COMPREHENSIVE STUDY AND COMPARISON OF INFORMATION DISPERSAL TECHNIQUES FOR CLOUD COMPUTING
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 5
Abstract
Cloud systems refer to the collection of interconnected servers that are provisioned dynamically on demand, for execution of applications, to the customer like electricity grid. Cloud computing has gained great attention from industry but there are still many issues that are in their primitive stage which is hampering the growth of Cloud. One of the issues is security of data stored in the servers of datacenters of Cloud service providers. Many schemes have been developed till date for ensuring security of data in Distributed Systems. These schemes have been studied, analyzed and new method has been proposed which infix the parameters of security like recovery of data, confidentiality of data and integrity of data such that it ensure security of data stored in the servers of Cloud systems. The proposed scheme is based on two methods – Information Dispersal Algorithm and Fingerprinting. Information dispersal algorithm helps in maintaining confidentiality and integrity of data and Fingerprinting helps in recovery of data. Here Cloudsim simulation tool is used for simulation. CloudSim is an extensible simulation toolkit that enables modeling and simulation of Cloud computing systems and application provisioning environments.
Authors and Affiliations
Ms. Priyanka , Mr. Kapil Kumar Kaswan
Secret Detection of Sensitive Data Leakage
Surveys from many years have shown that many data leakages has been found due different problems like malicious attacks, hacking, different attacks. Approximately 28% of all data leakages are due to human mistakes which...
Performance Evaluation of BST Multicasting Network over ICMP Ping Flood for DDoS
The Paper evaluates the performance of Bi-directional Shared Tree (BST) multicasting network with two sources and four receivers, attacked by five attackers. These attackers attack the source 1 in network by ICMP Ping Fl...
Discrete & Continuous Mouse Motion Using Vocal & Non Vocal Characteristics of Human Voice.
Mouse control today has become an important tool to interact with computers. It is quite easy for those who are physically fit and mentally sound, but for those who are suffering from physical disabilities, It is quite d...
Refined Markov clustering Algorithm for Mycobacterium Tuberculosis Protein Sequence analysis
Clustering of proteins is an essential as it helps to infer biological function of a new sequence. In this paper, the protein sequences of Mycobacterium Tuberculosis have been clustered based on its space group using Ref...
Remote Wireless Automation and Monitoring of Large Farm using wireless sensors networks and Internet
The work includes designing and programming a control panel to watch and control the network by using LabView program which views changes values of the farm as well as the real values required for controlling max. and mi...