular location. This paper deals the privacy and security concern includes threats, attacks, data integrity, data leakage, data availability, loss of control, vulnerability and flaws during distribution of services, resources and information. This technique verifies customer verification and validation between cloud clients and cloud providers. Storing the library information system in digital manner is essential through cloud technologies. As an outcome, library consumers can access resources from outside of physical library using cloud methods. This proposed method enforces the use control and access log technique to reduce the data leakage, improve the efficiency and user privacy of the confidential information. It evaluates the several challenges and issues of cloud such as user authentication, data availability, data confidentiality in a cloud environment. This paper depicted the various investigation reports and reviews of various researchers on electronic digital information based library and its resources by cloud methods and storages. This system provides a scheme of a cloud storages functional construction for building knowledge based digital library. Client’s confidential data are stored in global data center storage and numerous local data centers through redundant array of independent disk method in this cloud environment that leads to recovery from the user control and data leakage. This new innovative flexible system delivers the combination of methods like multi-level security with data availability on dissimilar storages, encryption and decryption technique with customer verification and validation method. The electronic digital library resources and services create novel development in scheme of multiple storages with respect to information access and distribution of confidential data in cloud. The multiple cloud storage architecture for digital electronic library offers data handling, speedy transmission of information and linking of communication among library patrons and cloud providers. It will endorse the maturity level from official level members to higher administrate that meet user request and identify the defensible development of knowledge based digital library system. This capable digital library system maintains the cloud computing environment with better performance evaluation. This functional structure progressively established electronic digital library knowledge management by means of user participation. This digital library using multiple cloud storage implementations creates well organized data integration, reduced cost, accessible any-where at any time of services and resources, scalability, elasticity and portability. Furthermore, cloud security and privacy enquiries know the ability of the adaptable digital library system using cloud computing techniques and extent abundant effectiveness with protected cloud environment.

Keywords


Digital Library, Authentication, Cloud Storage, Data Integrity, Security, Privacy.

References