首页    期刊浏览 2024年11月28日 星期四
登录注册

文章基本信息

  • 标题:Providing Cloud Security Using DROPS Technique
  • 本地全文:下载
  • 作者:Nirmale Pooja S. ; Kore Pranjali P ; Pratape Pradnya P.
  • 期刊名称:International Journal of Innovative Research in Science, Engineering and Technology
  • 印刷版ISSN:2347-6710
  • 电子版ISSN:2319-8753
  • 出版年度:2017
  • 卷号:6
  • 期号:5
  • 页码:9671
  • DOI:10.15680/IJIRSET.2017.0605303
  • 出版社:S&S Publications
  • 摘要:Outsourcing information to an outsider authoritative control, as is done in distributed computing, offersascend to security concerns. The data compromise may occur due to attacks by malicious users and nodes within thecloud. Therefore, high security systems are required to protect data within the cloud. Be that as it may, the utilizedsecurity technique should likewise consider the advancement of the information recovery time. In this paper, wepropose Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) thatcollectively approaches the security and performance issues. In the DROPS methodology, we divide a file intofragments, and then replicate the fragmented data over the cloud nodes. Each of the nodes contains only a singlefragment of a particular data file that ensures that even in case of a successful attack, no any meaningful information isdisclose to the attacker. Furthermore, the nodes storing the fragments are separated with certain distance by means ofgraph T-coloring to bar from an attacker of guessing the locations of the fragments. Moreover, the DROPSmethodology does not depend on the traditional cryptographic techniques for the data security; thereby relieving thesystem of computationally costly methodologies. We show that the eventuality to locate and compromise all of thenodes storing the fragments of a single file is extremely low. We also compare the performance of the DROPSmethodology with ten other state-of-art schemes. The higher level of security with slight performance overhead wasobserved.
  • 关键词:file fragmentation; file replication; attribute-based encryption; and outsourced key-issuing; outsourced;decryption
国家哲学社会科学文献中心版权所有