ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Fragmentation and Duplication of Data for the Best Cloud Performance and Security (FDBPS)

Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 4)

Publication Date:

Authors : ; ;

Page : 2038-2044

Keywords : security; service provider; third party; security metrics; optimization; Fragmentation and Duplication of data;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The security mainly egresses from carrying over the data to a service provider which is of third party i. e. the cloud service. To optimally look into the cloud service, one would definitely pick out its service due to its huge quality of services offered. Contrary to its vantage point, it is proved to have malevolence in its overhaul. One such main liability in the cloud service is the compromise of its security which in turn derogates its overall attainment. This will betide due to two prudent reasons, i. e. either by the external attackers, or due to the compromise by the node within the cloud by itself. Therefore, high security metrics are required to be shield the data within the cloud. Along with the defending quality, the hired strategy of security must also deliberate on the optimization of the data retrieval time. Consequently, the proposed structure of Fragmentation and Duplication of data for the best cloud performance and security will collectively approach the security as well as the performance issues that were witnessed in the former cryptographic methods. In the FDBPS methodology, division of the files into fragments, and replicating the fragmented data over the cloud nodes are done. Only a lone fragment of a data file will be found in a single node. This ensures that there wont be a considerable amount of data casualties even when a node is being hacked or attacked.

Last modified: 2021-07-01 14:33:56