DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security

0
907
DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security

DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security

Abstract

We divide a file into fragments in the DROPS methodology and replicate the fragmented data over the cloud nodes. Each of the nodes only stores a single fragment of a particular data file that ensures that no meaningful information is revealed to the attacker even in the event of a successful attack. DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security In addition, the nodes that store the fragments are separated by graph T-coloring at a certain distance to prevent an attacker from guessing the fragments ‘ locations.

Introduction

DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security is one of the most essential linear perspectives among those forbidding Kuki fare reception of distributed calculation. Distributed adaptability calculations accompany expanded security business concerns. For a cloud to be secure, the majority of participating substances must be secure. With numerous units of measurement, the largest sum of organization security is equal to the security level of the weakest element in any given framework.

In this paper as a safe return of information replication, we approach the security and execution issue by and large. In the Cloud for Optimal Performance and Security System (DROPS), we introduce Data Division and Replication.

System Configuration

H/W System Configuration
Speed                   : 1.1 GHz
RAM                      : 256 MB(min)
Hard Disk              : 20 GB
Floppy Drive          : 1.44 MB
Key Board             : Standard Windows Keyboard
Mouse                  : Two or Three Button Mouse
Monitor                : SVGA
S/W System Configuration

Platform                     :  cloud computing

Operating system       : Windows Xp,7,
Server                       : WAMP/Apache
Working on                : Browser Like Firefox, IE

 

Conclusion

Cloud computing growth increases certificate displeasure due to its core technology. Thus, by using three techniques, Graphical Password Authentication, Fragmentation and Echo, this organization provides a better answer to achieve security as well as public presentation. Nowadays, the use of Graphical Password Authentication increases as it is very easy to remember and secure compared to alphanumeric method acting. Fragmentation used to protect data from time disaster unity.