Information Replication in Cloud Computing Datacenters Using Most Efficient Overall Performance and Safety

M. Saraswathi Mani*, V. Ramya**
* Research Scholar, Department of Computer Science, Government College (Autonomous), Nandanam, Chennai, India.
** Assistant Professor, Department of Computer Science, Government College (Autonomous), Nandanam, Chennai, India.
Periodicity:August - October'2016
DOI : https://doi.org/10.26634/jcc.3.4.13596

Abstract

The online records storage, a cloud utility wishes clients to move the records in cloud's virtualized and shared environment to be able to end in numerous safety issues. Pooling, a property of a cloud, permits the resources (assets) to be shared among numerous clients. Moreover, the shared assets are additionally reassigned to various users at a few occurrence of them, which can gradually end in an information compromise through data recovery methodologies. Multi-tenant virtualized surroundings could likely result in a VM to urge away the bounds of virtual tool screen (VM). The open VM can intervene with entirely different VM to get entry to unauthorized data. In addition, multi-tenant virtualized network gets right to entry for flexible data privacy and integrity. Additionally, to improve the retrieval time; the information is fragmented over the nodes. The results of the simulations explain protection and performance have resulted in increased security level of information.

Keywords

Cloud Computing, Fragmentation, T-Coloring and Replication, Security.

How to Cite this Article?

Mani. S. M., and Ramya. V. (2016). Information Replication In Cloud Computing Datacenters Using Most Efficient Overall Performance And Safety. i-manager’s Journal on Cloud Computing, 3(4), 26-33. https://doi.org/10.26634/jcc.3.4.13596

References

[1]. Ali, M., Bilal, K., Khan, S., Veeravalli, B., Li, K., & Zomaya, A. (2015). DROPS: Division and Replication of Data in the Cloud for Optimal Performance and Security. IEEE Transactions on Cloud Computing.
[2]. Juels, A., & Oprea, A. (2013). New approaches to security and availability for cloud data. Communications of the ACM, 56(2), 64-73.
[3]. Kappes, G., Hatzieleftheriou, A., & Anastasiadis, S. V. (2013). Dike: Virtualization-aware Access Control for Multitenant Filesystems. Technical Report No. DCS2013- 1, University of Ioannina, Greece.
[4]. Khan, A. N., Kiah, M. M., Khan, S. U., & Madani, S. A. (2013). Towards secure mobile cloud computing: A survey. Future Generation Computer Systems, 29(5), 1278-1299.
[5]. Khan, A. N., Kiah, M. M., Madani, S. A., & Ali, M. (2013). Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. The Journal of Supercomputing, 66(3), 1687- 1706.
[6]. Khan, S.U., & Ahmad, I. (2008). Comparison and analysis of ten static heuristics-based Internet data replication techniques. Journal of Parallel and Distributed Computing, 68(2), 113-136.
[8]. Qiu, L., Padmanabhan, V. N., & Voelker, G. M. (2001). On the placement of web server replicas. In INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE (Vol. 3, pp. 1587-1596). IEEE.
[9]. Sun, D., Chang, G., Sun, L., & Wang, X. (2011). Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Engineering, 15, 2852-2856.
[10]. Wylie, J.J. (2001). Selecting the right data distribution scheme for a survivable storage system. Technical Report CMU-CS-01-120, Carnegie Mellon University, May 2001.
[11]. Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583-592.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.