Downloads: 153 | Views: 296 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 6 Issue 9, September 2017 | Popularity: 7.1 / 10
Partition and Repetition of Data in Cloud for Finest Performance and Security
Shivangi R, Dr. Shiva Murthy G, Ramakrishna Prasad A. L.
Abstract: Outsourcing information to an outsider managerial control, as is done in distributed computing, offers ascend to security concerns. The information trade off may happen because of assaults by different clients and hubs inside the cloud. In this way, high safety efforts are required to ensure information inside the cloud. Be that as it may, the utilized security methodology should likewise consider the enhancement of the information recovery time. In this paper, we propose Partition and Repetition of Data inCloud for Finest Performance and Security (PROPS) that on the whole methodologies the security and execution issues. In the PROPSsystem, we partition a record into sections, and recreate the divided information over the cloud hubs. Each of the hubs stores just a solitary piece of a specific information document that guarantees that even in the event of an effective assault, no important data is uncovered to the aggressor. Additionally, the hubs putting away the pieces are isolated with certain separation by methods for chart T-shading to preclude an aggressor of speculating the areas of the sections. Besides, the PROPSapproach does not depend on the conventional cryptographic strategies for the information security, accordingly diminishing the arrangement of computationally costly techniques. We demonstrate that the likelihood to find and trade off the greater part of the hubs putting away the pieces of a solitary document is to a great degree low. We additionally look at the execution of the PROPS approach with ten different plans. The more elevated amount of security with slight execution overhead was watched.
Keywords: Centrality, cloud security, fragmentation, replication, performance
Edition: Volume 6 Issue 9, September 2017
Pages: 441 - 444
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 108
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1375 - 1390A Survey of Thinning Techniques on Two Dimensional Binary Images
Moumita Sarkar, Santanu Chatterjee
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 1875 - 1880Microclustering with Outlier Detection for DADC
Aswathy Priya M.
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 12, December 2022
Pages: 481 - 483Data-Driven Approach for SOC Estimation of Battery using Long-Short Term Memory Network
S. Sai Rahul