A Novel Approach for Server Creation by Using Cloud Computing Techniques

Authors

  • A. Nagarjuna  M. Tech Student, Department of Computer Science and Engineering, Sree Rama Educational Society Group of Institutions, Tirupati, India
  • E. Muralikrishna  Assistant Professor, Department of Computer Science and Engineering, Sree Rama Educational Society Group of Institutions, Tirupati, India

Keywords:

Multicloud storage, information leakage, system attack-ability, remote synchronization, distribution and optimization.

Abstract

Numerous plans were as of overdue progressed for placing away facts on various mists. Circulating records over diverse cloud service providers (CSPs) consequently furnishes clients with a particular level of facts spillage manipulate, for no single reason of attack can release all of the information. Be that as it can, spontaneous dissemination of data lumps can set off high records divulgence even whilst using numerous mists. Right now, take a look at a widespread facts spillage difficulty added about with the aid of impromptu information conveyance in multicloud capability administrations. At that point, we present StoreSim, a data spillage mindful stockpiling framework in multicloud. StoreSim intends to save linguistically similar records on a comparable cloud, in this way limiting the client's records spillage over several mists. We plan a surmised calculation to productively create similitude safeguarding marks for statistics portions depending on MinHash and Bloom channel, and furthermore structure a capacity to process the facts spillage depending on those marks. Next, we gift a compelling stockpiling plan age calculation depending on bunching for conveying data portions with negligible statistics spillage over several mists. At long ultimate, we determine our plan using genuine datasets from Wikipedia and GitHub. We display that our plan can reduce the data spillage by means of up to 60% contrasted with impromptu situation. Besides, our investigation on framework assault capability well-known shows that our plan makes attacks on statistics regularly mind boggling.

References

  1. S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications, vol. 34, no. 1, pp. 1 – 11, 2011.
  2. P. Mell and T. Grance, “The nist definition of cloud computing,” 2011.
  3. M. T. Khorshed, A. S. Ali, and S. A. Wasimi, “A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing,” Future Generation Computer Systems, vol. 28, no. 6, pp. 833 – 851, 2012.
  4. Z. Zhou and D. Huang, “Efficient and secure data storage operations for mobile cloud computing,” in Proceedings of the 8th International Conference on Network and Service Management. International Federation for Information Processing, 2012, pp. 37–45.
  5. K. Kumar and Y.-H. Lu, “Cloud computing for mobile users: Can offloading computation save energy?” Computer, no. 4, pp. 51–56, 2010.
  6. M. AlZain, E. Pardede, B. Soh, and J. Thom, “Cloud computing security: From single to multi-clouds,” in System Science (HICSS), 2012 45th Hawaii International Conference on, Jan 2012, pp. 5490–5499.
  7. M. Sookhak, H. Talebian, E. Ahmed, A. Gani, and M. K. Khan, “A review on remote data auditing in single cloud server: Taxonomy and open issues,” Journal of Network and Computer Applications, vol. 43, pp. 121–141, 2014.
  8. E. Aguiar, Y. Zhang, and M. Blanton, “An overview of issues and recent developments in cloud computing and storage security,” in High Performance Cloud Auditing and Applications. Springer, 2014, pp. 3–33.
  9. I. Gul, M. Islam et al., “Cloud computing security auditing,” in Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on. IEEE, 2011, pp. 143–148.
  10. E. M. Mohamed, H. S. Abdelkader, and S. El-Etriby, “Enhanced data security model for cloud computing,” in Informatics and Systems (INFOS), 2012 8th International Conference on. IEEE, 2012, pp. CC– 12.
  11. S. Ramgovind, M. M. Eloff, and E. Smith, “The management of security in cloud computing,” in Information Security for South Africa (ISSA), 2010. IEEE, 2010, pp. 1–7.
  12. F. Sabahi, “Cloud computing security threats and responses,” in Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. IEEE, 2011, pp. 245–249.
  13. X. Wang, B. Wang, and J. Huang, “Cloud computing and its key techniques,” in Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conference on, vol. 2. IEEE, 2011, pp. 404– 410.
  14. S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of network and computer applications, vol. 34, no. 1, pp. 1–11, 2011.
  15. J. Yang and Z. Chen, “Cloud computing research and security issues,” in Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on. IEEE, 2010, pp. 1–3.
  16. M. Lori, “Data security in the world of cloud computing,” Co-published by the IEEE Computer And reliability Societies, pp. 61–64, 2009.
  17. C. Wang, K. Ren, W. Lou, and J. Li, “Toward publicly auditable secure cloud data storage services,” Network, IEEE, vol. 24, no. 4, pp. 19–24, 2010.
  18. L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A. V. Vasilakos, “Security and privacy for storage and computation in cloud computing,” Information Sciences, vol. 258, pp. 371–386, 2014.
  19. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in INFOCOM, 2010 Proceedings IEEE. Ieee, 2010, pp. 1–9.
  20. K. Yang and X. Jia, “Data storage auditing service in cloud computing: challenges, methods and opportunities,” World Wide Web, vol. 15, no. 4, pp. 409–428, 2012.

Downloads

Published

2022-10-30

Issue

Section

Research Articles

How to Cite

[1]
A. Nagarjuna, E. Muralikrishna, " A Novel Approach for Server Creation by Using Cloud Computing Techniques" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 5, pp.223-228, September-October-2022.