SlideShare a Scribd company logo
1 of 6
Download to read offline
Computer Science and Information Technologies
Vol. 1, No. 2, July 2020, pp. 78~83
ISSN: 2722-3221, DOI: 10.11591/csit.v1i2.p78-83  78
Journal homepage: http://iaesprime.com/index.php/csit
High security mechanism: fragmentation and replication in the
cloud with auto update in the system
Shrutika Khobragade, Rohini Bhosale, Rahul Jiwane
Department of Computer Engineering, Mumbai University, Pillai HOC College of Engineering and Technology, India
Article Info ABSTRACT
Article history:
Received Jan 22, 2020
Revised May 10, 2020
Accepted May 25, 2020
Cloud computing makes immense use of internet to store a huge amount of
data. Cloud computing provides high quality service with low cost and
scalability with less requirement of hardware and software management.
Security plays a vital role in cloud as data is handled by third party hence
security is the biggest concern to matter. This proposed mechanism focuses on
the security issues on the cloud. As the file is stored at a particular location
which might get affected due to attack and will lost the data. So, in this
proposed work instead of storing a complete file at a particular location, the
file is divided into fragments and each fragment is stored at various locations.
Fragments are more secured by providing the hash key to each fragment. This
mechanism will not reveal all the information regarding a particular file even
after successful attack. Here, the replication of fragments is also generated
with strong authentication process using key generation. The auto update of a
fragment or any file is also done here. The concept of auto update of files is
done where a file or a fragment can be updated online. Instead of downloading
the whole file, a fragment can be downloaded to update. More time is saved
using this methodology.
Keywords:
Auto update mechanism
Cloud security
File fragmentation
File replication
Version control
This is an open access article under the CC BY-SA license.
Corresponding Author:
Rahul Jiwane
Department of Computer Engineering
Mumbai University
Pillai HOC College of Engineering and Technology, Rasayani, Dist. Raigad, Maharashtra, India
Email: rjiwane@mes.ac.in
1. INTRODUCTION
Cloud computing encloses more use of networking sites and other forms of interpersonal computing.
However, there are a large amount of resources on cloud storage, data or software applications which have
been accessed online. It plays an important role in the privacy and security of the data. As cloud computing is
a flexible, cost- effective and authenticated delivery platform for providing business consumer IT services on
the internet. Cloud computing presents an added level of risk as essential services are often outsourced to a
third party, which makes it difficult to maintain data security and privacy, demonstrate consent and also support
data and service availability. The cloud computing paradigm has reformed the control and management of the
information technology infrastructure [1]. Cloud computing is characterized by on-demand self-services,
resource pooling, elasticity, ubiquitous network accesses and measured assurance of the services [2], [3].
However, the benefits of imperceptible management (from user’s perspective), low cost, easy access and
greater resilience come with increased security concerns which have to be taken care of.
Erstwhile, computer software was not written with security in mind but because of the increasing
frequency and sophistication of malicious attacks against information systems, modern software design
methodologies include security as a primary objective. With cloud computing systems seeking to meet multiple
Comput. Sci. Inf. Technol. 
High security mechanism: fragmentation and replication in the cloud with … (Shrutika Khobragade)
79
objectives, such as cost, performance, reliability, maintainability, and security, trade-offs have to be made. Any
cloud server is vulnerable to an attacker with unlimited time and physical access to the server. Additionally,
physical problems could cause the server to have down time. This would be a loss of availability, which is one
of the key principles of the security triad confidentiality, integrity, and availability (CIA).
The data which is outsourced to a public cloud must be secured. Unauthorized data access by other
users and different processes (can be accidental or deliberate) should be prevented [4]. As stated above, any
weak entity may lead the whole cloud at risk. In such a framework, the security mechanism should significantly
increase a hacker’s effort to retrieve a probable amount of data which may get lost even after a successful
intrusion or attack in the cloud. Moreover, the reasonable amount of loss (due to data leakage) must also be
minimized. Mei et al. [5] says that the scheme of fragmentation and replication to allocate files over multiple
servers can lead to any attack as the files will be stored at the particular location. Juels and Opera [6] presented
a technique called as Iris file system which ensures the freshness, integrity and availability of data in a cloud.
Kappes et al. [7] where the deliberate attack of censorious information in case of improper sanitization cannot
be handled. It stores the file based on blocks which may lead to an improper sanitization.
The outsourced environment where the use of a trusted third party provides the security services in
the cloud is advocated in addressing cloud computing security issues [2]. They used the public key
infrastructure (PKI) to enhance the trustworthiness in the authentication, integrity and confidentiality of data.
At the user level, the use of tamper-proof devices, such as smart cards was used as the storage of the keys.
Tang et al. [8] have utilized the public key cryptography and trusted third party for providing data security in
cloud environments. However, the author has not used the PKI infrastructure to reduce the overheads. The
system needs to be more secure and should be accessed by only authorized person. The data stored in the cloud
need to secure as well as proper encryption keys have to be used for the verification of file which is stored in
it.
2. PROPOSED SYSTEM MODEL
A new proposed model ensures the security of the data which is stored on the cloud. This system
provides the better solution to increase the security as well as performance level. The cloud security increases
by the control of third-party administrative control. The data which needs to be secured is in the form of files.
