Distributed File Sharing and Retrieval Model for Cloud Virtual Environment
Abstract
Cloud-based storage services are multiplying and are being adapted mostly for data storage. At the same time, many potential problems pertaining to data storage and security are being addressed. This research provides the architecture for splitting user data and the solution in retrieving different data chunks, stored on different cloud storages. By doing this, not only the load on a single server is reduced but security and storage are efficiently used. Data would be stored and retrieved in slices, hence the chances of data forgery are diminishing. File processing will be faster as split parts would be fetched from different clouds, enabling parallel processing.
Keywords:
cloud computing, data security, file sharing, distributed systemDownloads
References
R. M. Babu, “Secure Storage and Retrieval of Big Data on Distributed Cloud Environment”, International Journal of Applied Engineering Research, Vol. 11, No. 10, pp. 7063-7071, 2016
J. Broberg, S. Venugopal, R. Buyya, “Market-oriented grids and utility computing: the state-of-the-art and future directions”, Journal of Grid Computing, Vol. 6, No. 3, pp. 255–276, 2008 DOI: https://doi.org/10.1007/s10723-007-9095-3
J. Tang, Y. Cui, Q. Li, K. Ren, J. Liu, R. Bayya, “Ensuring Security and Privacy Preservation for Cloud Data Services”, ACM Computing Surveys, Vol. 49, No. l, Article No 13, 2016 DOI: https://doi.org/10.1145/2906153
K. Liu, L. J. Dong, “Research on Cloud Data Storage Technology and Its Architecture Implementation”, Procedia Engineering, Vol. 29, pp. 133-137, 2012 DOI: https://doi.org/10.1016/j.proeng.2011.12.682
C. P. Ram, G. Sreenivaasan, “Security as a Service (SasS): Securing user data by coprocessor and distributing the data”, Trendz in Information Sciences & Computing, Chennai, India, December 17-19, 2010 DOI: https://doi.org/10.1109/TISC.2010.5714628
T. Sivashakthi, D. N. Prabakaran, “A Survey on Storage Techniques in Cloud Computing”, International Journal of Emerging Technology and Advanced Engineering, Vol. 3, No. 12, pp. 125-128, 2013
V. Ukey, N. Mishra, “Dataset Segmentation for Cloud Computing and Securing Data Using ECC”, International Journal of Computer and Information Technologies, Vol. 5, No. 3, pp. 4210-4213, 2014
K. Gabhale, N. Jadyal, A. More, V. Bhalekar, V. V. Dakhode, “Data Partitioning Technique to Improve Cloud Data Storage Security”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, No. 3, pp. 24-26, 2016
N. M. Anuradha, G. A. Patil, “Secure and Efficient Data Retrieval in Cloud Computing”, International Journal of Engineering Research & Technology, Vol. 4, No. 4, pp. 2278-0181, 2015 DOI: https://doi.org/10.17577/IJERTV4IS041017
P. H. Atulkumar, P. A. Atulkumar, “A Review of Addressing Storage Correctness in Cloud Computing with Trusted Third-Party Auditor”, International Journal of Research in Engineering & Advanced Technology, Vol. 1, No. 2, pp. 1-4, 2013
V. Goutham, P. A.. Reddy, K. Sunitha, “K-Nearest Neighbor Classification on Data Confidentiality and, Privacy of User’s Input Queries”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, No. 7, pp. 704-708, 2016
Downloads
How to Cite
License
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.