Security of Data Fragmentation and Replication over Un-trusted Hosts Arun Kumar Yadav, Dr. Ajay Agarwal

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 1

Abstract

Data replication technique is used to avoid the fault tolerance and improve the performance .With this initiation of content delivery networks, it is becoming more and more frequent that data content is placed on hosts that are not directly controlled by the content owner, and due to this, to ensure the data integrity ,security mechanism are needed. In this paper we present a system architecture that allows arbitrary queries to be supported on data content replicated over un-trusted servers. To prevent these servers from returning incorrect answers to client, we make use of a small number of trusted hosts that randomly check these answers and take corrective action whenever required. Additionally, our system will use an audit mechanism that guarantees that any un-trusted server acting maliciously will finally be detected and excluded from the system so that the consistency can be maintained.

Authors and Affiliations

Arun Kumar Yadav , Dr. Ajay Agarwal

Keywords

Related Articles

A New Approach To Fingerprint Recognition

Fingerprint recognition continues to be the most widely used biometric system for security purposes. Still it is a complex pattern recognition problem. In this paper, a new approach for fingerprint recognition is develop...

Flood Frequency Analysis Using the Gumbel Distribution

This paper presents results of a study carried in Zimbabwe aimed at analysing the frequency of Nyanyadzi River floods using the Gumbel distribution. Extreme floods over recent years had washed away fields, destroyed infr...

Selection of a Checkpoint Interval in Coordinated Checkpointing Protocol for Fault Tolerant Open MPI

The goal of this paper is to address the selection of efficient checkpoint interval which reduces the total overhead cost due to the checkpointing and restarting of the applications in a distributed system environment....

An Overview on Intrusion Detection in Manet 

A mobile ad hoc network (MANET) is a self-configuring of mobile devices network connected without wires and hence MANET has become a very popular technology now days. A MANETS are the networks that are building, when som...

A Different Cameras Image Impulse Noise Removal Technique

Digital Cameras which capture images in directly in digital form. Digital Images are mostly often corrupted by impulse noises. It is affected by sharp & characteristics of the image signal. So the image processing sc...

Download PDF file
  • EP ID EP144925
  • DOI -
  • Views 115
  • Downloads 0

How To Cite

Arun Kumar Yadav, Dr. Ajay Agarwal (2010). Security of Data Fragmentation and Replication over Un-trusted Hosts Arun Kumar Yadav, Dr. Ajay Agarwal. International Journal on Computer Science and Engineering, 2(1), 8-13. https://europub.co.uk/articles/-A-144925