Open Access   Article Go Back

Implementation of Meta Data Storage using Fragmentation method for more security in the cloud

V. Kiran Kumar1 , E. Hari Prasad2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-1 , Page no. 720-723, Jan-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i1.720723

Online published on Jan 31, 2019

Copyright © V. Kiran Kumar, E. Hari Prasad . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: V. Kiran Kumar, E. Hari Prasad, “Implementation of Meta Data Storage using Fragmentation method for more security in the cloud,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.720-723, 2019.

MLA Style Citation: V. Kiran Kumar, E. Hari Prasad "Implementation of Meta Data Storage using Fragmentation method for more security in the cloud." International Journal of Computer Sciences and Engineering 7.1 (2019): 720-723.

APA Style Citation: V. Kiran Kumar, E. Hari Prasad, (2019). Implementation of Meta Data Storage using Fragmentation method for more security in the cloud. International Journal of Computer Sciences and Engineering, 7(1), 720-723.

BibTex Style Citation:
@article{Kumar_2019,
author = {V. Kiran Kumar, E. Hari Prasad},
title = {Implementation of Meta Data Storage using Fragmentation method for more security in the cloud},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {720-723},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3572},
doi = {https://doi.org/10.26438/ijcse/v7i1.720723}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.720723}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3572
TI - Implementation of Meta Data Storage using Fragmentation method for more security in the cloud
T2 - International Journal of Computer Sciences and Engineering
AU - V. Kiran Kumar, E. Hari Prasad
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 720-723
IS - 1
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
408 269 downloads 155 downloads
  
  
           

Abstract

Cloud Computing has wide range of opportunities for research and industry purpose. There are many issues to consider in cloud. The one of the main issue in cloud is Security. Protecting more secured data in cloud is a big task. To achieve more security for a sensitive data, a model is proposed .In this paper, providing more security for sensitive data is achieved by fragmenting the data and allocating the preferences to the data and only high secured data is encrypted and stored. The detailed implementation of the work is discussed clearly in the paper

Key-Words / Index Term

sensitive data, fragmentation, Public Data Segment (PDS), Sensitive Data Segment (SDS)

References

[1]. Navathe S., Karlapalem, K. and Ra, M. “A mixed fragmentation methodology for initial distributed database design,” Journal of Computer and Software Engineering Vol. 3, No. 4 pp 395-426, 1995.
[2]. Balachandra, R., Ramakrishna, P.V. and Atanu, R. “Cloud Security Issues”, In IEEE international Conference on Services Computing, pp. 517-520, 2009.
[3]. Cong, W., Qian, W. and Kui R., “Ensuring Data Storage Security in Cloud Computing”, Cryptology ePrint Archive, Report, http://eprint.iacr.org/, (accessed: 18 October 2009), 2009.
[4]. Katja, H. and Ralf, S. “Distributed Database Systems-Fragmentation and Allocation,” Cluster of Excellence MMCI, October 2010.
[5]. Jay, H. “What you need to know about Cloud Computing Security and Compliance”, Gartner, Research, ID Number: G00168345, 2009.
[6]. Dr.V. Kiran Kumar, E. Hari Prasad, "Proposed Model for Ensuring More Security in Cloud by Data Fragmentation Method", International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.391-394, 2018.
[7]. Dr.V.Kiran Kumar, E. Hari Prasad, ”Analysis of security as a service in cloud computing: a Review”, International Research Journal of Management Sociology & Humanities ,Vol.8,Issue.11 ,pp:119-127, 2017 www.IRJMSH.com
[8]. Fong E, Okun V (2007) Web application scanners: definitions and functions. In: Proceedings of the 40th annual Hawaii International conference on system sciences. IEEE Computer Society, Washington, DC, USA.
[9]. Wu H, Ding Y, Winer C, Yao L (2010) Network Security for virtual machine in Cloud Computing. In: 5th International conference on computer sciences and convergence information technology (ICCIT). IEEE Computer Society Washington, DC, USA, pp 18–21.
[10]. Reuben JS (2007) A survey on virtual machine Security. Seminar on Network Security.http://www.tml.tkk.fi/Publications/C/25/papers/Reuben_final.pdf. Technical report, Helsinki University of Technology, October 2007