IJIRST (International Journal for Innovative Research in Science & Technology)ISSN (online) : 2349-6010

 International Journal for Innovative Research in Science & Technology

Security Enhancement for Data Objects in Cloud Computing


Print Email Cite
International Journal for Innovative Research in Science & Technology
Volume 5 Issue - 6
Year of Publication : 2018
Authors : Sandeep Kumar Polu

BibTeX:

@article{IJIRSTV5I6008,
     title={Security Enhancement for Data Objects in Cloud Computing},
     author={Sandeep Kumar Polu},
     journal={International Journal for Innovative Research in Science & Technology},
     volume={5},
     number={6},
     pages={18--21},
     year={},
     url={http://www.ijirst.org/articles/IJIRSTV5I6008.pdf},
     publisher={IJIRST (International Journal for Innovative Research in Science & Technology)},
}



Abstract:

Distributed computing has an advantage in the accessibility of services with least expense and simple adaptability. Cloud gives distinctive services efficiently, however, a few difficulties are present in it. Overall security concerns, synchronization, versatility, and replication are imperative issues. Data replication implies numerous duplicates of the same data in various servers. In distributed computing data replication is putting away numerous duplicates of the same data on various servers, locally or at remote destinations. In the event that information is available at one site, at that point it will be exceptionally dubious to deal with the prerequisites for getting to the data. The server will confront a load situation and system performance may degrade. In this paper, I am going to present Division and Replication of Data in Cloud for Optimal Performance and Security approach for fragment data objects which are uploaded by the data provider and execute a graph-based approach to calculate the distances utilizing the T-Coloring technique to foresee the data nodes for putting fragmented data. This proposed methodology is exceptionally valuable to the data provider for shielding data from assailants. At that point, we expand our methodology for checking consistency in cloud framework at the time of file update. Also, propose a heuristic auditing strategy (HAS) which adds peruses to uncover whatever the number of infringements as could be expected under the circumstances. It tends to be finished by utilizing client activity table. Every user keeps up a User Operation Table for recording local task. Each record in the User Operation Table portrays three components: operation, physical vector, and logical vector. Trial results give enhanced security and reduced recovery time for getting data from the cloud storage and executed in cloud systems.


Keywords:

Cloud Data, Data Fragmentation, Node Placement, User Operation, Heuristic Auditing Strategy


Download Article