Survey on Division and Replication of Data in Cloud for Optimal Performance and Security
Journal: International Journal for Scientific Research and Development | IJSRD (Vol.3, No. 10)Publication Date: 2016-01-01
Authors : Snehal Shivaji Khot; Ujwala H. Wanaskar;
Page : 984-987
Keywords : Centrality; cloud security; fragmentation; replication; performance;
Abstract
Outsourcing information to an outsider authoritative control, as is done in distributed computing, offers ascend to security concerns. The information trade off may happen because of assaults by different clients and hubs inside of the cloud. Hence, high efforts to establish safety are required to secure information inside of the cloud. On the other hand, the utilized security procedure should likewise consider the advancement of the information recovery time. In this paper, we propose Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) that all in all methodologies the security and execution issues. In the DROPS procedure, we partition a record into sections, and reproduce the divided information over the cloud hubs. Each of the hubs stores just a itary part of a specific information record that guarantees that even in the event of a fruitful assault, no important data is uncovered to the assailant. Additionally, the hubs putting away the sections are isolated with certain separation by method for diagram T-shading to restrict an assailant of speculating the areas of the sections. Moreover, the DROPS procedure does not depend on the customary cryptographic procedures for the information security; in this way alleviating the arrangement of computationally costly approaches. We demonstrate that the likelihood to find and bargain the greater part of the hubs putting away the sections of a solitary record is to a great degree low. We likewise analyze the execution of the DROPS system with ten different plans. The more elevated amount of security with slight execution overhead was watched.
Other Latest Articles
- Determining Security and Efficiency of PHR Using Different Algorithms with Attribute Based Encryption in Cloud Computing
- A review on Development of novel algorithm by combining Wavelet based Enhanced Canny edge Detection and Adaptive Filtering Method for Human Emotion Recognition
- A Study on Design Optimization of Roller Conveyor Chain Link Plate by Using Topological Approach
- A Survey on Service Request Scheduling in Cloud Based Architecture
- Analysis on Student Admission Enquiry System
Last modified: 2016-01-11 18:13:04