An Application to Improve the Performance and Security in Cloud by File Division Technique
-
Published:2023-11-02
Issue:
Volume:
Page:19-23
-
ISSN:2581-9429
-
Container-title:International Journal of Advanced Research in Science, Communication and Technology
-
language:en
-
Short-container-title:IJARSCT
Author:
Mr. Vikas Singh 1, Tarun Bommawar 1, Tejas Kalaskar 1, Parthav Yengantiwar 1, Sameer Ghatbandhe 1, Manish Goabde 1, Sanket Ghuge 1
Affiliation:
1. GH Raisoni Institute of Engineering & Technology, Nagpur, Maharashtra, India
Abstract
Cloud computing has transformed the modern business landscape by providing scalable, flexible, and cost-effective solutions for data storage and processing. However, relying on external cloud providers to manage and protect sensitive data has raised significant security concerns, namely the risk of data breaches. To address these issues and optimize system performance concurrently, this research project introduces a novel approach that combines data fragmentation and replication in the cloud environment.
Data fragmentation involves breaking down large files into smaller fragments or pieces, each of which contains only a portion of the original data. The fragments are then dispersed across multiple cloud nodes to ensure that no single node stores an entire file. This fragmentation and replication strategy reduces the potential risk of data exposure during a security breach.
Data replication across multiple nodes improves system performance in addition to providing security benefits. Replicating data fragments facilitates more efficient data distribution and retrieval, thereby reducing response times and enhancing overall system performance.
This paper provides a comprehensive overview of the methodology employed in this approach, highlighting its fundamental concepts, potential benefits, and key security considerations, such as the importance of data isolation and encryption. By combining data fragmentation and replication, organizations can strengthen their cloud data security while improving system performance, providing a comprehensive answer to the challenges posed by cloud computing.
Publisher
Naksh Solutions
Reference8 articles.
1. K. Bilal, S. U. Khan, L. Zhang, H. Li, K. Hayat, S. A. Madani,N. Min-Allah, L. Wang, D. Chen, M. Iqbal, C. Z. Xu, and A. Y.Zomaya, “Quantitative comparisons of the state of the art datacentre architectures,” Concurrency and Computation: Practice and Experience, Vol. 25, No. 12, 2013, pp.1771-1783. 2. K. Bilal, M. Manzano, S. U. Khan, E. Calle, K. Li, and A.Zomaya, “On the characterization of the structural robustness of data center networks,” IEEE Transactions on Cloud Computing,Vol.1, No. 1, 2013, pp.64-77. 3. D. Boru, D. Kliazovich, F. Granelli, P. Bouvry, and A. Y. Zomaya,“Energy-efficient data replication in cloud computing datacenters,” In IEEE Globecom Workshops, 2013, pp.446-451. 4. Y. Deswarte, L. Blain, and J-C. Fabre, “Intrusion tolerance in distributed computing systems,” In Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, Oakland CA, pp. 110-121,1991. 5. B. Grobauer, T.Walloschek, and E. Stocker, “Understanding cloud computing vulnerabilities,” IEEE Security and Privacy, Vol.9, No. 2, 2011, pp.50-57.
|
|