Proposed Model for Ensuring More Security in Cloud by Data Fragmentation Method
DOI:
https://doi.org/10.26438/ijcse/v6i11.391394Keywords:
Security as a service, Cloud Models, Fragmentation, DatabaseAbstract
Cloud Computing is a latest technology where the usage of this service by different clients was increasing rapidly day by day. Cloud provides different services with best facilities to utilize it. Presently many small and large scale businesses were using Cloud services to meet their requirements. The one of the main service in cloud is cloud storage. The major requirements for achieving security in outsourced databases are confidentiality, privacy, integrity, availability. Now a day‘s many companies gives access their clients to store their data in remote storage server i.e. cloud .as well as one of the main issue in cloud is data security. In consideration with the cloud security, in this paper we proposed architecture for storing the data in cloud using the fragmentation method. The detail architecture is discussed in the paper
References
[1] Foster, I., Zhao, Y., Ioan, R. and Lu, S. “Cloud Computing and Grid Computing 360-Degree Compared”, Grid Computing Environments Workshop, 2008.
[2] Azzam, S., Wesam, A., Samih, A. and Abdulaziz, Y. “A Dynamic Object Fragmentation and Replication Algorithm in distributed database systems”, American Journal of Applied Sciences, pp. 613-618, 2007.
[3] Balachandra, R., Ramakrishna, P.V. and Atanu, R. “Cloud Security Issues”, In IEEE international Conference on Services Computing, pp. 517-520, 2009.
[4] Ceri, S. and Pelagatti, G. “Distributed Databases Principles and System”, 1st ed., New York: McGraw-Hill, 1984.
[5] Cong, W., Qian, W. and Kui R., “Ensuring Data Storage Security in Cloud Computing”, Cryptology ePrint Archive, Report, http://eprint.iacr.org/, (accessed: 18 October 2009), 2009.
[6] Jay, H. “What you need to know about Cloud Computing Security and Compliance”, Gartner, Research, ID Number: G00168345, 2009.
[7] Katja, H. and Ralf, S. “Distributed Database Systems-Fragmentation and Allocation,” Cluster of Excellence MMCI, October 2010.
[8] Gibbs, M.R., Graeme, S. and Reeva, L. “Data Quality, Database Fragmentation and Information Privacy”, Surveillance and Society, http://www.surveillance-and-society.org/articles3 (1)/data.pdf, (accessed on 11 January 2012), pp. 45-58, 2005.
[9] Navathe S., Karlapalem, K. and Ra, M. “A mixed fragmentation methodology for initial distributed database design,” Journal of Computer and Software Engineering Vol. 3, No. 4 pp 395-426, 1995.
[10] Ozsu, M.T. and Valduriez, P. “Principles of Distributed Database Systems”, 2nd ed., New Jersey: Prentice-Hall, 1999.
[11] Weiss, A. “Computing in The Clouds”, In ACM networker, pp. 16–25, 2007.
[12] Ch.V.B.Neeraja1*, S.S.S.N.Usha Devi N2, “A Novel Two Level Search Scheme to Provide Security and Privacy of Encrypted Spatial Data,” International Journal of Scientific Research in Computer Science and Engineering Vol.6, Issue.6, pp.01-05, October (2018),
[13] Kodge B. G.,” Information Security: A Review on Steganography with Cryptography for Secured Data Transaction”, International Journal of Scientific Research in Network Security and Communication, Volume-5, Issue-6, Dec 2017.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
