Implementation of Meta Data Storage using Fragmentation method for more security in the cloud
DOI:
https://doi.org/10.26438/ijcse/v7i1.720723Keywords:
sensitive data, fragmentation, Public Data Segment (PDS), Sensitive Data Segment (SDS)Abstract
Cloud Computing has wide range of opportunities for research and industry purpose. There are many issues to consider in cloud. The one of the main issue in cloud is Security. Protecting more secured data in cloud is a big task. To achieve more security for a sensitive data, a model is proposed .In this paper, providing more security for sensitive data is achieved by fragmenting the data and allocating the preferences to the data and only high secured data is encrypted and stored. The detailed implementation of the work is discussed clearly in the paper.
References
[1] Navathe S., Karlapalem, K. and Ra, M. “A mixed fragmentation methodology for initial distributed database design,” Journal of Computer and Software Engineering Vol. 3, No. 4 pp 395-426, 1995.
[2] Balachandra, R., Ramakrishna, P.V. and Atanu, R. “Cloud Security Issues”, In IEEE international Conference on Services Computing, pp. 517-520, 2009.
[3] Cong, W., Qian, W. and Kui R., “Ensuring Data Storage Security in Cloud Computing”, Cryptology ePrint Archive, Report, http://eprint.iacr.org/, (accessed: 18 October 2009), 2009.
[4] Katja, H. and Ralf, S. “Distributed Database Systems-Fragmentation and Allocation,” Cluster of Excellence MMCI, October 2010.
[5] Jay, H. “What you need to know about Cloud Computing Security and Compliance”, Gartner, Research, ID Number: G00168345, 2009.
[6] Dr.V. Kiran Kumar, E. Hari Prasad, "Proposed Model for Ensuring More Security in Cloud by Data Fragmentation Method", International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.391-394, 2018.
[7] Dr.V.Kiran Kumar, E. Hari Prasad, ”Analysis of security as a service in cloud computing: a Review”, International Research Journal of Management Sociology & Humanities ,Vol.8,Issue.11 ,pp:119-127, 2017 www.IRJMSH.com
[8] Fong E, Okun V (2007) Web application scanners: definitions and functions. In: Proceedings of the 40th annual Hawaii International conference on system sciences. IEEE Computer Society, Washington, DC, USA.
[9] Wu H, Ding Y, Winer C, Yao L (2010) Network Security for virtual machine in Cloud Computing. In: 5th International conference on computer sciences and convergence information technology (ICCIT). IEEE Computer Society Washington, DC, USA, pp 18–21.
[10] Reuben JS (2007) A survey on virtual machine Security. Seminar on Network Security.http://www.tml.tkk.fi/Publications/C/25/papers/Reuben_final.pdf. Technical report, Helsinki University of Technology, October 2007.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
