COMPREHENSIVE STUDY AND COMPARISON OF INFORMATION DISPERSAL TECHNIQUES FOR CLOUD COMPUTING
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 5
Abstract
Cloud systems refer to the collection of interconnected servers that are provisioned dynamically on demand, for execution of applications, to the customer like electricity grid. Cloud computing has gained great attention from industry but there are still many issues that are in their primitive stage which is hampering the growth of Cloud. One of the issues is security of data stored in the servers of datacenters of Cloud service providers. Many schemes have been developed till date for ensuring security of data in Distributed Systems. These schemes have been studied, analyzed and new method has been proposed which infix the parameters of security like recovery of data, confidentiality of data and integrity of data such that it ensure security of data stored in the servers of Cloud systems. The proposed scheme is based on two methods – Information Dispersal Algorithm and Fingerprinting. Information dispersal algorithm helps in maintaining confidentiality and integrity of data and Fingerprinting helps in recovery of data. Here Cloudsim simulation tool is used for simulation. CloudSim is an extensible simulation toolkit that enables modeling and simulation of Cloud computing systems and application provisioning environments.
Authors and Affiliations
Ms. Priyanka , Mr. Kapil Kumar Kaswan
Detect and prevent HELLO FLOOD Attack using Centralized technique in WSN
In wireless sensor networks, wirelessly nodes communicate with each other. WSN is a very large array of diverse sensor nodes that are interconnected by a communication network . The battery lifetime of nodes in wireless...
Requirement Engineering Research
The requirement validation is vital for every successful software development. In this process, the requirements from the users are checks and analyzed with its consistency, completeness and correctness. The validation o...
A REVIEW ON CODE COVERAGE ANALYSIS
The quality of any software predominantly depends upon the software testing. Code coverage testing is one such technique that plays an important role to achieve the software for better quality and maintenance. The code c...
Design and Comparative Analysis of CMOS Full Adder Cells Using Tanner EDA Tool
The binary adders are the fundamental and key component in digital signal processors, general purpose microprocessors and data-processing application specific integrated circuits. Therefore, binary adders are crucial bui...
Energy Efficient Techniques In Virtualized Data Center: A Survey
Energy efficiency simply means that how efficiently energy can be used or consumed by any virtualized datacenters providing cloud services. Main aim of energy efficiency is to reduce the amount of energy consumed or requ...