Diverse amount of files are stored on cloud so here a particular file is uploaded and then fragmentation process
is done. Each fragment of that file is secured with hash key which is generated randomly. Fragments are
generated based on equal size and each fragment of that particular file is placed at a different location. Here
controlled replication is maintained where each fragment is replicated only once to improve the security. When
an attacker/ hacker hacks that specified file, he will not reveal all the information of that file. Various attacks
such as data recovery, cross VM attack, improper media sanitization, VM escape can be handled by this
methodology. In this proposed system, a file is uploaded on the cloud which needs to be secured as it is third
party outsourced data. A file is generally stored on a cloud at a particular location which is not secured as any
attacker can easily access or attack that particular file and get the information using various malicious attack
or intrusion. So instead of storing a single file at a particular location, a file is fragmented according to the size
and placed at the different location so that if any attacker access to that particular file it will not reveal all the
information of that whole file. Security is the major concern where a file must be purely secured, so to maintain
this, each key is used for different fragment of a single file. Replica of file is also maintained to get availability
of lost file or old files.
2.1. Design goals of cloud computing
Design goals of cloud computing are stated to provides good authentication system which allows only
authorized users to login and process. Improves security as well as improves the performance. Fragmentation
of file is created to and each fragment is stored at different location. Controlled replication is developed to
decrease the chance of data loss, increases the performance, availability and reliability. To provide a file to the
client whenever there will be run time error in network.
As illustrated in Figure 1, in the design, first registration process is done by giving the information
about the user. Authorized user will login to the system. Proposed system provides best way for the secured
files which is very susceptible for attacks. User needs to upload the file on the system by providing file id and
file name. The uploaded file gets fragmented in such a way that fragments do not include any meaningful
information as a particular if fragmented and each fragment needs its own encryption key. Fragmentation is
done by using the equal size of file and if not of equal size then remaining bytes of file is stored at the next
fragment. This helps to keep away the attacker from finding the location of each fragment as each fragment is
stored at different location. Here each key is generated for each fragment from the content of the file so that an
attacker will not get the data of each fragment. Fragments will be placed at different nodes as it will be difficult
 ISSN: 2722-3221
Comput. Sci. Inf. Technol., Vol. 1, No. 2, July 2020: 78 – 83
80
for the attacker to access on single file. After the fragmentation process that fragments get replicated on
different nodes in such a way that the access time will be low which also increases the performance. Proposed
system provides the controlled replication which is required to manage the ideal performance and more
security.
Figure 1. Proposed architecture
3. PROPOSED SYSTEM TECHNIQUE
The steps of algorithm are as follows:
3.1. Fragment placement
The initial step is select the file foe fragment. Select the particular file which needs to be fragmented.
The file gets fragmented based on the size. Each fragment is stored at the different location i.e. on different
nodes. Repeat the process until all fragments assign to the node. File size should be more than 20 KB.
3.2. General flow algorithm
S = {I, P, R, O}
Where,
I is set of initial input to the system.
I = {i1, i2, i3}
i1 = File given by the user.
i2 = Download request from user.
i3 = Download request from client.
P is set of procedure or function or processes or methods.
P = {p1, p2, p3, p4, p5, p6, p7, p8}
p1 = Registration and authentication.
p2 = Uploading a file on cloud server.
p3 = Fragmentation of file with separate hash key for each fragment received from user.
p4 = Replication of that file.
p5 = Download request from user.
p6 = Download request from client.
p7 = Collection and reassemble of fragments.
p8 = Downloading the original file.
R is a set of rules or constraints.
R= {r1}
r1 = File accessed from Replication.
O is a set of outputs.
O = {o1}
o1 = Downloading the original file.
Comput. Sci. Inf. Technol. 
High security mechanism: fragmentation and replication in the cloud with … (Shrutika Khobragade)
81
3.3. Use of rijndael algorithm
Rijndael encryption algorithm proposes a new encryption technique for encryption and decryption
purpose. It is advanced AES algorithm is used to encrypt sensitive information. It is symmetric key encryption
algorithm to be used to encrypt information. It is the best combination of security, performance, efficiency,
easy implementation and flexibility, high speed and versatility across a variety of platforms. Run efficiently on
large computers, desktops and small devices like smart cards. The block and key can in fact be chosen
independently from 128, 160, 192, 224, 256 bits. Rijndael is simple to implement and uses very little system
memory.
3.4. Use of SHA-512 algorithm
We are using SHA-512 algorithm for performing hashing task. Secure hash algorithm (SHA). The
United States national security agency is designed hashing algorithm.SHA-512 is faster than SHA-256 on
64-bit machines is that has less rounds per byte (80 rounds for 128-byte blocks) compared to SHA-256 (64
rounds for 64 byte blocks), However, storing a SHA-512 bit hash is expensive. The SHA-512 time to generate
the hash value and the number of cycles per bytes are efficient comparing to the others. In SHA-512, the
number of cycles per bytes somewhat more compared to other hashing functions, but at the same time the time
to generate the hashing value is much smaller than others. So the SHA-512 hash function is efficient and also
secure hashing algorithm.
3.5. Use of random key generation algorithm
Random Key generation generates random values. It is used for encryption and decryption purpose.
Here the keys are randomly generated using a random number of generator or pseudorandom number generator
that produces random data. In our system random number key generation is used at the time of downloading
