Downloads: 103 | Views: 273
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016 | Popularity: 7 / 10
Fragmentation and Duplication of Data for the Best Cloud Performance and Security (FDBPS)
Prof. Jaya Kumar B L, Saranya C
Abstract: The security mainly egresses from carrying over the data to a service provider which is of third party i. e. the cloud service. To optimally look into the cloud service, one would definitely pick out its service due to its huge quality of services offered. Contrary to its vantage point, it is proved to have malevolence in its overhaul. One such main liability in the cloud service is the compromise of its security which in turn derogates its overall attainment. This will betide due to two prudent reasons, i. e. either by the external attackers, or due to the compromise by the node within the cloud by itself. Therefore, high security metrics are required to be shield the data within the cloud. Along with the defending quality, the hired strategy of security must also deliberate on the optimization of the data retrieval time. Consequently, the proposed structure of Fragmentation and Duplication of data for the best cloud performance and security will collectively approach the security as well as the performance issues that were witnessed in the former cryptographic methods. In the FDBPS methodology, division of the files into fragments, and replicating the fragmented data over the cloud nodes are done. Only a lone fragment of a data file will be found in a single node. This ensures that there wont be a considerable amount of data casualties even when a node is being hacked or attacked.
Keywords: security, service provider, third party, security metrics, optimization, Fragmentation and Duplication of data
Edition: Volume 5 Issue 4, April 2016
Pages: 2038 - 2044
DOI: https://www.doi.org/10.21275/NOV163070
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 455 - 459Real World IoT Applications in Daily Domain
Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad
Downloads: 0
Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022
Pages: 1023 - 1029A Survey and High-Level Design on Human Activity Recognition
Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad