Open Access   Article Go Back

Fragmentation of Data for Security in Cloud Services

S.Daniel 1 , P. Azeem Ul Haq2 , S. Sureshkrishnan3

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 468-472, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.468472

Online published on Apr 30, 2019

Copyright © S.Daniel, P. Azeem Ul Haq, S. Sureshkrishnan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.Daniel, P. Azeem Ul Haq, S. Sureshkrishnan, “Fragmentation of Data for Security in Cloud Services,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.468-472, 2019.

MLA Style Citation: S.Daniel, P. Azeem Ul Haq, S. Sureshkrishnan "Fragmentation of Data for Security in Cloud Services." International Journal of Computer Sciences and Engineering 7.4 (2019): 468-472.

APA Style Citation: S.Daniel, P. Azeem Ul Haq, S. Sureshkrishnan, (2019). Fragmentation of Data for Security in Cloud Services. International Journal of Computer Sciences and Engineering, 7(4), 468-472.

BibTex Style Citation:
@article{Haq_2019,
author = {S.Daniel, P. Azeem Ul Haq, S. Sureshkrishnan},
title = {Fragmentation of Data for Security in Cloud Services},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {468-472},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4059},
doi = {https://doi.org/10.26438/ijcse/v7i4.468472}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.468472}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4059
TI - Fragmentation of Data for Security in Cloud Services
T2 - International Journal of Computer Sciences and Engineering
AU - S.Daniel, P. Azeem Ul Haq, S. Sureshkrishnan
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 468-472
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
259 302 downloads 130 downloads
  
  
           

Abstract

The data compromise could occur thanks to attacks by different users and nodes inside the cloud. Therefore, high security measures square measure needed to safeguard knowledge inside the cloud. However, the utilized security strategy should additionally take into consideration the improvement of the information retrieval time. In our proposed system propose the Division and Replication of Data in the Cloud for Optimal Performance and Security with NTRU Algorithm that for file storage and data security. In this system consist of two phase they are NTRU Encryption method and FDSCS methodology. In this methodology, we tend to divide a file into fragments, and replicate the fragmented knowledge over the cloud nodes. Each fragment is encrypted by NTRU Encryption Algorithm. Each of the nodes stores solely one fragment of a selected record that ensures that even just in case of an eminent attack, no meaningful information is revealed to the attacker. Moreover, the nodes storing the fragments square measure separated with bound distance by means that of graph T-coloring to ban associate assaulter of dead reckoning the locations of the fragments. Finally our Experimental result shows our proposed method ensures complete security of the data, reduce the data overhead and reduction the encryption and decryption time.

Key-Words / Index Term

Fragmentation, NTRU algorithm, T-coloring, cloud security, optimization

References

[1] K. Bilal, S. U. Khan, L. Zhang, H. Li, K. Hayat, S. A. Madani, N. Min-Allah, L. Wang, D. Chen, M. Iqbal, C. Z. Xu, and A.Y.Zomaya,“Quantitative comparisons of the state of the art data center architectures,” Concurrency and Computation: Practice and Experience, Vol. 25, No. 12, 2013, pp. 1771-1783.
[2] Sirisha Aguru, Batteri MadhavaRao, "Data Security In Cloud Computing Using RC6 Encryption and Steganography Algorithms", International Journal of Scientific Research in Computer Science and Engineering, Vol.7, Issue.1, pp.6-9, 2019
[3] Poonam Devi , "Attacks on Cloud Data: A Big Security Issue", International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.15-18, 2018
[4] Mazhar Ali ; Kashif Bilal ;Samee U. Khan ;Bharadwaj Veeravalli ; Keqin Li ; Albert Y. Zomaya “FDSCS: Division And Replication Of Data In Cloud Foroptimal Performance And Security” Volume: 6 , Issue: 2 , April-June 1 2018
[5] K. Bilal, M. Manzano, S. U. Khan, E. Calle, K. Li, and A. Zomaya, “On the characterization of the structural robustness of data center networks,” IEEE Transactions on Cloud Computing, Vol. 1, No. 1, 2013, pp. 64-77.
[6] Y. Chen, V.Paxson, and R. H. Katz, “Whats new about cloud computing security,” University of California, Berkeley Report No. UCB/EECS-2010-5, Jan. 20, 2010.
[7] K.Hashizume, D. G. Rosado, E. Fernndez-Medina, and E. B. Fernandez, “An analysis of security issues for cloud computing,” Journal of Internet Services and Applications, Vol. 4, No. 1, 2013, pp. 1-13..
[8] Y. Deswarte, L. Blain, and J-C. Fabre, “Intrusion tolerance in distributed computing systems,” In Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, Oakland CA, pp. 110-121, 1991.
[9] B.Grobauer, T.Walloschek, and E. Stocker, “Understanding cloud computing vulnerabilities,” IEEE Security and Privacy, Vol. 9, No. 2, 2011, pp. 50-57.
[10] W. K. Hale, “Frequency assignment: Theory and applications,” Proceedings of the IEEE, Vol. 68, No. 12, 1980, pp. 1497-1514.
[11] W. A. Jansen, “Cloud hooks: Security and privacy issues in cloud computing,” In 44th Hawaii IEEE International Conference onSystem Sciences (HICSS), 2011, pp. 1-10.
[12] A. N. Khan, M.L. M. Kiah, S. A. Madani, and M. Ali, “Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing, The Journal of Supercomputing, Vol. 66, No. 3, 2013, pp. 1687-1706 .