An Innovative Performance of Refuge using Stowage Main Servers in Cloud Computing Equipment


  • S. Ravichandran Professor, Department of Computer Science, Annai Fathima College of Arts & Science, Madurai, Tamil Nadu, India
  • J. Sathiamoorthy Associate Professor, Department of Software Applications, Thiruthangal Nadar College, Chennai, Tamil Nadu, India



Secure Storage, Decentralized Storage System, Storage Key Server Encryption, SDL, NAS, Secure Cloud


Distributed computing has been imagined as the cutting edge engineering of IT Enterprise. It moves the application programming and information bases to the incorporated enormous server farms, where the administration of the information and administrations may not be completely dependable. There are various security issues for distributed computing as it envelops numerous innovations including networks, information bases, working frameworks, virtualization, asset planning, exchange the board, load adjusting, simultaneousness control and memory the executives. Putting away information in an outsider's cloud framework causes genuine worry over information secrecy. Hence, security issues for a large number of these frameworks and advancements are material to distributed computing. We propose a key worker encryption conspire and incorporate it with a decentralized deletion code with the end goal that a safe conveyed stockpiling key framework is defined respectively.


A. G. Dimakis, V. Prabhakaran and K. Ramchandran, “Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes,” in Proceedings of the 4th International Symposium on Information Processing in Sensor Networks-IPSN, IEEE Computer Society, pp. 111–117, 2018.

R. Bhagwan, K. Tati, Y. C. Cheng, S. Savage and G. M. Voelker, “Total recall: System support for automated availability management,” in Proceedings of the 1st Symposium on Networked Systems Design and Implementation - NSDI, pp. 337–350, USENIX, 2019.

A. Adya, W. J. Bolosky, M. Castro,G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. Wattenhofer, “Farsite: Federated, available, and reliable storage for an incompletely trusted environment,” in Proceedings of the 5th Symposium on Operating System Design and implementation–OSDI, pp. 1-14, 2017.

Z. Wilcox-O’Hearn and B. Warner, “Tahoe: the least-authority files system,” in Proceedings of the 4th ACM International Workshop on Storage Security and Survivability–Storage SS, pp. 21–26, ACM, 2017.

H. Y. Lin and W. G. Tzeng, “A secure decentralized Erasurecode for Distributed network storage,” IEEE Transactions on Parallel and Distributed Systems, Vol. 21, pp. 1586–1594, 2017.

D. R. Brownbridge, L. F. Marshall and B. Randell, “The Newcastle connection or unixes of the world unite!” Software Practice and Experience, Vol. 12, No. 12, pp. 1147–1162, 2017.

R. Sandberg, D. Goldberg, S. Kleiman, D. Walsh, and B. Lyon, “Design and implementation of the sun network file system,” 2017.

M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu,“Plutus: Scalable secure file sharing on untrusted storage, ”in Proceedings of the 2nd USENIX Conference on File and Storage Technologies-FAST, pp. 29–42, USENIX, 2018.

S. C. Rhea, P. R. Eaton, D. Geels, H. Weatherspoon, B. Y. Zhao, and J. Kubiatowicz, “Pond: The ocean store prototype,” in Proceedings of the 2nd USENIX Conference on File and Storage Technologies-FAST, pp. 1–14, USENIX, 2019.

John W. Rittinghouse, James F. Ransome, “Cloud Computing Implementation, Management, Security, CRC Press 2018 by Taylor and Francis Group, LLC.

P. Druschel and A. Rowstron, “PAST: A large–scale, persistent peer-to-peer storage utility,” in Proceedings of the 8th Workshop on Hot topics in Operating System-Hot OS VIII, pp. 75-80, USENIX, 2019.

A. Haeberlen, A. Mislove and P. Druschel, “Glacier: Highly durable, decentralized storage despite massive Symposium on Networked System Design and Implementation-NSDI, pp. 143-158, USENIX, 2018.




How to Cite

Ravichandran, S., & Sathiamoorthy, J. (2021). An Innovative Performance of Refuge using Stowage Main Servers in Cloud Computing Equipment. Asian Journal of Computer Science and Technology, 10(1), 13–17.

Most read articles by the same author(s)

1 2 > >>