data for the user. It makes much harder for a hacker or attacker to guess the key.
3.6. Properties of proposed system
Properties of proposed system are follows:
 Uses the one time password verification scheme.
 Privacy of data is maintained from third party organization.
 Files are divided into fragments and stored at the various locations.
 Key generation is done for each fragment.
 Best encryption algorithm used.
 Version control is used for retrieving old files.
 Auto update and auto replicate of files are done.
 Controlled replication for immense security.
 Implementation of real cloud.
There are different modules of system as shown in Figure 2. They are as follows:
Upload: This module consist of uploading the file on the cloud. When the file is uploaded, a file id is
generated for each new file. Then the name to that file can be given by the user which is unique.
Edit: This module is for editing of the particular fragment of a file. The details of all the uploaded files
are shown in this table. When any file is uploaded it is divided into various fragments and encrypted
and later stored in various nodes. And each fragment has its hash value which is sent to the users
email id during registration. To edit we need to select any fragment and edit that file, but to retrieve
that content hash value has to be entered.
Edit full file: This module consist of the update of whole file. Here we can upload the updated file and
rename the file as new file. The old file is stored in as a backup.
Download: This module is used for downloading the file which is in the encrypted form. A single
fragment can be downloaded or a single fragment too. When we download the data using authorized
key it is first decrypted and then the fragments are combined from various nodes used and the file
is presented in its original form. This is the procedure which is implemented to upload the file then
fragmentation, replication and download of original file is done.
 ISSN: 2722-3221
Comput. Sci. Inf. Technol., Vol. 1, No. 2, July 2020: 78 – 83
82
Figure 2. Proposed system flow
4. RESULTS AND DISCUSSION
The Figure 3 shows the gap analysis between existing and proposed system. The existing system gives
the file to the client whenever request is granted. In the existing system there was no traditional cryptographic
technique used for security of the data and no recovery of data is maintained.
Figure 3. Result analysis
So, details of Figure 3 are as follows:
 Security of fragment: In the existing system there was no cryptographic technique used but in this
proposed system special cryptographic technique is used to increase the security of data for each
fragment.
 Lost data recovery: In the existing system, if the replica of a fragment is deleted, there was no recovery
system but in this proposed system even if any fragment is deleted, we can retrieve using version
control.
As from the above details there are two parameters which differ from the existing system.
Comput. Sci. Inf. Technol. 
High security mechanism: fragmentation and replication in the cloud with … (Shrutika Khobragade)
83
Table 1. Comparison of two systems
Sr. No. Existing System Proposed System
1 Only the data is secured. Security is given to data as well as traditional cryptographic
technique is used.
2 Even if the file or fragment is lost or
whole block is lost, it cannot be
recovered.
Recovery of file or fragment is done in version control.
3 Download of whole file and update
is done. As it is time consuming.
Instead of downloading whole file we can update a particular
fragment online itself or we can download required fragment
only to update it. This saves time.
4 No separate hash key is used for
fragments.
Separate key is maintained for each fragment to make it more
secure.
5. CONCLUSION
A system is proposed for security of users’ data when the data is stored in the cloud. The proposed
scheme works for the security of users’ data when data is stored into the cloud. Cloud computing growth raises
the security concern due to its core technology. So, this system provides a better solution to achieve the security
as well as performance by using techniques such as secure cryptographic scheme, fragmentation and
replication. Fragmentation is used to protect data from single point disaster. Replication can be useful for
maintaining availability, reliability and performance in failure situations. But the extra replication can also
result in high storage cost or drops in systems overall performance due to extreme use of bandwidth. So, here
controlled replication is used. This scheme utilizes rijndael algorithm to create an encryption key that the user
gets while requesting to data owner to file accessing. This scheme uses SHA-512 algorithm for generating hash
key for each fragment after division.
REFERENCES
[1] K. Hashizume, D. G. Rosado, E. Fernandez-Medina, and E. B. Fernandez, “An analysis of security issues for cloud
computing, ”J. Internet Serv. Appl., vol. 4, no. 1, pp. 1-13, 2013, doi: 10.1186/1869-0238-4-5
[2] D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Future Generation Computer Systems, vol.
28, no. 3, pp. 583-592, 2012, doi: 10.1016/j.future.2010.12.006.
[3] M. Hogan, F. Liu, A. Sokol, and J. Tong, “NIST cloud computing standards roadmap,” NIST Special Publication,
2011, [Online] Available: https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=909024.
[4] N. Khan, M. L. M. Kiah, S. U. Khan, and S. A. Madani, “Towards Secure Mobile Cloud Computing: A Survey,”
Future Generation Computer Systems, vol. 29, no. 5, pp. 1278-1299, 2013, doi: 10.1016/j.future.2012.08.003.
[5] A. Mei, L. V. Mancini and S. Jajodia, “Secure dynamic fragment and replica allocation in large-scale distributed file
systems,” in IEEE Transactions on Parallel and Distributed Systems, vol. 14, no. 9, pp. 885-896, Sept. 2003, doi:
10.1109/TPDS.2003.1233711.
[6] A. Juels and A. Opera, “New Approaches to Security and Availability for Cloud Data,” Communications of ACM,
Vol. 56, No. 2, pp. 64-73, 2013, doi: 10.1145/2408776.2408793.
[7] G. Kappes, A. Hatzieleftheriou and S. V. Anastasiadis, “Virtualization-aware access control for multitenant
filesystems,” 2014 30th Symposium on Mass Storage Systems and Technologies (MSST), 2014, pp. 1-6, doi:
10.1109/MSST.2014.6855543.
[8] Y. Tang, P. P. C. Lee, J. C. S. Lui and R. Perlman, “Secure Overlay Cloud Storage with Access Control and Assured
Deletion,” in IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 903-916, Nov.-Dec. 2012,
doi: 10.1109/TDSC.2012.49.

