SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1358
Guaranteed Availability of Cloud Data with Efficient Cost
Vignesh M1, Rajesh T M2
1 M. Tech, Dept. of Computer Science and Information Technology, Dayananda Sagar University, Bengaluru, India
2Assistant Professor, Dept. of Computer Science and Engineering, Dayananda Sagar University, Bengaluru, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud computing is an innovative proficiency in
the field of information and expertise. It provides so many
things in terms of “As-A-Service” basis. Cloud Computingis the
long-fantasized visualization of computing as a utility, where
users can unconvincingly store up their records into the cloud
so as the benefit of cloud on-demand high availability
applications and services from a shared pool of configurable
computing resources is achieved. In recent days, with
increasing the population of world, the cloud based storage
space popularity is also increasing rapidly. The main
advantage of using cloud storage is, customercanreducetheir
expenditure for purchasingand maintainthestoragearea, but
they have to use the cloud in optimized manner. In this work,
we propose a cost proficient multi-cloudforthedatawith high
accessibility. The proposed approach comprises of two
techniques, the first is choosingafewreasonablecloudstorage
providers and a suitable repetition procedure to store
information with minimalized monetary cost and guaranteed
data availability. The second is setting uparedundantstorage
method to re-distribute the data among different available
data access patterns and cloud pricing models. The proposed
technique not just saves around 20 percent of monetary cost
additionally shows comprehensive flexibility to information
and value changes
Key Words: Multi-cloud, data hosting, cloud storage
1.INTRODUCTION
Cloud computing will be the core of information
infrastructure in future. It provides all kinds of services for
the users. The considerableservicehappeningbythecloudis
nothing but storage competence. Storage outsourcing is
fetching more and more attractiveness to both industry and
academic outstanding to the advantages of low cost, ease of
access, and easy distribution. As one of the storage
outsourcing form, cloud storage gains broad interest in
recent years. Many companies, such as Amazon, Google, and
Microsoft provide their own cloud storage space services,
where users can upload their filestotheservers,accessthem
from a variety of devices, and share them with the others
even though cloud storage services are extensively adopted
in current days, there still stay behind many security issues
and potential threats.
Cloud computing provides different types of services to
the users over the network. It enables enterprises to
consume resources as a utility just like consumption of
electricity. Data hosting services provide users with a
efficient and reliable way to store data and this stored data
can be accessed from anywhere, on any device, and at any
time. The term Cloud computing is defined as an internet
based computing which offers on demand access to shared
pool of resources on pay per use basis. Cloud computing
provides distributed environment which is essential to
develop large scale applications rapidly. In recentyearsdata
hosting services became more popular so that there are
many cloud service providers offering data hosting services.
In most of the casescompaniesmovingtowardshostingtheir
data into a single cloud. However, in market there are
several options are availablefromvariouscloudvendorsand
hosting service
1.1 Heterogeneous clouds
There are various cloud vendors exhibiting variations in
working performancesandpricingpolicies.Theydesign with
different system architectures and apply varioustechniques
to provide better services. So that customers are unable to
understand which clouds are suitable to host their data, this
is called vendor lock in risk. It is inefficient for an
organization to host all the data in a single cloud. It does not
provide guaranteed availability
1.2 Multi cloud data hosting
Multi cloud data hosting is to distribute data across
numerous clouds to increase more availability of the data
and to minimalize the loss of data, system failure risk due to
a centralized component failure in a cloud environment. A
failure can occur in hardware, software, or infrastructure,
such a strategy also improves the overall enterprise
performance by preventing possible risks such as vendor
lock-in.
2. LITERATURE REVIEW
There are many benefits of cloud computing, it also
brings new challenges in maintaining data integrityand high
reliable data availability. Cost is also a major concern when
switching to multi-cloud system. The author Nitesh
Shrivastava et al [1] made a research related to single and
multi-cloud cost,securityandavailabilitybasedscenario.The
work purposes to sustenance the usage of multi-cloud
environment over single cloud in order to reduce the risk.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1359
Prof.V.N.Dhawas et al [2] proposed a secured cost-effective
multi-cloud storage prototype in cloud computing which
holds an efficient distribution of data amongst the available
cloud Service Providers, to deliver customers with high data
availability as well as secure storage. Providing improved
privacy and guaranteeingdataavailabilitycanbeachievedby
fragmenting the customers data blocks into data pieces and
putting them among the various available Service Providers.
High data availability in peer-to-peer data hosting scheme
demands data redundancy. In this comparison, the author
HakimWeatherspoon et al [3] compares two common
redundancy schemes: replication and erasure coding. In
contrast to previous comparisons,theauthorshavetakenthe
features of the nodes that encompass the overlap into
consideration, and investigate that in some cases the
