ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

An Effective Security Scheme Using Division and Replication of Data in Cloud for Optimal Performance

Journal: International Journal of Science and Research (IJSR) (Vol.6, No. 6)

Publication Date:

Authors : ; ;

Page : 1985-1988

Keywords : Cloud Computing; Security; Performance; Fragmentation; Replication;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Cloud computing consist of three main parties, service/application provider, third-party which provides resources and the users. Different users put lots of confidential data while using the services and applications on the resources which are manage by third party administrators. Collected data needs security from hackers and from other users using the same service/application and third party administrators. It becomes utmost important that the confidentiality of data is maintain throughout the life cycle. Hence security is the most important aspect of cloud computing. Division and replication methodologies can be used for enhancing security without the cost of performance in cloud computing. These technologies divide the file into number of fragments and these fragments get replicated to different nodes on cloud depending on security level selected by user. Each node contains only single fragment so even in case of successful attack hacker will not receive meaningful information. Nodes on the cloud which stores the fragment are separated by certain distance using T-coloring. DROP handles Authentication attack, Data Recovery attack, Cross VM attack& VM rollback attack. Division and replication methodologies do not rely on encryption/decryption.

Last modified: 2021-06-30 19:12:46