An Effective Security Scheme Using Division and Replication of Data in Cloud for Optimal Performance
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 120

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 6, June 2017

An Effective Security Scheme Using Division and Replication of Data in Cloud for Optimal Performance

Pranjali Bhingarkar, Dr. Mohd Shafi Pathan

Cloud computing consist of three main parties, service/application provider, third-party which provides resources and the users. Different users put lots of confidential data while using the services and applications on the resources which are manage by third party administrators. Collected data needs security from hackers and from other users using the same service/application and third party administrators. It becomes utmost important that the confidentiality of data is maintain throughout the life cycle. Hence security is the most important aspect of cloud computing. Division and replication methodologies can be used for enhancing security without the cost of performance in cloud computing. These technologies divide the file into number of fragments and these fragments get replicated to different nodes on cloud depending on security level selected by user. Each node contains only single fragment so even in case of successful attack hacker will not receive meaningful information. Nodes on the cloud which stores the fragment are separated by certain distance using T-coloring. DROP handles Authentication attack, Data Recovery attack, Cross VM attack & VM rollback attack. Division and replication methodologies do not rely on encryption/decryption.

Keywords: Cloud Computing, Security, Performance, Fragmentation, Replication

Edition: Volume 6 Issue 6, June 2017

Pages: 1985 - 1988

Share this Article

How to Cite this Article?

Pranjali Bhingarkar, Dr. Mohd Shafi Pathan, "An Effective Security Scheme Using Division and Replication of Data in Cloud for Optimal Performance", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20174431, Volume 6 Issue 6, June 2017, 1985 - 1988

Enter Your Email Address




Similar Articles with Keyword 'Cloud Computing'

Downloads: 180 | Monthly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2394 - 2397

Multilayered Security Approach for Cloud Data Centers using Hash Functions

Jashanpreet Pal Kaur, Rajbhupinder Kaur

Share this Article

Downloads: 99

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Downloads: 99

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2242 - 2246

Efficient and Secure Auditing of Cloud Data with Key -Updating

Niranjana S, Manjusha M S

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 914 - 919

Energy Efficient Sensory Data Collection in Wireless Sensor Networks

Liji Varghese

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 866 - 868

Detecting and Blocking of Malicious URL

Muskan V. Jaiswal, Anjali B. Raut

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Performance'

Downloads: 108 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 180 | Monthly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1884 - 1886

Performance Analysis of Clustal W Algorithm on Linux Cluster

Swati Jasrotia, Salam Din

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this Article

Downloads: 47 | Monthly Hits: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1682 - 1686

Support Vector Machine Based MRI Brain Tumor Detection

Nazima Yousuf, Mrigana Walia

Share this Article

Similar Articles with Keyword 'Fragmentation'

Downloads: 102 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2038 - 2044

Fragmentation and Duplication of Data for the Best Cloud Performance and Security (FDBPS)

Prof. Jaya Kumar B L, Saranya C

Share this Article

Downloads: 110 | Weekly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 2223 - 2225

Survey on Fragmentation for Deduplication in Backup Storage

Reshma A. Fegade, R. D. Bharti

Share this Article

Downloads: 116

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1559 - 1562

Analysis of Various Technologies for Packet Length Optimization in Wireless Sensor Network

Ruchira Deshmukh, M. B. Tamboli

Share this Article

Downloads: 120

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1985 - 1988

An Effective Security Scheme Using Division and Replication of Data in Cloud for Optimal Performance

Pranjali Bhingarkar, Dr. Mohd Shafi Pathan

Share this Article

Downloads: 146

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 185 - 188

Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems

M. Kanchana, R. Ruhin Kouser

Share this Article

Similar Articles with Keyword 'Replication'

Downloads: 86

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 297 - 300

Balancing the Trade-Offs between Data Availability and Query Delay in MANETs

Umar I. Masumdar, N. S. Killarikar

Share this Article

Downloads: 100

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1701 - 1708

An Autonomic Approach for Replication of Scalable Internet Service Deployment

Raji Rajasekharan

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1801 - 1805

Checking the Data Cloud Consistency by Auditor Method

Guruprasad Nellur, Dr. Rekha Patil

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 845 - 848

Byzantine Fault Tolerance in Large Scale Reliable Storage System

Dhiraj M. Bochare, A. S. Alvi

Share this Article



Top