A Novel Approach to an Multi-Cloud Data Hosting for Protection Optimization and Security

Authors

  • Routh Sravani M.Tech Scholor, Dept.of Computer Science & Engineering, Mallineni Lakshmaiah Womens Engineering College, Guntur, Andhra Pradesh, India 
  • G. Ramaswamy Head of the Department, Dept.of Computer Science & Engineering, Mallineni Lakshmaiah Womens Engineering College, Guntur, Andhra Pradesh, India 

DOI:

https://doi.org/10.53555/cse.v3i6.158

Keywords:

two key, CHARM, T-shading, PC

Abstract

Numerous associations and ventures stores information into the cloud to diminish upkeep cost and urthermore to expand unwavering quality of information. While facilitating their information into cloud, client faces many cloud merchants and in addition their evaluating approaches so that the client may get mistaken for which cloud(s) are reasonable for putting away information. CHARM propose an information facilitating plan which consolidate two key capacities initially capacity is choosing a cloud to store information in least cost and ensured accessibility and second is activating move procedure to re-appropriate information. It can do as per evaluating of mists and varieties of information examples. While sending information to Third-Party regulatory control in cloud, it additionally turns into an issue identified with security. We require high safety efforts to ensure information in a cloud so we utilize DROPs idea that settles security and execution issue. In this we isolate information into parts and imitate that pieces into cloud hubs and every hub contain just a solitary information. Every one of these hubs are isolated with a specific separation utilizing diagram T-shading.  Utilizing this security and execution streamlining is finished. 

Downloads

Download data is not yet available.

References

Z. Li, C. Jin, T. Xu, C.Wilson, Y. Liu, L. Cheng, Y. Liu, Y. Dai, and Z.-L. Zhang, “Towards network-level efficiency for cloud storage services,” in Proceedings of the 2014 Conference on Internet Measurement Conference, pp. 115–128, ACM, 2014.

A. Li, X. Yang, S. Kandula, and M. Zhang, “Cloudcmp: comparing public cloud providers,” in Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, pp. 1–14, ACM, 2010.

A. Mei, L. V. Mancini, and S. Jajodia, “Secure dynamic fragment and replica allocation in largescale distributed file systems,” Parallel and Distributed

D. Boru, D. Kliazovich, F. Granelli, P. Bouvry, and A.Zomaya, “Energyefficient data replication in cloud computing datacenters,” in Globecom Workshops (GC Wkshps), 2013 IEEE, pp. 446–451, IEEE, 2013.

C. M. M. Erin Allen, “Library of Congress and DuraCloud Launch Pilot Program Using Cloud Technologies to Test Perpetual Access to DigitalContent,” The Library of Congress, News.

M. Dijk, A. Juels, ”On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud computing”,HotSec 2010.

P. F. Oliveira, L. Lima, T. T. V. Vinhoza, J. Barros, M. Medard ”Trusted storage over untrusted networks”,IEEE GLOBECOM 2010.

Jun Li and Baochun Li – “Erausre Coding For Cloud Storage Systems”.

M. Pitkanen, R. Moussa, M. Swany, and T. Niemi, “Erasure Codes for Increasing the Availability of Grid Data Storage,” in AICTICIW. IEEE, 2006.

H. B. Ribeiro and E. Anceaume, “Datacube: A P2P Persistent Data Storage Architecture Based on Hybrid Redundancy Schema,” in PDP. IEEE, 2010.

A. Duminuco and E. W. Biersack, “Hierarchical Codes: A Flexible Trade-off for Erasure Codes in Peer-to Peer Storage Systems,” Peerto- Peer Networking and Applications, vol. 3, no. 1, pp.52–66, 2010. [12]W. Lin, D.Chiu, and Y. Lee, “Erasure Code Gopalan, J. Li, and S. Yekhanin, “Erasure

C. Huang, H. Simitci, Y. Xu, A. Ogus, B. Calder, P.coding in windows azure storage,” in Proc. USENIX Annu. Tech. Conf., 2012.

H. V. Madhyastha, J. C. McCullough, G. Porter, R. Kapoor, S. Savage, A. C. Snoeren, and A. Vahdat, “scc: Cluster storage provisioning informed by application characteristics and SLAs,” in Proc. USENIX Conf. File, Stroage Technol., 2012.

A. Bessani, M. Correia, B. Quaresma, F. Andre, and P. Sousa, “DepSky: Dependable and secure storage in a cloud-of-clouds,” in Proc. 6th Conf. Comput. Syst., 2013, pp. 31–46.

H. B. Ribeiro and E. Anceaume, “Datacube: A P2P persistent data storage architecture based on hybrid redundancy schema,” in Proc. 18th Euromicro Int. Conf. Parallel, Distrib. Netw.-Based Process., 2010, pp. 302–306.

Downloads

Published

2017-06-30

How to Cite

Sravani, R., & Ramaswamy, G. (2017). A Novel Approach to an Multi-Cloud Data Hosting for Protection Optimization and Security. International Journal For Research In Advanced Computer Science And Engineering, 3(6), 12–17. https://doi.org/10.53555/cse.v3i6.158