An Innovative Performance of Refuge using Stowage Main Servers in Cloud Computing Equipment
Keywords:Secure Storage, Decentralized Storage System, Storage Key Server Encryption, SDL, NAS, Secure Cloud
Distributed computing has been imagined as the cutting edge engineering of IT Enterprise. It moves the application programming and information bases to the incorporated enormous server farms, where the administration of the information and administrations may not be completely dependable. There are various security issues for distributed computing as it envelops numerous innovations including networks, information bases, working frameworks, virtualization, asset planning, exchange the board, load adjusting, simultaneousness control and memory the executives. Putting away information in an outsider's cloud framework causes genuine worry over information secrecy. Hence, security issues for a large number of these frameworks and advancements are material to distributed computing. We propose a key worker encryption conspire and incorporate it with a decentralized deletion code with the end goal that a safe conveyed stockpiling key framework is defined respectively.
A. G. Dimakis, V. Prabhakaran and K. Ramchandran, “Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes,” in Proceedingsofthe4th International Symposium on Information Processing in Sensor Networks-IPSN, IEEE Computer Society, pp. 111–117, 2018.
R. Bhagwan, K. Tati, Y. C. Cheng, S. Savage and G. M. Voelker, “Total recall: System support for automated availability management,” in Proceedings ofthe1st Symposium on Networked Systems Design and Implementation - NSDI, pp.337–350, USENIX, 2019.
A. Adya, W. J. Bolosky, M. Castro,G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. Wattenhofer, “Farsite: Federated, available, and reliable storage for an incompletely trusted environment,” in Proceedings of the 5th Symposium on Operating System Design and implementation–OSDI, pp. 1-14, 2017.
Z. Wilcox-O’Hearn and B. Warner, “Tahoe: the least-authority files system,” in Proceedingsofthe4th ACM International Workshop on Storage Security and Survivability–Storage SS, pp. 21–26, ACM, 2017.
H. Y. Lin and W. G. Tzeng, “A secure decentralized Erasurecode for Distributed network storage,” IEEE Transactions on Parallel and Distributed Systems, Vol. 21, pp.1586–1594, 2017.
D. R. Brownbridge, L. F. Marshall and B. Randell, “The New castle connection or unixes of the world unite!” Software Practice and Experience, Vol. 12, No. 12, pp. 1147–1162, 2017.
R. Sandberg, D. Goldberg, S. Kleiman, D. Walsh, and B. Lyon, “Design and implementation of the sun network file system,” 2017.
M. Kallahalla, E. Riedel, R. Swaminathan, Q.Wang, and K. Fu,“Plutus: Scalable secure files haring on untrusted storage, ”in Proceedings of the 2ndUSENIX Conference on File and Storage Technologies-FAST, pp. 29–42, USENIX, 2018.
S. C. Rhea, P. R. Eaton, D.Geels, H. Weatherspoon, B. Y. Zhao, and J. Kubiatowicz, “Pond: The ocean store prototype,” in Proceedings of the 2nd USENIX Conference on File and Storage Technologies-FAST, pp.1–14, USENIX, 2019.
John W. Rittinghouse, James F. Ransome, “Cloud Computing Implementation, Management, Security, CRCPress2018by Taylor and Francis Group, LLC.
P. Druschel and A. Rowstron, “PAST: A large–scale, persistent peer-toper storage utility,” in preceeding of the 8th Workshop on Hot topics in Operating System-Hot OS VIII pp.75-80, USENIX, 2019.
A. Haeberlen, A. Mislove and P. Druschel, “Glacier: Highly durable, decentralized storage despite massive Symposium on Networked System Design and Implementation-NSDI, pp. 143-158, USENIX, 2018.
How to Cite
Copyright (c) 2021 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.