6 research outputs found

    Secure Access control Technology towards Data Sharing and Storage in Cloud Computing

    Get PDF
    Cloud computing is a type of appropriated computing wherein assets and application stages are disseminated over the Internet through on request and pay on use premise. Many cloud storage encryption schemes have been acquainted with shield data from the individuals who don't approach. We make utilization of many schemes which accepted that cloud storage providers are protected and secure. Be that as it may, by and by, a few specialists (i.e., coercers) may attempt to uncover data from the cloud without the authorization of the data proprietor. In this paper, we exhibit that the location of obscurity clients with the utilization of our productive deniable encryption conspire, while the phony clients tries to get data from the cloud they will be furnished with some phony files. With the goal that programmers can't hack the files from the cloud. Also, they are happy with their copy record by that way we can secure the proprietor mystery files or confidential files

    Fragmentation and Replication Using Drops Methodology

    Get PDF
    Cloud computing is one of the most prominent service for  remote accessing of data that practice of using a network of remote servers hosted on the internet to store, manage and process data, rather than a local server or a personal computer. For state individuality of cloud computing make it a prominent candidate for businesses, organizations, and individual users for acceptance. We cooperatively loom the issue of security and presentation as a secure data replication trouble. We present Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) that sensibly fragments user files into portions and replicates them at tactical locations within the cloud. The consequences of the reproduction exposed that the immediate meeting point on the safety and presentation, resulted in augmented security level of data escort by a minor presentation fall

    Impact Factor: 2.265 Global

    Get PDF
    ABSTRACT The third-party administrative control is done in cloud computing which gives rise to security concerns the attacks may happens by data of other users and nodes within the cloud hence, high security measures are required to protect data within the cloud. In this paper we propose (DROPS) Division and Replication of Data in the Cloud for Optimal Performance and Security that will collectivel1y approaches the security and performance issues. Here we divide a file into fragments and replicate the fragmented data over the cloud nodes. The nodes stores only a single fragment of a particular data file that ensures that even in case of a successful attack and so no meaningful information is revealed to the attacker. Furthermore, the traditional cryptographic techniques for the data security is not used by DROP which reduces cost. Then we also compare the performance of the DROPS methodology with ten other schemes for providing higher level of security

    Data storage security and privacy in cloud computing: A comprehensive survey

    Get PDF
    Cloud Computing is a form of distributed computing wherein resources and application platforms are distributed over the Internet through on demand and pay on utilization basis. Data Storage is main feature that cloud data centres are provided to the companies/organizations to preserve huge data. But still few organizations are not ready to use cloud technology due to lack of security. This paper describes the different techniques along with few security challenges, advantages and also disadvantages. It also provides the analysis of data security issues and privacy protection affairs related to cloud computing by preventing data access from unauthorized users, managing sensitive data, providing accuracy and consistency of data store

    Virtualization-aware Access Control for Multitenant Filesystems

    No full text
    Abstract-In a virtualization environment that serves multiple tenants, storage consolidation at the filesystem level is desirable because it enables data sharing, administration efficiency, and performance optimizations. The scalable deployment of filesystems in such environments is challenging due to intermediate translation layers required for networked file access or identity management. First we present several security requirements in multitenant filesystems. Then we introduce the design of the Dike authorization architecture. It combines native access control with tenant namespace isolation and compatibility to object-based filesystems. We use a public cloud to experimentally evaluate a prototype implementation of Dike that we developed. At several thousand tenants, our prototype incurs limited performance overhead up to 16%, unlike an existing solution whose multitenancy overhead approaches 84% in some cases

    Virtualization-aware access control for multitenant filesystems

    No full text
    corecore