Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Information Secure Over Unauthorized Attack In Cloud Environment

Author : J. Rajiv Kumar 1 S. Revathi 2 N. Sneha 3 K. Umamaheshwari 4

Date of Publication :14th March 2018

Abstract: Cloud computing is a platform to provide different services to the cloud users. User shared the sensitive data over the cloud which gives rise to security issues in cloud computing. So, to protect user’s data a secure methodology fragmentation and replication of data is used in this paper. The data is fragmented into pieces and then replicate them over the cloud nodes for maintaining the availability, performance level and backing up the data. T-coloring term is used here which is not giving any idea about locations of the fragments to an attacker. T-coloring method is used to assign the fragments and their replicas to improve the security. Three fish encryption algorithm used to provide high security. Data owner can use their secret key for encrypt the data. Then the files are in ciphertext form. These files are decrypted by the same key that is used for encryption on the receiver end. This system mainly focuses on the data and authentication system with good performance

Reference :

    1. Mazharali, Kashif Bilal, Samee U. Khan, BharadwajVeeravalli, Keqin Li, Albert Y. Zomaya ―DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security‖ DOI 10.1109/TCC.2015.2400460, IEEE Transactions on Cloud computing
    2. P. Mell and T. Grance, Draft NIST working definition of cloud computing
    3. Jun Feng, Yu Chen, Wei-Shinn Ku, Zhou Su ―DDOG: Securing Sensitive Data in Distributed Storage Space by Data Division and Out of- order key stream Generation‖ IEEE Communications Society subject matter experts for publication in the IEEE ICC 2010 proceeding.
    4. Alessandro Mei, Luigi V. Mancini, and SushilJajodia ―Secure Dynamic Fragment and Replica Allocation in Large- Scale Distributed File Systems‖ IEEE transactions on parallel and distributed systems, vol. 14, no. 9, September 2003.
    5. Parakh A, and Kak S (2009). Online data storage using implicit security, Information Sciences, vol 179(19), 3323–3331.
    6. CongWang, Sherman S.-M. Chow, QianWang, KuiRenandWenjing Lou Privacy-Preserving Public Auditing for Secure Cloud Storage IEEE paper to support US National Science Foundation under grant CNS0831963, CNS- 0626601, CNS-0716306, and CNS0831628. 
    7. D.H. Patil Rakesh R. Bhavsar and Akshay S. Thorve Data Security over Cloud Emerging Trends in Computer Science and Information Technology 2012 (ETCSIT2012) Proceedings published in International Journal of Computer Applications (IJCA). J. Cryptology, vol. 21,no. 4, pp. 469-491, 2008.
    8. A. Mei, L. V. Mancini, and S. Jajodia, Secure dynamic fragment and replica allocation in large-scale distributed file systems, IEEE Transactions on Parallel and Distributed Systems, Vol. 14, No. 9, 2003, pp. 885- 896.

Recent Article