Open Access   Article Go Back

Proposed Model for Ensuring More Security in Cloud by Data Fragmentation Method

V. Kiran Kumar1 , E. Hari Prasad2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 391-394, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.391394

Online published on Nov 30, 2018

Copyright © V. Kiran Kumar, E. Hari Prasad . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: V. Kiran Kumar, E. Hari Prasad, “Proposed Model for Ensuring More Security in Cloud by Data Fragmentation Method,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.391-394, 2018.

MLA Style Citation: V. Kiran Kumar, E. Hari Prasad "Proposed Model for Ensuring More Security in Cloud by Data Fragmentation Method." International Journal of Computer Sciences and Engineering 6.11 (2018): 391-394.

APA Style Citation: V. Kiran Kumar, E. Hari Prasad, (2018). Proposed Model for Ensuring More Security in Cloud by Data Fragmentation Method. International Journal of Computer Sciences and Engineering, 6(11), 391-394.

BibTex Style Citation:
@article{Kumar_2018,
author = {V. Kiran Kumar, E. Hari Prasad},
title = {Proposed Model for Ensuring More Security in Cloud by Data Fragmentation Method},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {391-394},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3175},
doi = {https://doi.org/10.26438/ijcse/v6i11.391394}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.391394}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3175
TI - Proposed Model for Ensuring More Security in Cloud by Data Fragmentation Method
T2 - International Journal of Computer Sciences and Engineering
AU - V. Kiran Kumar, E. Hari Prasad
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 391-394
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
768 380 downloads 301 downloads
  
  
           

Abstract

Cloud Computing is a latest technology where the usage of this service by different clients was increasing rapidly day by day. Cloud provides different services with best facilities to utilize it. Presently many small and large scale businesses were using Cloud services to meet their requirements. The one of the main service in cloud is cloud storage. The major requirements for achieving security in outsourced databases are confidentiality, privacy, integrity, availability. Now a day’s many companies gives access their clients to store their data in remote storage server i.e. cloud .as well as one of the main issue in cloud is data security. In consideration with the cloud security, in this paper we proposed architecture for storing the data in cloud using the fragmentation method. The detail architecture is discussed in the paper.

Key-Words / Index Term

Security as a service, Cloud Models, Fragmentation, Database

References

[1]. Foster, I., Zhao, Y., Ioan, R. and Lu, S. “Cloud Computing and Grid Computing 360-Degree Compared”, Grid Computing Environments Workshop, 2008.
[2]. Azzam, S., Wesam, A., Samih, A. and Abdulaziz, Y. “A Dynamic Object Fragmentation and Replication Algorithm in distributed database systems”, American Journal of Applied Sciences, pp. 613-618, 2007.
[3]. Balachandra, R., Ramakrishna, P.V. and Atanu, R. “Cloud Security Issues”, In IEEE international Conference on Services Computing, pp. 517-520, 2009.
[4]. Ceri, S. and Pelagatti, G. “Distributed Databases Principles and System”, 1st ed., New York: McGraw-Hill, 1984.
[5]. Cong, W., Qian, W. and Kui R., “Ensuring Data Storage Security in Cloud Computing”, Cryptology ePrint Archive, Report, http://eprint.iacr.org/, (accessed: 18 October 2009), 2009.
[6]. Jay, H. “What you need to know about Cloud Computing Security and Compliance”, Gartner, Research, ID Number: G00168345, 2009.
[7]. Katja, H. and Ralf, S. “Distributed Database Systems-Fragmentation and Allocation,” Cluster of Excellence MMCI, October 2010.
[8]. Gibbs, M.R., Graeme, S. and Reeva, L. “Data Quality, Database Fragmentation and Information Privacy”, Surveillance and Society, http://www.surveillance-and-society.org/articles3 (1)/data.pdf, (accessed on 11 January 2012), pp. 45-58, 2005.
[9]. Navathe S., Karlapalem, K. and Ra, M. “A mixed fragmentation methodology for initial distributed database design,” Journal of Computer and Software Engineering Vol. 3, No. 4 pp 395-426, 1995.
[10]. Ozsu, M.T. and Valduriez, P. “Principles of Distributed Database Systems”, 2nd ed., New Jersey: Prentice-Hall, 1999.
[11]. Weiss, A. “Computing in The Clouds”, In ACM networker, pp. 16–25, 2007.
[12]. Ch.V.B.Neeraja1*, S.S.S.N.Usha Devi N2, “A Novel Two Level Search Scheme to Provide Security and Privacy of Encrypted Spatial Data,” International Journal of Scientific Research in Computer Science and Engineering Vol.6, Issue.6, pp.01-05, October (2018),
[13]. Kodge B. G.,” Information Security: A Review on Steganography with Cryptography for Secured Data Transaction”, International Journal of Scientific Research in Network Security and Communication, Volume-5, Issue-6, Dec 2017.