Implementation of Meta Data Storage using Fragmentation method for more security in the cloud

Authors

  • Kiran Kumar V Department of Computer Science, Dravidian university, kuppam, India
  • Hari Prasad E Department of Computer Science, Dravidian university, kuppam, India

DOI:

https://doi.org/10.26438/ijcse/v7i1.720723

Keywords:

sensitive data, fragmentation, Public Data Segment (PDS), Sensitive Data Segment (SDS)

Abstract

Cloud Computing has wide range of opportunities for research and industry purpose. There are many issues to consider in cloud. The one of the main issue in cloud is Security. Protecting more secured data in cloud is a big task. To achieve more security for a sensitive data, a model is proposed .In this paper, providing more security for sensitive data is achieved by fragmenting the data and allocating the preferences to the data and only high secured data is encrypted and stored. The detailed implementation of the work is discussed clearly in the paper.

References

[1] Navathe S., Karlapalem, K. and Ra, M. “A mixed fragmentation methodology for initial distributed database design,” Journal of Computer and Software Engineering Vol. 3, No. 4 pp 395-426, 1995.

[2] Balachandra, R., Ramakrishna, P.V. and Atanu, R. “Cloud Security Issues”, In IEEE international Conference on Services Computing, pp. 517-520, 2009.

[3] Cong, W., Qian, W. and Kui R., “Ensuring Data Storage Security in Cloud Computing”, Cryptology ePrint Archive, Report, http://eprint.iacr.org/, (accessed: 18 October 2009), 2009.

[4] Katja, H. and Ralf, S. “Distributed Database Systems-Fragmentation and Allocation,” Cluster of Excellence MMCI, October 2010.

[5] Jay, H. “What you need to know about Cloud Computing Security and Compliance”, Gartner, Research, ID Number: G00168345, 2009.

[6] Dr.V. Kiran Kumar, E. Hari Prasad, "Proposed Model for Ensuring More Security in Cloud by Data Fragmentation Method", International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.391-394, 2018.

[7] Dr.V.Kiran Kumar, E. Hari Prasad, ”Analysis of security as a service in cloud computing: a Review”, International Research Journal of Management Sociology & Humanities ,Vol.8,Issue.11 ,pp:119-127, 2017 www.IRJMSH.com

[8] Fong E, Okun V (2007) Web application scanners: definitions and functions. In: Proceedings of the 40th annual Hawaii International conference on system sciences. IEEE Computer Society, Washington, DC, USA.

[9] Wu H, Ding Y, Winer C, Yao L (2010) Network Security for virtual machine in Cloud Computing. In: 5th International conference on computer sciences and convergence information technology (ICCIT). IEEE Computer Society Washington, DC, USA, pp 18–21.

[10] Reuben JS (2007) A survey on virtual machine Security. Seminar on Network Security.http://www.tml.tkk.fi/Publications/C/25/papers/Reuben_final.pdf. Technical report, Helsinki University of Technology, October 2007.

Downloads

Published

2019-01-31
CITATION
DOI: 10.26438/ijcse/v7i1.720723
Published: 2019-01-31

How to Cite

[1]
V. Kiran Kumar and E. Hari Prasad, “Implementation of Meta Data Storage using Fragmentation method for more security in the cloud”, Int. J. Comp. Sci. Eng., vol. 7, no. 1, pp. 720–723, Jan. 2019.