Affiliation:
1. CGC College of Engineering, India
Abstract
In the adoption of cloud computing technology, the data security of customer data is prime research these days. The user gets access of the cloud resources that are hosted over the internet that can be hijacked by the attacker. In one example, the access of the virtual machine (VM) as a dedicated resource is given to the end user by the CSP; and when the end user is accessing these resources through an internet-connected PC, there is a possibility of security violation by the attacker, who can take full control of the data. Most of the intrusion detection and prevention system implemented over the cloud infrastructures is rule-based and therefore are only capable to detect the known threats. This research work addressed the security problem by a) selection of optimal data security algorithm, and b) data fragmentation and distribution of data blocks over the multiple cloud nodes that make it difficult to guess about the actual data and its location.
Reference30 articles.
1. DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security
2. Web Distributed Computing Systems Implementation and Modeling
3. A Review on Secure Methodology Fragmentation and Replication of data in Cloud for Data Secrecy and Ideal Performance;R.Chavan;International Journal of Advanced Research in Computer Engineering and Technology,2015
4. A symmetric image encryption scheme based on 3D chaotic cat maps
5. Grid Computing