More Related Content

Similar to High security mechanism: Fragmentation and replication in the cloud with auto update in the system

Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
enhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudenhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudINFOGAIN PUBLICATION
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudIRJET Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campusvivatechijri
 
Paper id 2120145
Paper id 2120145Paper id 2120145
Paper id 2120145IJRAT
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerIRJET Journal
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The SecurityRachel Phillips
 
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...IRJET Journal
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. IJCERT JOURNAL
 

Similar to High security mechanism: Fragmentation and replication in the cloud with auto update in the system (20)

Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
enhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudenhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloud
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
 
Paper id 2120145
Paper id 2120145Paper id 2120145
Paper id 2120145
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/ServerSecure Data Sharing in Cloud through Limiting Trust in Third Party/Server
Secure Data Sharing in Cloud through Limiting Trust in Third Party/Server
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
Data Security And The Security
Data Security And The SecurityData Security And The Security
Data Security And The Security
 
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud. A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
A Secure Multi-Owner Data Sharing Scheme for Dynamic Group in Public Cloud.
 

More from CSITiaesprime

Hybrid model for detection of brain tumor using convolution neural networks
Hybrid model for detection of brain tumor using convolution neural networksHybrid model for detection of brain tumor using convolution neural networks
Hybrid model for detection of brain tumor using convolution neural networksCSITiaesprime
 
Implementing lee's model to apply fuzzy time series in forecasting bitcoin price
Implementing lee's model to apply fuzzy time series in forecasting bitcoin priceImplementing lee's model to apply fuzzy time series in forecasting bitcoin price
Implementing lee's model to apply fuzzy time series in forecasting bitcoin priceCSITiaesprime
 
Sentiment analysis of online licensing service quality in the energy and mine...
Sentiment analysis of online licensing service quality in the energy and mine...Sentiment analysis of online licensing service quality in the energy and mine...
Sentiment analysis of online licensing service quality in the energy and mine...CSITiaesprime
 
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...CSITiaesprime
 
The impact of usability in information technology projects
The impact of usability in information technology projectsThe impact of usability in information technology projects
The impact of usability in information technology projectsCSITiaesprime
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCSITiaesprime
 
Agile adoption challenges in insurance: a systematic literature and expert re...
Agile adoption challenges in insurance: a systematic literature and expert re...Agile adoption challenges in insurance: a systematic literature and expert re...
Agile adoption challenges in insurance: a systematic literature and expert re...CSITiaesprime
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...CSITiaesprime
 
An LSTM-based prediction model for gradient-descending optimization in virtua...
An LSTM-based prediction model for gradient-descending optimization in virtua...An LSTM-based prediction model for gradient-descending optimization in virtua...
An LSTM-based prediction model for gradient-descending optimization in virtua...CSITiaesprime
 
Generalization of linear and non-linear support vector machine in multiple fi...
Generalization of linear and non-linear support vector machine in multiple fi...Generalization of linear and non-linear support vector machine in multiple fi...
Generalization of linear and non-linear support vector machine in multiple fi...CSITiaesprime
 
Designing a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for LibyaDesigning a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for LibyaCSITiaesprime
 
Development reference model to build management reporter using dynamics great...
Development reference model to build management reporter using dynamics great...Development reference model to build management reporter using dynamics great...
Development reference model to build management reporter using dynamics great...CSITiaesprime
 
Social media and optimization of the promotion of Lake Toba tourism destinati...
Social media and optimization of the promotion of Lake Toba tourism destinati...Social media and optimization of the promotion of Lake Toba tourism destinati...
Social media and optimization of the promotion of Lake Toba tourism destinati...CSITiaesprime
 
