File Fragmentation to Improve Security in Cloud Using Graph Topology Grid Algorithm: A Survey

Authors

  • S. Abdul Saleem Associate Professor, Department of Computer Science, Jamal Mohamed College (Autonomous), Tiruchirappalli, Tamil Nadu, India
  • N. Ramya Research Scholar, Department of Computer Science, Jamal Mohamed College (Autonomous), Tiruchirappalli, Tamil Nadu, India

DOI:

https://doi.org/10.51983/ajcst-2019.8.S2.2026

Keywords:

Fragmentation, Replication, Graph Topology Grid Data Encryption, DROPS, Cloud Security

Abstract

Cloud computing is an emerging patterning that provides computing, communication and storage resources-as-service over a network. In existing system, data stored in a cloud is unsafe due to the eaves dropping and hacking process. To overcome the drawbacks of earlier approaches, Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) methodology is used. The node selection is ensured by means of Graph Topology Grid Algorithm and also data is encrypted here for security. In this process, the common data are divided into multiple nodes and replicate the fragmented data over the cloud nodes. Each data is stored in a different node as fragments in individual locations. In case of any attackers attack a node, no meaningful information will expose to them. The controlled replication of the file fragments is ensured and each of the fragments is replicated only once for the purpose of improved security and minimal retrieval time. In this survey, various relevant approaches were studied and analyzed. Furthermore the DROPS with Graph Topology Grid Algorithm give the better way of security in cloud environment over the earlier approaches.

References

A.N. Khan, M.L.M. Kiah, S.U. Khan, and S.A. Madani, "Towards Secure Mobile Cloud Computing: A Survey," Future Generation Computer Systems, Elsevier, vol. 29, no. 5, pp. 1278-1299, 2013.

D. Sun, G. Chang, L. Sun, and X. Wang, "Surveying and analyzing security, privacy and trust issues in cloud computing environments," Procedia Engineering, Elsevier, vol. 15, pp. 2852-2856, 2011.

K. Hashizume, D.G. Rosado, E. Fernández-Medina, and E.B. Fernandez, "An analysis of security issues for cloud computing," Journal of Internet Services and Applications, Springer Open, 4-5, February 2013.

Y. Tang, P.P.C. Lee, J.C.S. Lui, and R. Perlman, "Secure overlay cloud storage with access control and assured deletion," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 903-316, 2012.

A.N. Khan, M.L. Mat Kiah, S.A. Madani, and M. Ali, "Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing," The Journal of Supercomputing, vol. 66, no. 3, pp. 1687-1706, 2013.

K. Bilal, M. Manzano, S.U. Khan, E. Calle, K. Li, and A.Y. Zomaya, "On the characterization of the structural robustness of data center networks," IEEE Transactions on Cloud Computing, vol. 1, no. 1, pp. 1-10, 2013.

R. Chavan and A. Opera, "Cloud Security Solution: Fragmentation and Replication," Communication of the ACM, vol. 56, no. 2, pp. 64-73, 2013.

R. Badre, "Cloud storage with improved access control and assured deletion," International Journal of Innovations in Engineering and Technology (IJIET), vol. 3, no. 3, pp. 92-77, 2013.

S.R. Kadlag, M.C. Akewar, "An Approach for Efficient and Reliable Storage in Cloud Computing Environment," vol. 3, no. 11, 2015.

S. Suganya, R. Kalaiselvan, "An Optimization and Security of Data Replication in Cloud Using Advanced Encryption Algorithm," International Journal Of Engineering And Computer Science, vol. 5, no. 6, pp. 16836-16841, June 2016.

M. Kharde, A. Kumar, "Enhancing security and Performance by Fragmenting and Deduplication in cloud," International Journal of Engineering Development and Research (IJEDR), ISSN: 2321-9939, vol. 4, no. 2, pp. 1227-1232, 2016.

P.D. Patni, S.N. Kakarwal, "Security Enhancement of Data in Cloud using Fragmentation and Replication," International Journal of Engineering and Management Research (IJEMR), vol. 6, no. 5, pp. 492-497, 2016.

D. Boru, D. Kliazovich, F. Granelli, P. Bouvry, and A.Y. Zomaya, "Energy-efficient data replication in cloud computing datacenters," Cluster Computing, vol. 18, no. 1, pp. 385-402, 2015.

Downloads

Published

26-02-2019

How to Cite

Abdul Saleem, S., & Ramya, N. (2019). File Fragmentation to Improve Security in Cloud Using Graph Topology Grid Algorithm: A Survey. Asian Journal of Computer Science and Technology, 8(S2), 46–51. https://doi.org/10.51983/ajcst-2019.8.S2.2026