Abstract

Cloud computing is third party administrative control so our data is outsourced it gives rise to security concerns.security is one of the important aspect of any technology. Therefore high security measures are required to protect our data. In this paper, we propose Detaching and Reproducting of Data in a cloud for excellent performance and security that collectively approaches security issues and data sharing protectively. In this methodology, we divide the file into fragments and replicated over cloud nodes. Files are fragmented and shuffled like (1-2,2-3,3-4.4-1)in sequential order and stored in multiple servers. Moreover nodes sharing fragments are separated with certain distance by using T-colouring graph to prohibit an attacker by guessing the location of fragments. This methodology does not rely on traditional cryptography techniques.

Keywords

cloud security, fragmentation, replication, T-colouring graph, data splitting,

Downloads

Download data is not yet available.

References

  1. K. V. Vishwanath and N. Nagappan, Characterizing the cloud computing hardware reliability, in Proc. 1st ACM Symp. Cloud Comput., 2010.
  2. R. Jhawar, V. Piuri, and M. D. Santambrogio, A comprehensive conceptual system-level approach to fault tolerance in cloud computing technology, in Proc. IEEE Int. Syst. Conf., Mar. 2012.
  3. B. Grobauer, T.Walloschek, and E. Stocker, Understanding the cloud computing technology
  4. vulnerabilities, IEEE Security and Privacy, 2011, Vol.9, No. 2, pp. 50-57.
  5. W. K. Hale, Frequency assignment: Theory and applications,Proceedings of IEEE, 1980, Vol. 68, No. 12, pp. 1497-1514.
  6. K. Hashizume, D. G. Rosado, E. Fernndez-Medina, and E. B.Fernandez, An analysis of the
  7. security issues for cloud computing, Journal of Internet Services and Applications, 2013, Vol.4, No. 1, pp. 1-13.