Caring jacket: health monitoring jacket integrated with the internet of thing...
Caring jacket: health monitoring jacket integrated with the internet of thing...Caring jacket: health monitoring jacket integrated with the internet of thing...
Caring jacket: health monitoring jacket integrated with the internet of thing...CSITiaesprime
 
Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...CSITiaesprime
 
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...Circularly polarized metamaterial Antenna in energy harvesting wearable commu...
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...CSITiaesprime
 
An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...CSITiaesprime
 
National archival platform system design using the microservice-based service...
National archival platform system design using the microservice-based service...National archival platform system design using the microservice-based service...
National archival platform system design using the microservice-based service...CSITiaesprime
 
Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...CSITiaesprime
 
The antecedent e-government quality for public behaviour intention, and exten...
The antecedent e-government quality for public behaviour intention, and exten...The antecedent e-government quality for public behaviour intention, and exten...
The antecedent e-government quality for public behaviour intention, and exten...CSITiaesprime
 

More from CSITiaesprime (20)

Hybrid model for detection of brain tumor using convolution neural networks
Hybrid model for detection of brain tumor using convolution neural networksHybrid model for detection of brain tumor using convolution neural networks
Hybrid model for detection of brain tumor using convolution neural networks
 
Implementing lee's model to apply fuzzy time series in forecasting bitcoin price
Implementing lee's model to apply fuzzy time series in forecasting bitcoin priceImplementing lee's model to apply fuzzy time series in forecasting bitcoin price
Implementing lee's model to apply fuzzy time series in forecasting bitcoin price
 
Sentiment analysis of online licensing service quality in the energy and mine...
Sentiment analysis of online licensing service quality in the energy and mine...Sentiment analysis of online licensing service quality in the energy and mine...
Sentiment analysis of online licensing service quality in the energy and mine...
 
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...
Trends in sentiment of Twitter users towards Indonesian tourism: analysis wit...
 
The impact of usability in information technology projects
The impact of usability in information technology projectsThe impact of usability in information technology projects
The impact of usability in information technology projects
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidence
 
Agile adoption challenges in insurance: a systematic literature and expert re...
Agile adoption challenges in insurance: a systematic literature and expert re...Agile adoption challenges in insurance: a systematic literature and expert re...
Agile adoption challenges in insurance: a systematic literature and expert re...
 
Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...Exploring network security threats through text mining techniques: a comprehe...
Exploring network security threats through text mining techniques: a comprehe...
 
An LSTM-based prediction model for gradient-descending optimization in virtua...
An LSTM-based prediction model for gradient-descending optimization in virtua...An LSTM-based prediction model for gradient-descending optimization in virtua...
An LSTM-based prediction model for gradient-descending optimization in virtua...
 
Generalization of linear and non-linear support vector machine in multiple fi...
Generalization of linear and non-linear support vector machine in multiple fi...Generalization of linear and non-linear support vector machine in multiple fi...
Generalization of linear and non-linear support vector machine in multiple fi...
 
Designing a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for LibyaDesigning a framework for blockchain-based e-voting system for Libya
Designing a framework for blockchain-based e-voting system for Libya
 
Development reference model to build management reporter using dynamics great...
Development reference model to build management reporter using dynamics great...Development reference model to build management reporter using dynamics great...
Development reference model to build management reporter using dynamics great...
 
Social media and optimization of the promotion of Lake Toba tourism destinati...
Social media and optimization of the promotion of Lake Toba tourism destinati...Social media and optimization of the promotion of Lake Toba tourism destinati...
Social media and optimization of the promotion of Lake Toba tourism destinati...
 
Caring jacket: health monitoring jacket integrated with the internet of thing...
Caring jacket: health monitoring jacket integrated with the internet of thing...Caring jacket: health monitoring jacket integrated with the internet of thing...
Caring jacket: health monitoring jacket integrated with the internet of thing...
 
Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...Net impact implementation application development life-cycle management in ba...
Net impact implementation application development life-cycle management in ba...
 
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...Circularly polarized metamaterial Antenna in energy harvesting wearable commu...
Circularly polarized metamaterial Antenna in energy harvesting wearable commu...
 
An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...An ensemble approach for the identification and classification of crime tweet...
An ensemble approach for the identification and classification of crime tweet...
 
National archival platform system design using the microservice-based service...
National archival platform system design using the microservice-based service...National archival platform system design using the microservice-based service...
National archival platform system design using the microservice-based service...
 
Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...
 
