Distribution and Duplication of Records in Darken for Optimal Performance and Safety

Authors(4) :-V Gokula Krishnan, M Poomani Raj, T Kalidas, H Ronak

Now a day in cloud the data security is the major problem. various third party provide cloud storage to us but person who use that don’t know whether the data is secured in cloud are not to avoid data hacking from cloud here the data are fragmented and stored into various data servers the fragmentation of data is done using fragmented key and using that key the data is again retrieved an given back to the user due to fragmentation data and data also protected using an T-Coloring theorem the data are fragmented and stored in various data servers the hacker would get only an small part of information which would not be useful to him.

Authors and Affiliations

V Gokula Krishnan
Associate Professor, Department of Computer Science and Engineering Panimalar Institute of Technology, Chennai, Tamil Nadu, India
M Poomani Raj
UG Scholars,Department of Computer Science and Engineering Panimalar Institute of Technology, Chennai, Tamil Nadu, India
T Kalidas
UG Scholars,Department of Computer Science and Engineering Panimalar Institute of Technology, Chennai, Tamil Nadu, India
H Ronak
UG Scholars,Department of Computer Science and Engineering Panimalar Institute of Technology, Chennai, Tamil Nadu, India

Platform as a Service, Infrastructure as a Service, Software as a Service, google app engine, Microsoft azure, zoho, VPC, DCN

  1. K. Bilal, M. Manzano, S. U. Khan, E. Calle, K. Li, and A. Zomaya, "On the characterization of the structural robustness of data center networks," IEEE Transactions on Cloud Computing, Vol. 1, No. 1, 2013, pp. 64-77.
  2. D. Boru, D. Kliazovich, F. Granelli, P. Bouvry, and A. Y. Zomaya, "Energy-efficient data replication in cloud computing datacenters," In IEEE Globecom Workshops, 2013, pp. 446-451.
  3. Y. Deswarte, L. Blain, and J-C. Fabre, "Intrusion tolerance in distributed computing systems," In Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, Oakland CA, pp. 110-121, 1991.
  4. B. Grobauer, T.Walloschek, and E. Stocker, "Understanding cloud computing vulnerabilities," IEEE Security and Privacy, Vol. 9, No. 2, 2011, pp. 50-57.
  5. W. K. Hale, "Frequency assignment: Theory and application, Proceedings of the IEEE, Vol. 68, No. 12, 1980, pp. 1497-1514.
  6. W. A. Jansen, "Cloud hooks: Security and privacy issues in cloud computing," In 44th Hawaii IEEE International Conference on System Sciences (HICSS), 2011, pp. 1-10.
  7. A. Mei, L. V. Mancini, and S. Jajodia, "Secure dynamic fragment and replica allocation in large-scale distributed file systems, "IEEE Transactions on Parallel and Distributed Systems, Vol. 14, No. 9, 2003, pp. 885-896.
  8. L. M. Kaufman, "Data security in the world of cloud computing, "IEEE Security and Privacy, Vol. 7, No. 4, 2009, pp. 61-64.
  9. Y. Tang, P. P. Lee, J. C. S. Lui, and R. Perlman, "Secure overlay cloud storage with access control and assured deletion," IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 6,Nov. 2012, pp. 903-916.
  10. M. Tu, P. Li, Q. Ma, I-L. Yen, and F. B. Bastani, "On the optimal placement of secure data objects over Internet," In Proceedings of 19th IEEE International Parallel and Distributed Processing Symposium, pp. 14-14, 2005.
  11. Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono and Ninja Marnau, "Security and Privacy-Enhancing Multicloud Architectures", IEEE Transactions on Dependable and Secure Computing, Vol. 10, No. 4, July/August 2013.
  12. Yogesh Sharma, Bahman Javadi, Weisheng Si, "On the Reliability and Energy Efficiency in Cloud Computing", Proceedings of the 13th Australasian Symposium on Parallel and Distributed Computing (Aus PDC 2015), Sydney, Australia, 27 - 30 January 2015.
  13. G. Aruna Kranthi, D. Shashi Rekha, "Protected data objects replication in data grid", International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012.
  14. Dr. S.G. Bhirud Vijay Katkar, "Novel Architecture for Intrusion-Tolerant Distributed Intrusion Detection System using Packet Filter Firewall and State Transition Tabels, "International Journal of Computer Applications (0975 – 8887) Volume 8– No.11, October 2010.
  15. Dimitrios Zissis, Dimitrios Lekkas, Department of Product and Systems Design Engineering, University of the Aegean, Syros 84100, Greece in 2010.

Publication Details

Published in : Volume 3 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1429-1435
Manuscript Number : CSEIT1831365
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

V Gokula Krishnan, M Poomani Raj, T Kalidas, H Ronak, "Distribution and Duplication of Records in Darken for Optimal Performance and Safety", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1429-1435, January-February-2018. |          | BibTeX | RIS | CSV

Article Preview