ABSTRACT
Outsourcing
data to a third-party administrative control, as is done in cloud computing,
gives rise to security concerns. The data compromise may occur due to attacks
by other users and nodes within the cloud. Therefore, high security measures
are required to protect data within the cloud. However, the employed security
strategy must also take into account the optimization of the data retrieval
time. In this paper, we propose Division and
Replication of Data in the Cloud for Optimal Performance and Security (DROPS)
that collectively approaches the security and performance issues. In the DROPS
methodology, we divide a file into fragments, and replicate the fragmented data
over the cloud nodes. Each of the nodes stores only a single fragment of a
particular data file that ensures that even in case of a successful attack, no
meaningful information is revealed to the attacker. Moreover, the nodes storing
the fragments are separated with certain distance by means of graph T-coloring
to prohibit an attacker of guessing the locations of the fragments. We also
compare the performance of the DROPS methodology with ten other schemes. The
higher level of security with slight performance overhead was observed.
AIM
The
aim of this paper is Division and Replication of Data in the Cloud for Optimal
Performance and Security (DROPS) that collectively approaches the security and
performance issues.
SCOPE
The
scope of this paper is the DROPS methodology; we divide a file into fragments,
and replicate the fragmented data over the cloud nodes. Each of the nodes
stores only a single fragment of a particular data file that ensures that even
in case of a successful attack, no meaningful information is revealed to the
attacker.
EXISTING SYSTEM
The
off-site data storage cloud utility requires users to move data in cloud’s
virtualized and shared environment that may result in various security
concerns. Pooling and elasticity of a cloud, allows the physical resources to
be shared among many users. The data outsourced to a public cloud must be
secured. Unauthorized data access by other users and processes (whether
accidental or deliberate) must be prevented As discussed above, any weak entity
can put the whole cloud at risk. In such a scenario, the security mechanism
must substantially increase an attacker’s effort to retrieve a reasonable
amount of data even after a successful intrusion in the cloud.
DISADVANTAGES
- The data compromise may occur due to attacks by other users and nodes within the cloud.
- The employed security strategy must also take into account the optimization of the data retrieval time
PROPOSED SYSTEM
In
this paper, we collectively approach the issue of security and performance as a
secure data replication problem. We present Division and Replication of Data in
the Cloud for Optimal Performance and Security (DROPS) that judicially
fragments user files into pieces and replicates them at strategic locations
within the cloud. The division of a file into fragments is performed based on a
given user criteria such that the individual fragments do not contain any
meaningful information. Each of the cloud nodes (we use the term node to
represent computing, storage, physical, and virtual machines) contains a
distinct fragment to increase the data security.
ADVANTAGES
•
The implications of TCP in cast over the DROPS
methodology need to be studied that is relevant to distributed data storage and
access.
• To improve data retrieval time, the nodes are selected based on the centrality measures that ensure an improved access time.
SYSTEM ARCHITECTURE:-
SYSTEM CONFIGURATION
Hardware Requirements
- Speed - 1.1 Ghz
- Processor - Pentium IV
- RAM - 512 MB (min)
- Hard Disk - 40 GB
- Key Board - Standard Windows Keyboard
- Mouse - Two or Three Button Mouse
- Monitor - LCD/LED
Software
requirements
- Operating System : Windows 7
- Front End : ASP.Net and C#
- Database : MSSQL
- Tool : Microsoft Visual studio
REFERENCE
Mazhar
Ali, Kashif Bilal, Samee U. Khan “DROPS: DIVISION AND REPLICATION OF DATA IN
CLOUD FOR OPTIMAL PERFORMANCE AND SECURITY,” IEEE TRANSACTIONS ON CLOUD
COMPUTING VOL PP,ISS 99, February 2015.
No comments:
Post a Comment