The antecedent e-government quality for public behaviour intention, and exten...
The antecedent e-government quality for public behaviour intention, and exten...The antecedent e-government quality for public behaviour intention, and exten...
The antecedent e-government quality for public behaviour intention, and exten...
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

High security mechanism: Fragmentation and replication in the cloud with auto update in the system

  • 1. Computer Science and Information Technologies Vol. 1, No. 2, July 2020, pp. 78~83 ISSN: 2722-3221, DOI: 10.11591/csit.v1i2.p78-83  78 Journal homepage: http://iaesprime.com/index.php/csit High security mechanism: fragmentation and replication in the cloud with auto update in the system Shrutika Khobragade, Rohini Bhosale, Rahul Jiwane Department of Computer Engineering, Mumbai University, Pillai HOC College of Engineering and Technology, India Article Info ABSTRACT Article history: Received Jan 22, 2020 Revised May 10, 2020 Accepted May 25, 2020 Cloud computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of files is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology. Keywords: Auto update mechanism Cloud security File fragmentation File replication Version control This is an open access article under the CC BY-SA license. Corresponding Author: Rahul Jiwane Department of Computer Engineering Mumbai University Pillai HOC College of Engineering and Technology, Rasayani, Dist. Raigad, Maharashtra, India Email: rjiwane@mes.ac.in 1. INTRODUCTION Cloud computing encloses more use of networking sites and other forms of interpersonal computing. However, there are a large amount of resources on cloud storage, data or software applications which have been accessed online. It plays an important role in the privacy and security of the data. As cloud computing is a flexible, cost- effective and authenticated delivery platform for providing business consumer IT services on the internet. Cloud computing presents an added level of risk as essential services are often outsourced to a third party, which makes it difficult to maintain data security and privacy, demonstrate consent and also support data and service availability. The cloud computing paradigm has reformed the control and management of the information technology infrastructure [1]. Cloud computing is characterized by on-demand self-services, resource pooling, elasticity, ubiquitous network accesses and measured assurance of the services [2], [3]. However, the benefits of imperceptible management (from user’s perspective), low cost, easy access and greater resilience come with increased security concerns which have to be taken care of. Erstwhile, computer software was not written with security in mind but because of the increasing frequency and sophistication of malicious attacks against information systems, modern software design methodologies include security as a primary objective. With cloud computing systems seeking to meet multiple
  • 2. Comput. Sci. Inf. Technol.  High security mechanism: fragmentation and replication in the cloud with … (Shrutika Khobragade) 79 objectives, such as cost, performance, reliability, maintainability, and security, trade-offs have to be made. Any cloud server is vulnerable to an attacker with unlimited time and physical access to the server. Additionally, physical problems could cause the server to have down time. This would be a loss of availability, which is one of the key principles of the security triad confidentiality, integrity, and availability (CIA). The data which is outsourced to a public cloud must be secured. Unauthorized data access by other users and different processes (can be accidental or deliberate) should be prevented [4]. As stated above, any weak entity may lead the whole cloud at risk. In such a framework, the security mechanism should significantly increase a hacker’s effort to retrieve a probable amount of data which may get lost even after a successful intrusion or attack in the cloud. Moreover, the reasonable amount of loss (due to data leakage) must also be minimized. Mei et al. [5] says that the scheme of fragmentation and replication to allocate files over multiple servers can lead to any attack as the files will be stored at the particular location. Juels and Opera [6] presented a technique called as Iris file system which ensures the freshness, integrity and availability of data in a cloud. Kappes et al. [7] where the deliberate attack of censorious information in case of improper sanitization cannot be handled. It stores the file based on blocks which may lead to an improper sanitization. The outsourced environment where the use of a trusted third party provides the security services in the cloud is advocated in addressing cloud computing security issues [2]. They used the public key infrastructure (PKI) to enhance the trustworthiness in the authentication, integrity and confidentiality of data. At the user level, the use of tamper-proof devices, such as smart cards was used as the storage of the keys. Tang et al. [8] have utilized the public key cryptography and trusted third party for providing data security in cloud environments. However, the author has not used the PKI infrastructure to reduce the overheads. The system needs to be more secure and should be accessed by only authorized person. The data stored in the cloud need to secure as well as proper encryption keys have to be used for the verification of file which is stored in it. 2. PROPOSED SYSTEM MODEL A new proposed model ensures the security of the data which is stored on the cloud. This system provides the better solution to increase the security as well as performance level. The cloud security increases by the control of third-party administrative control. The data which needs to be secured is in the form of files. Diverse amount of files are stored on cloud so here a particular file is uploaded and then fragmentation process is done. Each fragment of that file is secured with hash key which is generated randomly. Fragments are generated based on equal size and each fragment of that particular file is placed at a different location. Here controlled replication is maintained where each fragment is replicated only once to improve the security. When an attacker/ hacker hacks that