Call for Paper - January 2021 Edition
IJCA solicits original research papers for the January 2021 Edition. Last date of manuscript submission is December 21, 2020. Read More

Implementation of Division and Replication of Data in Cloud

Print
PDF
IJCA Proceedings on International Conference on Cognitive Knowledge Engineering
© 2018 by IJCA Journal
ICKE 2016 - Number 1
Year of Publication: 2018
Authors:
P. D. Patni
S. N. Kakarwal

P D Patni and S N Kakarwal. Article: Implementation of Division and Replication of Data in Cloud. IJCA Proceedings on International Conference on Cognitive Knowledge Engineering ICKE 2016(1):1-7, January 2018. Full text available. BibTeX

@article{key:article,
	author = {P. D. Patni and S. N. Kakarwal},
	title = {Article: Implementation of Division and Replication of Data in Cloud},
	journal = {IJCA Proceedings on International Conference on Cognitive Knowledge Engineering},
	year = {2018},
	volume = {ICKE 2016},
	number = {1},
	pages = {1-7},
	month = {January},
	note = {Full text available}
}

Abstract

In cloud system the data is outsourced on the cloud, this may create security issues. In this paper we propose Division and Replication of Data in Cloud (DRDC) which can take care of security issues without compromising the performance. In this system, file uploaded by the client is first encrypted then divided into fragments. Then these fragments are replicated over the cloud nodes. Fragmentation and replication is carried out in such a way that each node contains only a single fragment. Thus if any one of the node is intruded by hacker, no significant information is revealed, and thus security is maintained. To further increase the security, nodes are separated by T-coloring graph method. Due to the T-coloring, the effort needed by an attacker to breach the security is increased multiple times. In addition to this, in this paper we compare this system (DRDC) with other methodologies.

References

  • K. Hashizume, D. G. Rosado, E. Fernndez-Medina, and E. B. Fernandez, 2013, "An analysis of security issues for cloud computing," Journal of Internet Services and Applications, Vol. 4, No. 1, pp. 1-13.
  • L. M. Kaufman, 2009, "Data security in the world of cloud computing," IEEE Security and Privacy, Vol. 7, No. 4, pp. 61-64.
  • W. K. Hale, 1980, "Frequency assignment: Theory and applications," Proceedings of the IEEE, Vol. 68, No. 12, pp. 1497-1514.
  • A. Juels and A. Opera, 2013, "New approaches to security and availability for cloud data," Communications of the ACM, Vol. 56, No. 2, pp. 64-73.
  • D. Zissis and D. Lekkas, 2012 "Addressing cloud computing security issues," Future Generation Computer Systems, Vol. 28, No. 3, pp. 583-592.
  • G. Kappes, A. Hatzieleftheriou, and S. V. Anastasiadis, 2013, "Dike: Virtualization-aware Access Control for Multitenant Filesystems," University of Ioannina, Greece, Technical Report No. DCS2013-1.
  • Y. Tang, P. P. Lee, J. C. S. Lui, and R. Perlman, 2012, "Secure overlay cloud storage with access control and assured deletion," IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 6, (Nov. 2012), pp. 903-916.
  • K. Bilal, S. U. Khan, L. Zhang, H. Li, K. Hayat, S. A. Madani, N. Min-Allah, L. Wang, D. Chen, M. Iqbal, C. Z. Xu, and A. Y. Zomaya, 2015, "DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security," Concurrency and Computation: Practice and Experience, Vol. 25, No. 12, pp. 1771-1783.
  • A. Mei, L. V. Mancini, and S. Jajodia, 2003 "Secure dynamic fragment and replica allocation in large-scale distributed ?le systems," IEEE Transactions on Parallel and Distributed Systems, Vol. 14, No. 9, pp. 885-896.
  • Joan Daemen, Vincent Rijmen, 2002, "The Design of Rijndael: AES – The Advanced Encryption Standard," Springer, ISBN 3-540-42580-2.
  • K. Bilal, S. U. Khan, L. Zhang, H. Li, K. Hayat, S. A. Madani, N. Min-Allah, L. Wang, D. Chen, M. Iqbal, C. Z. Xu, and A. Y. Zomaya, 2013, "Quantitative comparisons of the state of the art data center architectures," Concurrency and Computation: Practice and Experience, Vol. 25, No. 12, pp. 1771-1783.
  • S. U. Khan, and I. Ahmad, 2008, "Comparison and analysis of ten static heuristics-based Internet data replication techniques," Journal of Parallel and Distributed Computing, Vol. 68, No. 2, pp. 113-136.
  • J. J. Wylie, M. Bakkaloglu, V. Pandurangan, M. W. Bigrigg, S. Oguz, K. Tew, C. Williams, G. R. Ganger, and P. K. Khosla, 2001 "Selecting the right data distribution scheme for a survivable storage system," Carnegie Mellon University, Technical Report CMU-CS-01-120, (May 2001).