advantages from coding are restricted, and possibly will not
be worth its disadvantages.
Zhenhua Li et al [4], Cloud storage services such as Dropbox,
Google Drive, and Microsoft OneDrive provide users with a
convenient and reliable method to store and share data from
anyplace, on any device, and at any time. The keystone of
these services is the data synchronization operation which
automatically maps the changes in users’ local filesystems to
the cloud through a series of network communications in a
appropriate timely manner. If not structured properly, the
tremendous amount of data synchronization congestion can
potentiallycausetroublestobothcloudserviceprovidersand
cloud consumers.
Understandingtheintegralsystemcharacteristicsiscrucialin
designing and optimization of cloud storage system, and few
studies have systematically explored the data features and
access patterns. Authors S.Liu, et al [5] [6] have found that
there are much diversity amongst cloud storage system and
traditional file systems: the cloudstoragesystemhashighfile
sizes, smaller read and write ratio, and low set of active files
than that of a typical traditional file system. With a trace
driven mockup,theyfoundthatthecacheeffectivenesscanbe
enhanced by 5 times using the inputs from authors
observations. To tackle the challenges in migrating the
enterprise application servicesintomulti-cloudenvironment
-based deployments, organizations processes are partially
put on-premise and partly in the multi-cloud. The use multi-
cloud architectures enable organizations to benefit from
cloud-based architectures, though accepting application
performance rations, and privacy limitations on which all
services could be migrated to the multi-cloud.
With the increasing popularity of cloud storage is leading
many enterprises to consider moving data out of their own
data centers and into the cloud. However, achievement for
cloud storage providers can be a significant risk to clients, as
it becomes very expensive to shift storage providers. In the
work presented by author Hussam Abu-Libdeh at al [7],
achieves a instance for using RAID-like techniques using
disksand file systems in the cloud storage, writer claims that
by method of striping the user’s data into multiple cloud
service providers can consent customers to prevent from
vendor lock-in risk, reduce the cost of switching cloud
providers, andimprovedfault-tolerateproviderfailures.with
introduce Redundant Array of Cloud Storage, a proxy
technique that transparently blowouts the storage load
across providers. The authorevaluatesa modelofthesystem
and evaluate the costs incurred and benefits reaped.
The study on storage system Manorama et al [8] the author
implements erasure coding and replication across multiple
data centers are conferred that with the cache is primary for
data centers. The heterogeneity of multi cloud and the
identifying of clouds are not worth the advantage, the cache
benefits in storing back of data when accessed by erasure
coding frequent data swap certainly induces additional cost
which is longer competitive when compare to other data
hosting schemes.
An extensive research is done on datahostinginpeer-to-peer
storage systems the authors has stated in [9],[10],[11],[12]
deals with the major featureof storage system is thatstorage
nodes are not stable. There are many merits and demerits of
peer-to-peer system mechanism in multi cloud environment
cannot be compared since it is proved very differentfromthe
results of other techniques. In the existing model, the
enterprise based data hosting systems, data high availability
is usually defined by replication or erasure coding. In the
replicationprocess,usuallyreplicasareplacedintonumerous
clouds, and a read access is only permitted by the low-priced
cloud, so that the cloud that charges a minimal price for an
out-going bandwidth and GET operation. Data replication is
used for systems that are hosted in hybrid cloud where data
is stored in multiple locations that are accessed my multiple
applications. If the data is distributed across the multiple
geographical locations there will be huge latency to access
the data and process it compared to the data stored in single
datacenter or location. It might also come under multiple
government laws and regulations. The existing systems
works on single server which cannot ensure a guaranteed
backup forthe optimal securityandavailabilityofthesystem.
In the existing model concept of user data vulnerable to
potential attacks are not implemented
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1360
3. PROPOSED METHODOLOGY
Fig -1: Architecture of the proposed methodology
In system model think about 3 kinds of entity: the cloud
service providers, the server and cloud users. Each time
when, the user uploads the file to the cloud storage system,
the application server decides based on the size of the file,
the file requirement need of the user, the bandwidth,
application server decides which cloud providers to use and
upload the files with compression so as the reduce the
monetary cost. These are achieved through the following
phases
3.1 Multi Cloud
In the designed Application, we are proving the four-cloud
storage sever for storing data from all the available clouds
storage which meet the performance requirement, that is,
they can offer acceptable throughput and latency when they
are not in outage. The storage mode transition does not
affect the performance of the service.Sinceitisnota latency-
sensitive process, the priority oftransitionoperationscanbe
decreased.
3.2 Data Hosting
Data Hosting scheme stores data by means of replication or
erasure coding, according to the size and frequency of the
data access. Storage Mode Switching (SMS) will decide the
replication process for storing the client data. The
implementation of changing storage mode runs in the
