Fragmentation and Duplication of Data for the Best Cloud Performance and Security (FDBPS)
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016

Fragmentation and Duplication of Data for the Best Cloud Performance and Security (FDBPS)

Prof. Jaya Kumar B L, Saranya C

The security mainly egresses from carrying over the data to a service provider which is of third party i.e. the cloud service. To optimally look into the cloud service, one would definitely pick out its service due to its huge quality of services offered. Contrary to its vantage point, it is proved to have malevolence in its overhaul. One such main liability in the cloud service is the compromise of its security which in turn derogates its overall attainment. This will betide due to two prudent reasons, i.e. either by the external attackers, or due to the compromise by the node within the cloud by itself. Therefore, high security metrics are required to be shield the data within the cloud. Along with the defending quality, the hired strategy of security must also deliberate on the optimization of the data retrieval time. Consequently, the proposed structure of Fragmentation and Duplication of data for the best cloud performance and security will collectively approach the security as well as the performance issues that were witnessed in the former cryptographic methods. In the FDBPS methodology, division of the files into fragments, and replicating the fragmented data over the cloud nodes are done. Only a lone fragment of a data file will be found in a single node. This ensures that there wont be a considerable amount of data casualties even when a node is being hacked or attacked.

Keywords: security, service provider, third party, security metrics, optimization, Fragmentation and Duplication of data

Edition: Volume 5 Issue 4, April 2016

Pages: 2038 - 2044

Share this Article

How to Cite this Article?

Prof. Jaya Kumar B L, Saranya C, "Fragmentation and Duplication of Data for the Best Cloud Performance and Security (FDBPS)", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163070, Volume 5 Issue 4, April 2016, 2038 - 2044

51 PDF Views | 33 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'security'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Similar Articles with Keyword 'service provider'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2038 - 2044

Fragmentation and Duplication of Data for the Best Cloud Performance and Security (FDBPS)

Prof. Jaya Kumar B L, Saranya C

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1362 - 1366

Net Neutrality-A Concept of Open Internet

Depavath Harinath

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1312 - 1317

A Review on Auditing in Cloud

MS Tanuja Sali

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2228 - 2233

A Trusted Secured Architecture for Storage-as-a-Service (STaaS) Cloud

Sanneboina Nagaraju, K. B. V. Rama Narasimham

Share this Article

Similar Articles with Keyword 'third party'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2038 - 2044

Fragmentation and Duplication of Data for the Best Cloud Performance and Security (FDBPS)

Prof. Jaya Kumar B L, Saranya C

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1312 - 1317

A Review on Auditing in Cloud

MS Tanuja Sali

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 2058 - 2061

Privacy Preserved Public Auditing for Distributed Data

Anes P. A., Neethu Francis

Share this Article

Similar Articles with Keyword 'security metrics'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2038 - 2044

Fragmentation and Duplication of Data for the Best Cloud Performance and Security (FDBPS)

Prof. Jaya Kumar B L, Saranya C

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1536 - 1540

Enterprise Software Management Systems by Using Security Metrics

Bhanudas S. Panchabhai, A. N. Patil

Share this Article

Similar Articles with Keyword 'optimization'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2038 - 2044

Fragmentation and Duplication of Data for the Best Cloud Performance and Security (FDBPS)

Prof. Jaya Kumar B L, Saranya C

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 3174 - 3177

Optimizing Dynamic Dependence Graph

Toshi Sharma, Madhuri Sharma

Share this Article

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1865 - 1867

Improved the Correctness and Reduce the Error of DBSCAN using Ant Colony Optimization

Subodh Shrivastava, Brajesh Patel

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1422 - 1426

Incremental CFP-Tree Optimization For Efficient Representative Pattern Set Mining

Vivek Satpute, Prof. Digambar Padulkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1743 - 1745

A Survey Paper on Wireless Transport Layer Security

Parmar Paresh B., Ketan Patel

Share this Article
Top