CFP last date
22 April 2024
Reseach Article

Implementation of Division and Replication of Data in Cloud

Published on January 2018 by P. D. Patni, S. N. Kakarwal
International Conference on Cognitive Knowledge Engineering
Foundation of Computer Science USA
ICKE2016 - Number 1
January 2018
Authors: P. D. Patni, S. N. Kakarwal
fc5145a4-2202-401f-8529-d2ab2fb8f8db

P. D. Patni, S. N. Kakarwal . Implementation of Division and Replication of Data in Cloud. International Conference on Cognitive Knowledge Engineering. ICKE2016, 1 (January 2018), 1-7.

@article{
author = { P. D. Patni, S. N. Kakarwal },
title = { Implementation of Division and Replication of Data in Cloud },
journal = { International Conference on Cognitive Knowledge Engineering },
issue_date = { January 2018 },
volume = { ICKE2016 },
number = { 1 },
month = { January },
year = { 2018 },
issn = 0975-8887,
pages = { 1-7 },
numpages = 7,
url = { /proceedings/icke2016/number1/28941-6003/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Cognitive Knowledge Engineering
%A P. D. Patni
%A S. N. Kakarwal
%T Implementation of Division and Replication of Data in Cloud
%J International Conference on Cognitive Knowledge Engineering
%@ 0975-8887
%V ICKE2016
%N 1
%P 1-7
%D 2018
%I International Journal of Computer Applications
Abstract

In cloud system the data is outsourced on the cloud, this may create security issues. In this paper we propose Division and Replication of Data in Cloud (DRDC) which can take care of security issues without compromising the performance. In this system, file uploaded by the client is first encrypted then divided into fragments. Then these fragments are replicated over the cloud nodes. Fragmentation and replication is carried out in such a way that each node contains only a single fragment. Thus if any one of the node is intruded by hacker, no significant information is revealed, and thus security is maintained. To further increase the security, nodes are separated by T-coloring graph method. Due to the T-coloring, the effort needed by an attacker to breach the security is increased multiple times. In addition to this, in this paper we compare this system (DRDC) with other methodologies.

References
  1. K. Hashizume, D. G. Rosado, E. Fernndez-Medina, and E. B. Fernandez, 2013, "An analysis of security issues for cloud computing," Journal of Internet Services and Applications, Vol. 4, No. 1, pp. 1-13.
  2. L. M. Kaufman, 2009, "Data security in the world of cloud computing," IEEE Security and Privacy, Vol. 7, No. 4, pp. 61-64.
  3. W. K. Hale, 1980, "Frequency assignment: Theory and applications," Proceedings of the IEEE, Vol. 68, No. 12, pp. 1497-1514.
  4. A. Juels and A. Opera, 2013, "New approaches to security and availability for cloud data," Communications of the ACM, Vol. 56, No. 2, pp. 64-73.
  5. D. Zissis and D. Lekkas, 2012 "Addressing cloud computing security issues," Future Generation Computer Systems, Vol. 28, No. 3, pp. 583-592.
  6. G. Kappes, A. Hatzieleftheriou, and S. V. Anastasiadis, 2013, "Dike: Virtualization-aware Access Control for Multitenant Filesystems," University of Ioannina, Greece, Technical Report No. DCS2013-1.
  7. Y. Tang, P. P. Lee, J. C. S. Lui, and R. Perlman, 2012, "Secure overlay cloud storage with access control and assured deletion," IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 6, (Nov. 2012), pp. 903-916.
  8. K. Bilal, S. U. Khan, L. Zhang, H. Li, K. Hayat, S. A. Madani, N. Min-Allah, L. Wang, D. Chen, M. Iqbal, C. Z. Xu, and A. Y. Zomaya, 2015, "DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security," Concurrency and Computation: Practice and Experience, Vol. 25, No. 12, pp. 1771-1783.
  9. A. Mei, L. V. Mancini, and S. Jajodia, 2003 "Secure dynamic fragment and replica allocation in large-scale distributed ?le systems," IEEE Transactions on Parallel and Distributed Systems, Vol. 14, No. 9, pp. 885-896.
  10. Joan Daemen, Vincent Rijmen, 2002, "The Design of Rijndael: AES – The Advanced Encryption Standard," Springer, ISBN 3-540-42580-2.
  11. K. Bilal, S. U. Khan, L. Zhang, H. Li, K. Hayat, S. A. Madani, N. Min-Allah, L. Wang, D. Chen, M. Iqbal, C. Z. Xu, and A. Y. Zomaya, 2013, "Quantitative comparisons of the state of the art data center architectures," Concurrency and Computation: Practice and Experience, Vol. 25, No. 12, pp. 1771-1783.
  12. S. U. Khan, and I. Ahmad, 2008, "Comparison and analysis of ten static heuristics-based Internet data replication techniques," Journal of Parallel and Distributed Computing, Vol. 68, No. 2, pp. 113-136.
  13. J. J. Wylie, M. Bakkaloglu, V. Pandurangan, M. W. Bigrigg, S. Oguz, K. Tew, C. Williams, G. R. Ganger, and P. K. Khosla, 2001 "Selecting the right data distribution scheme for a survivable storage system," Carnegie Mellon University, Technical Report CMU-CS-01-120, (May 2001).
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Security Data Fragmentation Replication T-coloring