Implementation Of Cloud Based File Management System [CFMS] For Affording Distributed Warehouse Service

D. Kesavaraja*, A. Suthan**, D. Sasireka***, D. Jeyabharathi****
* Lecturer, Department of Computer Science and Engineering, Dr. Sivanthi Aditanar College of Engineering, Tiruchendur.
** HOD, Department of Computer Applications, Dr. Sivanthi Aditanar College of Engineering, Tiruchendur.
*** Lecturer, Department of Information Technology, PSN College of Engineering and Technology, Tirunelveli.
**** Lecturer, Department of Computer Science and Engineering, Einstein College of Engineering, Tirunelveli.
Periodicity:November - January'2011
DOI : https://doi.org/10.26634/jfet.6.2.1323

Abstract

Remote web based services provide new scenarios in the emerging computing world. File access has been easy after the distributed computing scenario came into limelight. But security for the Distributed file system has been a very crucial problem to take into account. We propose a Cloud based File Management System[CFMS], so as to provide Data services in the cloud along with required security in the form of Intrusion Tolerance. We use the Model View Controller architecture, separating the business layer from the other layers thereby increasing the security of the system. Intrusion Tolerance is maintained by providing hash values and storing them in the controller, which is located separately from the cluster. These hash codes provide the required information on the attacks performed on a file, which when increases is introduced to the manual administrator of the system, thereby permitting him to increase the security still further. Load balancing and replication transparency are maintained in the system for efficient access to the files contained in the system.

Keywords

Cloud Computing,Cyber Security,Data Warehouse,Distributed Service, Vulnerability Assessment.

How to Cite this Article?

Kesavaraja, D., Suthan, A., Sasireka , D., and Jeyabharathi, D. (2011). Implementation Of Cloud Based File Management System [CFMS] For Affording Distributed Warehouse Service. i-manager’s Journal on Future Engineering and Technology, 6(2), 28-35. https://doi.org/10.26634/jfet.6.2.1323

References

[1]. Gruschka, N., and Luttenberger, N. (2006). "Protecting Web Services From DoS Attacks by SOAP Message Validation", IFIP International Federation for Information Processing, Springer Boston, Vol. 201, 171-182.
[2]. J.E. Just, J.C. Reynolds, and K. Levitt, (2002). “Intrusion tolerance through forensics-based attack learning,” in Intrusion Tolerant System Workshop, Supplemental Volume on 2002 International Conference on Dependable System and Networks, pp. C–4–1.
[3]. Organically assured and survivable information system (OASIS). http://www.tolerantsystems.org.
[4]. H. Kopetz and P. Ver´issimo, (1993). Real Time and Dependability Concepts, ch. 16, pp. 411–446. Addison- Wesley.
[5]. Reynolds, J. et al. (2001). "The Design and Implementation of an Intrusion Tolerant System”, Proceedings of the 2002 International Conference on Dependable Systems and Networks (2001) 285-290.
[6]. Stavridou, V. et al. (2002). "Intrusion Tolerant Software Architectures", DARPA Information Sur vivability Conference and Exposition (DISCEX II'01), Vol. II, pp.230- 241.
[7]. Veríssimo, P., Neves, N., and Pupo Correia, M. (2003). "Intrusion-Tolerant Architectures: Concepts and Design", Lecture Notes in Computer Science, Vol. 2677, pp.3-36.
[8]. D. O'Brien, R. Smith, T. Kappel, and C. Bitzer, (2003). “Intrusion tolerant via network layer controls,” in Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX'03), pp. 90-96.
[9]. http://en.wikipedia.org/wiki/HMAC.
[10]. http://csrc.nist.gov/publications/fips/fips198/fips- 198a.pdf.
[11]. M. Nagaratna, Dr. V. Kamakshi Prasad, S. Tanuz Kumar (n.d). ”Detecting and Preventing IP-spoofed DDoS Attacks by Encrypted Marking based Detection and Filtering (EMDAF)”, Dept. of CSE, Jawaharlal Nehru Technological University.
[12]. K. Kar, S. Sarkar, and L. Tassiulas, (2001). “Optimization based rate control for multirate multicast sessions,” in Proc. IEEE INFOCOM, pp.123-132.
[13]. S. Deb, and R. Srikant, (2001). “Congestion control for fair resource allocation in networks with multicast flows,” in Proc. IEEE Conf. Decision and Control, Dec., pp.1911-1916.
[14]. D. Kesavaraja, R. Balasubramanian and D. Sasireka (n.d). Implementation of a Cloud Data Server (CDS) for Providing Secure Service in E-Business, International Journal of Database Management Systems ( IJDMS ), (ISSN: 0975-5705).
[15]. E. Graves, R. Srikant, and D. Towsley, (2001). “Decentralized computation of weighted max-min fair bandwidth allocation in networks with multicast flows,” in Proc. Tyrrhenian Int. Workshop Digital Communications (IWDC'01), Taormina, Italy, Sept., pp.326-342.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.