specified file, he will not reveal all the information of that file. Various attacks such as data recovery, cross VM attack, improper media sanitization, VM escape can be handled by this methodology. In this proposed system, a file is uploaded on the cloud which needs to be secured as it is third party outsourced data. A file is generally stored on a cloud at a particular location which is not secured as any attacker can easily access or attack that particular file and get the information using various malicious attack or intrusion. So instead of storing a single file at a particular location, a file is fragmented according to the size and placed at the different location so that if any attacker access to that particular file it will not reveal all the information of that whole file. Security is the major concern where a file must be purely secured, so to maintain this, each key is used for different fragment of a single file. Replica of file is also maintained to get availability of lost file or old files. 2.1. Design goals of cloud computing Design goals of cloud computing are stated to provides good authentication system which allows only authorized users to login and process. Improves security as well as improves the performance. Fragmentation of file is created to and each fragment is stored at different location. Controlled replication is developed to decrease the chance of data loss, increases the performance, availability and reliability. To provide a file to the client whenever there will be run time error in network. As illustrated in Figure 1, in the design, first registration process is done by giving the information about the user. Authorized user will login to the system. Proposed system provides best way for the secured files which is very susceptible for attacks. User needs to upload the file on the system by providing file id and file name. The uploaded file gets fragmented in such a way that fragments do not include any meaningful information as a particular if fragmented and each fragment needs its own encryption key. Fragmentation is done by using the equal size of file and if not of equal size then remaining bytes of file is stored at the next fragment. This helps to keep away the attacker from finding the location of each fragment as each fragment is stored at different location. Here each key is generated for each fragment from the content of the file so that an attacker will not get the data of each fragment. Fragments will be placed at different nodes as it will be difficult
  • 3.  ISSN: 2722-3221 Comput. Sci. Inf. Technol., Vol. 1, No. 2, July 2020: 78 – 83 80 for the attacker to access on single file. After the fragmentation process that fragments get replicated on different nodes in such a way that the access time will be low which also increases the performance. Proposed system provides the controlled replication which is required to manage the ideal performance and more security. Figure 1. Proposed architecture 3. PROPOSED SYSTEM TECHNIQUE The steps of algorithm are as follows: 3.1. Fragment placement The initial step is select the file foe fragment. Select the particular file which needs to be fragmented. The file gets fragmented based on the size. Each fragment is stored at the different location i.e. on different nodes. Repeat the process until all fragments assign to the node. File size should be more than 20 KB. 3.2. General flow algorithm S = {I, P, R, O} Where, I is set of initial input to the system. I = {i1, i2, i3} i1 = File given by the user. i2 = Download request from user. i3 = Download request from client. P is set of procedure or function or processes or methods. P = {p1, p2, p3, p4, p5, p6, p7, p8} p1 = Registration and authentication. p2 = Uploading a file on cloud server. p3 = Fragmentation of file with separate hash key for each fragment received from user. p4 = Replication of that file. p5 = Download request from user. p6 = Download request from client. p7 = Collection and reassemble of fragments. p8 = Downloading the original file. R is a set of rules or constraints. R= {r1} r1 = File accessed from Replication. O is a set of outputs. O = {o1} o1 = Downloading the original file.
  • 4. Comput. Sci. Inf. Technol.  High security mechanism: fragmentation and replication in the cloud with … (Shrutika Khobragade) 81 3.3. Use of rijndael algorithm Rijndael encryption algorithm proposes a new encryption technique for encryption and decryption purpose. It is advanced AES algorithm is used to encrypt sensitive information. It is symmetric key encryption algorithm to be used to encrypt information. It is the best combination of security, performance, efficiency, easy implementation and flexibility, high speed and versatility across a variety of platforms. Run efficiently on large computers, desktops and small devices like smart cards. The block and key can in fact be chosen independently from 128, 160, 192, 224, 256 bits. Rijndael is simple to implement and uses very little system memory. 3.4. Use of SHA-512 algorithm We are using SHA-512 algorithm for performing hashing task. Secure hash algorithm (SHA). The United States national security agency is designed hashing algorithm.SHA-512 is faster than SHA-256 on 64-bit machines is that has less rounds per byte (80 rounds for 128-byte blocks) compared to SHA-256 (64 rounds for 64 byte blocks), However, storing a SHA-512 bit hash is expensive. The SHA-512 time to generate the hash value and the number of cycles per bytes are efficient comparing to the others. In SHA-512, the number of cycles per bytes somewhat more compared to other hashing functions, but at the same time the time to generate the hashing value is much smaller than others. So the SHA-512 hash function is efficient and also secure hashing algorithm. 3.5. Use of random key generation algorithm Random Key generation generates random values. It is used for encryption and decryption purpose. Here the keys are randomly generated using a random number of generator or pseudorandom number generator that produces random data. In our system random number key generation is used at the time of downloading data for the user. It makes much harder for a hacker or attacker to guess the key. 3.6. Properties of proposed system Properties of proposed system are follows:  Uses the one time password verification scheme.  