Proposed Model for Ensuring More Security in Cloud by Data Fragmentation Method

Authors

  • Kumar VK Dept. of Computer Science, Dravidian University, Kuppam-517425, Chittoor dist, Andhra Pradesh, India
  • Prasad EH Dept. of Science, Dravidian University, Kuppam-517425, Chittoor dist, Andhra Pradesh, India

DOI:

https://doi.org/10.26438/ijcse/v6i11.391394

Keywords:

Security as a service, Cloud Models, Fragmentation, Database

Abstract

Cloud Computing is a latest technology where the usage of this service by different clients was increasing rapidly day by day. Cloud provides different services with best facilities to utilize it. Presently many small and large scale businesses were using Cloud services to meet their requirements. The one of the main service in cloud is cloud storage. The major requirements for achieving security in outsourced databases are confidentiality, privacy, integrity, availability. Now a day‘s many companies gives access their clients to store their data in remote storage server i.e. cloud .as well as one of the main issue in cloud is data security. In consideration with the cloud security, in this paper we proposed architecture for storing the data in cloud using the fragmentation method. The detail architecture is discussed in the paper

References

[1] Foster, I., Zhao, Y., Ioan, R. and Lu, S. “Cloud Computing and Grid Computing 360-Degree Compared”, Grid Computing Environments Workshop, 2008.

[2] Azzam, S., Wesam, A., Samih, A. and Abdulaziz, Y. “A Dynamic Object Fragmentation and Replication Algorithm in distributed database systems”, American Journal of Applied Sciences, pp. 613-618, 2007.

[3] Balachandra, R., Ramakrishna, P.V. and Atanu, R. “Cloud Security Issues”, In IEEE international Conference on Services Computing, pp. 517-520, 2009.

[4] Ceri, S. and Pelagatti, G. “Distributed Databases Principles and System”, 1st ed., New York: McGraw-Hill, 1984.

[5] Cong, W., Qian, W. and Kui R., “Ensuring Data Storage Security in Cloud Computing”, Cryptology ePrint Archive, Report, http://eprint.iacr.org/, (accessed: 18 October 2009), 2009.

[6] Jay, H. “What you need to know about Cloud Computing Security and Compliance”, Gartner, Research, ID Number: G00168345, 2009.

[7] Katja, H. and Ralf, S. “Distributed Database Systems-Fragmentation and Allocation,” Cluster of Excellence MMCI, October 2010.

[8] Gibbs, M.R., Graeme, S. and Reeva, L. “Data Quality, Database Fragmentation and Information Privacy”, Surveillance and Society, http://www.surveillance-and-society.org/articles3 (1)/data.pdf, (accessed on 11 January 2012), pp. 45-58, 2005.

[9] Navathe S., Karlapalem, K. and Ra, M. “A mixed fragmentation methodology for initial distributed database design,” Journal of Computer and Software Engineering Vol. 3, No. 4 pp 395-426, 1995.

[10] Ozsu, M.T. and Valduriez, P. “Principles of Distributed Database Systems”, 2nd ed., New Jersey: Prentice-Hall, 1999.

[11] Weiss, A. “Computing in The Clouds”, In ACM networker, pp. 16–25, 2007.

[12] Ch.V.B.Neeraja1*, S.S.S.N.Usha Devi N2, “A Novel Two Level Search Scheme to Provide Security and Privacy of Encrypted Spatial Data,” International Journal of Scientific Research in Computer Science and Engineering Vol.6, Issue.6, pp.01-05, October (2018),

[13] Kodge B. G.,” Information Security: A Review on Steganography with Cryptography for Secured Data Transaction”, International Journal of Scientific Research in Network Security and Communication, Volume-5, Issue-6, Dec 2017.

Downloads

Published

2025-11-18
CITATION
DOI: 10.26438/ijcse/v6i11.391394
Published: 2025-11-18

How to Cite

[1]
V. K. Kumar and E. Prasad, “Proposed Model for Ensuring More Security in Cloud by Data Fragmentation Method”, Int. J. Comp. Sci. Eng., vol. 6, no. 11, pp. 391–394, Nov. 2025.

Issue

Section

Research Article