Open Access   Article Go Back

Triple Security of File System for Cloud Computing

R. Arya1

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-3 , Page no. 148-154, Mar-2014

Online published on Mar 30, 2014

Copyright © R. Arya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Arya , “Triple Security of File System for Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.148-154, 2014.

MLA Style Citation: R. Arya "Triple Security of File System for Cloud Computing." International Journal of Computer Sciences and Engineering 2.3 (2014): 148-154.

APA Style Citation: R. Arya , (2014). Triple Security of File System for Cloud Computing. International Journal of Computer Sciences and Engineering, 2(3), 148-154.

BibTex Style Citation:
@article{Arya_2014,
author = {R. Arya },
title = {Triple Security of File System for Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2014},
volume = {2},
Issue = {3},
month = {3},
year = {2014},
issn = {2347-2693},
pages = {148-154},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=87},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=87
TI - Triple Security of File System for Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - R. Arya
PY - 2014
DA - 2014/03/30
PB - IJCSE, Indore, INDIA
SP - 148-154
IS - 3
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3443 3465 downloads 3706 downloads
  
  
           

Abstract

Large scale distributed systems such as cloud computing applications are becoming very common. These applications come with increasing challenges on how to transfer and where to store and compute data. The most prevalent distributed file systems to deal with these challenges is the Hadoop File System (HDFS) which is a variant of the Google File System (GFS). However HDFS has two potential problems. The first one is that it depends on a single name node to manage almost all operations of every data block in the file system. As a result it can be a bottleneck resource and a single point of failure. The second potential problem with HDFS is that it depends on TCP to transfer data. As has been cited in many studies TCP takes many rounds before it can send at the full capacity of the links in the cloud. This results in low link utilization and longer download times. To overcome these problems of HDFS we present a new distributed file system. Our scheme uses a light weight front end server to connect all requests with many name nodes i.e Triple Security.

Key-Words / Index Term

Network, Performance, Security, Signature

References

n Efficient Implementation Of The Digital Signature Algorithm P. Kitsos, N. Sklavos And O. Koufopavlou Vlsi Design Laboratory Electrical and Computer Engineering Department University of Patras. Patras, GREECE E-mail: pkitsos@ee.upatras.gr
[2]. An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0M.M. Amin, .M. Salleh, S. Ibrahim, M.R Katmin (2003), �Information Hiding Using Steganography�, 4th National Conference on Telecommunication Technology Proceeding 2003 (NCTT2003), Concorde Hotel, Shah Alam, Selangor, 14-15 January 2003.
[3]. Nameer N. EL-Emam, Hiding a Large Amount of Data with High Security Using Steganography Algorithm Applied Computer Science Department, Faculty of Information Technology, Philadelphia University, Jordan
[4]. Bellare,M., Miner,S.: A Forward-Secure Digital Signature Scheme. In: Wiener, M. (eds.):
[5]. National Institute of Standards and Technology (NIST), Digital Signature Standard, FIPS PUB 186-2, http://csrc.nist.gov/publications/fips/fips186-2/fips186-2.pdf
[6]. Abdalla,M., Reyzin,L.: A New Forward-Secure Digital Signature Scheme. In: ASIACRYPT 2000,LNCS, Vol.1976, pp. 116-129. Springer-Verlag,(2000).
[7]. Anderson,R.: Invited Lecture, Fourth Annual Conference on Computer and Communications Security,ACM, (1997).
[8]. T Morkel, JHP Eloff � Encryption Techniques: A TIMELINE APPROACH� published in Information and Computer Security Architecture (ICSA) Research Group proceeding.
[9]. Text book William Stallings, Data and Computer Communications, 6eWilliam 6e 2005.
[10]. Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, M.A. Matin �Effect of Security Increment to Symmetric Data Encryption through AES Methodology� Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing 978-0-7695-3263-9/08 DOI 10.1109/SNPD.2008.101 IEEE 2008.
[11]. Joan Daemen and Vincent Rijmen, AES submission document on Rijndael, June 1998.