mohamed shameem - Academia.edu (original) (raw)

mohamed shameem

Uploads

Papers by mohamed shameem

Research paper thumbnail of A Framework Assuring Decentralized Accountability Inthe Cloud

International Journal of Research in Engineering and Technology, 2014

Cloud computing enables on-demand and convenient network access to a shared pool of resources. On... more Cloud computing enables on-demand and convenient network access to a shared pool of resources. One of the major characteristics of theservices in thecloud leads to an important problem in the cloud computing scenario. That is, user's data are processed on unknown remote servers which are not under the control of service owner. Multiple users want to do business of their data or application using cloud, but their fears of losing control over their data or application become an obstacle to the popularity of services of cloud. Data owners must get information that their data is not misused on the cloud. To address these problems, here proposes a decentralized framework to monitor the actual usage of the user's data available on the cloud. The proposed framework in this work performs automated logging and distributed auditing of relevant access performed by other entity, occurred at any time, at any cloud provider. The service model considered in this work is software as a service. The methodology includes an object centered approach that uses programmable capabilities of JAR to create an object that contains service owner's policies and data. When the data are accessed by any external entity, logging mechanism is triggered automatically at that moment itself. Automatic JAR checking is also done to verify the trustworthiness of the cloud server. Data encryption technique, policy checking and technique to prevent modification of JAR are the important features of this framework.

Research paper thumbnail of Content-Based Image Retrieval Using FAST Machine Learning Approach in Cloud Computing

Soft Computing Systems, 2018

The images are having significant role in our daily life. Images consume more storage space when ... more The images are having significant role in our daily life. Images consume more storage space when compared to text documents. For preserving privacy of images, before deploying it to cloud storage images are encrypted. A scheme supporting CBIR (content-based image retrieval) from encrypted images is proposed in this paper. The features are identified from the outsourced images and by applying locality-sensitive hashing pre-filter tables are generated for increasing the efficiency of searching. The features of the outsourced images are represented by using interest points and are encrypted by using a stream cipher. A machine learning algorithm using FAST method identifies the interest point on image contour, which helps in retrieving most similar images from cloud. Besides these, for avoiding illegal distribution of retrieved images by query, the cloud server embedds a unique watermark to the encrypted images by using a watermark based protocol. The average search time and precision of the proposed system can be inferred from performance evaluations.

Research paper thumbnail of A Framework Assuring Decentralized Accountability Inthe Cloud

International Journal of Research in Engineering and Technology, 2014

Cloud computing enables on-demand and convenient network access to a shared pool of resources. On... more Cloud computing enables on-demand and convenient network access to a shared pool of resources. One of the major characteristics of theservices in thecloud leads to an important problem in the cloud computing scenario. That is, user's data are processed on unknown remote servers which are not under the control of service owner. Multiple users want to do business of their data or application using cloud, but their fears of losing control over their data or application become an obstacle to the popularity of services of cloud. Data owners must get information that their data is not misused on the cloud. To address these problems, here proposes a decentralized framework to monitor the actual usage of the user's data available on the cloud. The proposed framework in this work performs automated logging and distributed auditing of relevant access performed by other entity, occurred at any time, at any cloud provider. The service model considered in this work is software as a service. The methodology includes an object centered approach that uses programmable capabilities of JAR to create an object that contains service owner's policies and data. When the data are accessed by any external entity, logging mechanism is triggered automatically at that moment itself. Automatic JAR checking is also done to verify the trustworthiness of the cloud server. Data encryption technique, policy checking and technique to prevent modification of JAR are the important features of this framework.

Research paper thumbnail of Content-Based Image Retrieval Using FAST Machine Learning Approach in Cloud Computing

Soft Computing Systems, 2018

The images are having significant role in our daily life. Images consume more storage space when ... more The images are having significant role in our daily life. Images consume more storage space when compared to text documents. For preserving privacy of images, before deploying it to cloud storage images are encrypted. A scheme supporting CBIR (content-based image retrieval) from encrypted images is proposed in this paper. The features are identified from the outsourced images and by applying locality-sensitive hashing pre-filter tables are generated for increasing the efficiency of searching. The features of the outsourced images are represented by using interest points and are encrypted by using a stream cipher. A machine learning algorithm using FAST method identifies the interest point on image contour, which helps in retrieving most similar images from cloud. Besides these, for avoiding illegal distribution of retrieved images by query, the cloud server embedds a unique watermark to the encrypted images by using a watermark based protocol. The average search time and precision of the proposed system can be inferred from performance evaluations.

Log In