Privacy of data is maintained from third party organization.  Files are divided into fragments and stored at the various locations.  Key generation is done for each fragment.  Best encryption algorithm used.  Version control is used for retrieving old files.  Auto update and auto replicate of files are done.  Controlled replication for immense security.  Implementation of real cloud. There are different modules of system as shown in Figure 2. They are as follows: Upload: This module consist of uploading the file on the cloud. When the file is uploaded, a file id is generated for each new file. Then the name to that file can be given by the user which is unique. Edit: This module is for editing of the particular fragment of a file. The details of all the uploaded files are shown in this table. When any file is uploaded it is divided into various fragments and encrypted and later stored in various nodes. And each fragment has its hash value which is sent to the users email id during registration. To edit we need to select any fragment and edit that file, but to retrieve that content hash value has to be entered. Edit full file: This module consist of the update of whole file. Here we can upload the updated file and rename the file as new file. The old file is stored in as a backup. Download: This module is used for downloading the file which is in the encrypted form. A single fragment can be downloaded or a single fragment too. When we download the data using authorized key it is first decrypted and then the fragments are combined from various nodes used and the file is presented in its original form. This is the procedure which is implemented to upload the file then fragmentation, replication and download of original file is done.
  • 5.  ISSN: 2722-3221 Comput. Sci. Inf. Technol., Vol. 1, No. 2, July 2020: 78 – 83 82 Figure 2. Proposed system flow 4. RESULTS AND DISCUSSION The Figure 3 shows the gap analysis between existing and proposed system. The existing system gives the file to the client whenever request is granted. In the existing system there was no traditional cryptographic technique used for security of the data and no recovery of data is maintained. Figure 3. Result analysis So, details of Figure 3 are as follows:  Security of fragment: In the existing system there was no cryptographic technique used but in this proposed system special cryptographic technique is used to increase the security of data for each fragment.  Lost data recovery: In the existing system, if the replica of a fragment is deleted, there was no recovery system but in this proposed system even if any fragment is deleted, we can retrieve using version control. As from the above details there are two parameters which differ from the existing system.
  • 6. Comput. Sci. Inf. Technol.  High security mechanism: fragmentation and replication in the cloud with … (Shrutika Khobragade) 83 Table 1. Comparison of two systems Sr. No. Existing System Proposed System 1 Only the data is secured. Security is given to data as well as traditional cryptographic technique is used. 2 Even if the file or fragment is lost or whole block is lost, it cannot be recovered. Recovery of file or fragment is done in version control. 3 Download of whole file and update is done. As it is time consuming. Instead of downloading whole file we can update a particular fragment online itself or we can download required fragment only to update it. This saves time. 4 No separate hash key is used for fragments. Separate key is maintained for each fragment to make it more secure. 5. CONCLUSION A system is proposed for security of users’ data when the data is stored in the cloud. The proposed scheme works for the security of users’ data when data is stored into the cloud. Cloud computing growth raises the security concern due to its core technology. So, this system provides a better solution to achieve the security as well as performance by using techniques such as secure cryptographic scheme, fragmentation and replication. Fragmentation is used to protect data from single point disaster. Replication can be useful for maintaining availability, reliability and performance in failure situations. But the extra replication can also result in high storage cost or drops in systems overall performance due to extreme use of bandwidth. So, here controlled replication is used. This scheme utilizes rijndael algorithm to create an encryption key that the user gets while requesting to data owner to file accessing. This scheme uses SHA-512 algorithm for generating hash key for each fragment after division. REFERENCES [1] K. Hashizume, D. G. Rosado, E. Fernandez-Medina, and E. B. Fernandez, “An analysis of security issues for cloud computing, ”J. Internet Serv. Appl., vol. 4, no. 1, pp. 1-13, 2013, doi: 10.1186/1869-0238-4-5 [2] D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Future Generation Computer Systems, vol. 28, no. 3, pp. 583-592, 2012, doi: 10.1016/j.future.2010.12.006. [3] M. Hogan, F. Liu, A. Sokol, and J. Tong, “NIST cloud computing standards roadmap,” NIST Special Publication, 2011, [Online] Available: https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=909024. [4] N. Khan, M. L. M. Kiah, S. U. Khan, and S. A. Madani, “Towards Secure Mobile Cloud Computing: A Survey,” Future Generation Computer Systems, vol. 29, no. 5, pp. 1278-1299, 2013, doi: 10.1016/j.future.2012.08.003. [5] A. Mei, L. V. Mancini and S. Jajodia, “Secure dynamic fragment and replica allocation in large-scale distributed file systems,” in IEEE Transactions on Parallel and Distributed Systems, vol. 14, no. 9, pp. 885-896, Sept. 2003, doi: 10.1109/TPDS.2003.1233711. [6] A. Juels and A. Opera, “New Approaches to Security and Availability for Cloud Data,” Communications of ACM, Vol. 56, No. 2, pp. 64-73, 2013, doi: 10.1145/2408776.2408793. [7] G. Kappes, A. Hatzieleftheriou and S. V. Anastasiadis, “Virtualization-aware access control for multitenant filesystems,” 2014 30th Symposium on Mass Storage Systems and Technologies (MSST), 2014, pp. 1-6, doi: 10.1109/MSST.2014.6855543. [8] Y. Tang, P. P. C. Lee, J. C. S. Lui and R. Perlman, “Secure Overlay Cloud Storage with Access Control and Assured Deletion,” in IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 903-916, Nov.-Dec. 2012, doi: 10.1109/TDSC.2012.49.