A Cloud Storage With Security Scheme Access Control and Data Replications
A Cloud Storage With Security Scheme Access Control and Data Replications
A Cloud Storage With Security Scheme Access Control and Data Replications
replications.
ABSTRACT
gives rise to security concerns. The data compromise may occur due to attacks by other users and
nodes within the cloud. Therefore, high security measures are required to protect data within the
cloud. However, the employed security strategy must also take into account the optimization of
the data retrieval time. In this paper, we propose Division and Replication of Data in the Cloud for
Optimal Performance and Security (DROPS) that collectively approaches the security and
performance issues. In the DROPS methodology, we divide a file into fragments, and replicate the
fragmented data over the cloud nodes. Each of the nodes stores only a single fragment of a
particular data file that ensures that even in case of a successful attack, no meaningful information
is revealed to the attacker. Moreover, the nodes storing the fragments are separated with certain
distance by means of graph T-coloring to prohibit an attacker of guessing the locations of the
fragments. We also compare the performance of the DROPS methodology with ten other schemes.
The higher level of security with slight performance overhead was observed.
EXISTING SYSTEM
The off-site data storage cloud utility requires users to move data in clouds virtualized and
shared environment that may result in various security concerns. Pooling and elasticity of a cloud,
allows the physical resources to be shared among many users. The data outsourced to a public
cloud must be secured. Unauthorized data access by other users and processes (whether accidental
or deliberate) must be prevented As discussed above, any weak entity can put the whole cloud at
risk. In such a scenario, the security mechanism must substantially increase an attackers effort to
retrieve a reasonable amount of data even after a successful intrusion in the cloud.
DISADVANTAGES
1. The data compromise may occur due to attacks by other users and nodes within
the cloud.
2. The employed security strategy must also take into account the optimization of
PROPOSED SYSTEM
In this paper, we collectively approach the issue of security and performance as a secure
data replication problem. We present Division and Replication of Data in the Cloud for Optimal
Performance and Security (DROPS) that judicially fragments user files into pieces and replicates
them at strategic locations within the cloud. The division of a file into fragments is performed
based on a given user criteria such that the individual fragments do not contain any meaningful
information. Each of the cloud nodes (we use the term node to represent computing, storage,
physical, and virtual machines) contains a distinct fragment to increase the data security.
ADVANTAGES
1. The implications of TCP in cast over the DROPS methodology need to be studied
2. To improve data retrieval time, the nodes are selected based on the centrality
SYSTEM ARCHITECTURE:
SYSTEM SPECIFICATION
Hardware Requirements:
Software Requirements: