SECURE CLOUD STORAGE WITH DATA DYNAMICS USING SECURE
NETWORK CODING TECHNIQUES
Mr.S. Sankar Assistant Professor & Dhirajlal Gandhi College of Technology
Ms.G. Pavithra Computer Science and Engineering & Dhirajlal Gandhi College of Technology
Mr.VS. Nishant Computer Science and Engineering & Dhirajlal Gandhi College of Technology
Ms.S. Priyanka Computer Science and Engineering & Dhirajlal Gandhi College of Technology
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The capacity benefit gave by cloud server isn't completely trusted by clients. In existing data are corrupted by the unauthenticated user with the assistance of the staff. Normally the information are securely handled by the organization but some employees sold their access specifies to the hackers for money. thanks to this issue, the information don't seem to be safe. to beat this, we are able to opt for the advance safe technology. during this technique, the information are uploaded by the encryption format with video mode and therefore the data are downloaded by the user with the assistance of face detection video mode when the info user accept that user request by the face detection video mode. That information will share to four admin while accepting time by seeing of face only they'll accept if the person is that the correct user. If they fine any unauthorized person admin won't accept, by using of face camera detection, they will take a video also the one who goes to access that account. Then only the info are shared from one person to a different. the info shared only by the admin if the person is detected as unauthorized person , the info won't be shared by the admin. These servers, contain many of monetary benefits, offer retrieval of their clients data at any point of your time. Secure cloud storage protocols enable a client to test integrity of outsourced data. during this work, we explore the likelihood of constructing a secure cloud storage for dynamic data by leveraging the algorithms involved in secure network coding.
Key Words: Cloud, Encryption, Admin, Detection, Integrity, Network