background, in order not to impact Client Application. Data
Hosting and SMS are two significant modules in proposed
work. The data hosting decides storage mode and theclouds
that the data should be stored in.
3.3 File Uploading with Hashing
In File uploading module, User has to select thefiletoupload
to cloud by selecting the number of copies of replication
required to store. While uploading our application will
reading file size in kb .Then it will select the best cloud
storage server based on the storageavailability,PricingCost,
Predictor, Size etc.. For integrity Verification process it will
generate the Hash Key (HK1) using MD5 algorithm and it
will keep it in the user DB. Finally based on the Replication
details the File will be store in the Cloud Storage Server.
3.4 Storage mode Switching
In Storage Mode Switching proxy, it will get the Cloud
Storage Server credential from the DB like Size of the file in
KB, Cost for the Uploading File. Availability Cloud Storage
based on this credential it will get the Cloud Storage Server
Details. Then Using FTP Protocol, it will connect to cloud to
store the user data.
3.5 Cost Process
To Show the Multi-Cost Data Hosting, we have to collect the
Cloud Storage Server Details like Cost, availability,Priceetc.,
The Cost Details will be calculating by in KB.
3.6 File Download
When User wants to download the File from the Multi Cloud
Storage Server, User has to select the file from the Charm
Application then the Charm Server will select the
corresponding cloud sever details from the DB and also it
will check for the cloud availability for downloading if cloud
is not available then it will download from another cloud
server. While downloading it will generate the HASH Key
(HK2), then it will check for the HK1 &HK2 for the Integrity
Check. Finally, it will be download to the user local System
4. CONCLUSION AND FUTURE SCOPE
This paper expands Guaranteed Availability of Cloud Data
with Efficient Cost that ensures High Availability, a novel
storage scheme which guides customers to distribute data
among clouds efficiently in large, geographically distributed
and highly dynamic environments. As the demand for
decentralization and delocalization of data isgrowing,Cloud
services are experiencing rapid development and the
services based on multi-cloud also become prevailing. A
major challenge to moving services to the clouds is the
capital involvement. The server providesa superiorsolution
to the complexities involving as to which storage mode to
use and which clouds to place data in. It appeals to the
particularities of multi-cloud environment, and hosts data
into multiple clouds cost-effectively, while guaranteeing
flexible availability and avoiding vender lock-in. The
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1361
advantages of proposed methodology,multi-cloudapproach
is where an enterprise uses two or more cloud services,
hence minimizing the risk of widespread data loss or outage
due to a component failure, as in a single cloud computing
environment. Data Hosting with low cost cloud storage
Server will make effective use for client benefit. In this
present work, if any one of the cloud service is inactive, the
admin gets a notification in this screen, along with the
available clouds and costs and push the data to the available
clouds manually. In the future, we can automate the process
by automatically migrate the data to the available clouds.
REFERENCES
[1] NiteshShrivastava, Ganesh Kumar A survey on cost
effective multi-cloud storage in cloud computing”
International Journal ofAdvancedResearchinComputer
Engineering & Technology,Volume2,Issue4,April 2013
[2] Prof.V.N.Dhawas,PranaliJuikar“ASecuredCostEffective
Multi-Cloud Storage in Cloud Computing” International
Journal of Scientific & Engineering Research, Volume 4,
Issue 5, May-2013 1017 ISSN 2229-5518.
[3] HakimWeatherspoon and John D. Kubiatowicz"Erasure
Coding Vs. Replication: A Quantitative Comparison"
2012
[4] Zhenhua Li 1;2, Christo Wilson 3, Zhefu Jiang 4, Yao Liu
5, Ben Y. Zhao 6, Cheng Jin 7, Zhi-Li Zhang 7, and Yafei
Dai. Efficient Batched Synchronization in Dropbox-like
Cloud Storage Services
[5] S.Liu, X.Huang, H.Fu, and G.Yang, “Understanding Data
Characteristics and Access Patterns in a Cloud Storage
System” in CCGrid IEEE, 2013
[6] Mohammad Hajjat, Xin Sun, Yu-Wei Eric Sung, David
Maltz, Sanjay Rao Kunwadee Sripanidkulchai andMohit
Tawarmalani,Cloudward Bound: PlanningforBeneficial
Migration ofEnterprise Applications to the Cloud,2010
[7] Hussam Abu-Libdeh, Lonnie Princehouse, Hakim
Weatherspoon RACS: A Case for Cloud StorageDiversity
[8] Y. Ma, T. Nandagopal, K. P. Puttaswamy, and S. Banerjee,
“An Ensemble of Replication and Erasure Codes for
Cloud File Systems,” in INFOCOM. IEEE, 2013
[9] M. Pitkanen, R. Moussa, M. Swany, and T. Niemi,
“Erasure Codes for Increasing the Availability of Grid
Data Storage,” in AICT-ICIW. IEEE, 2006
[10] H. B. Ribeiro and E. Anceaume, “Datacube: A P2P
Persistent Data Storage Architecture Based on Hybrid
Redundancy Schema,” in PDP. IEEE, 2010
[11] A. Duminuco and E. W. Biersack, “Hierarchical Codes: A
Flexible Trade-off for Erasure Codes in Peer-to Peer
Storage Systems,” Peerto- Peer Networking and
Applications, vol. 3, no. 1, pp. 52–66, 2010
[12] W. Lin, D. Chiu, and Y. Lee, “Erasure Code Replication
Revisited,” in P2P. IEEE, 2004.
BIOGRAPHIES
Vignesh M
M.Tech, Computer science and
Information Technology
Dayananda Sagar University,
Bengaluru, India
Dr. Rajesh T M
Assistant Professor, Department of
Computer science and Engineering,
Dayananda Sagar University,
Bengaluru, India

More Related Content

What's hot

Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
IRJET Journal
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
ijiert bestjournal
 
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
ijccsa
 
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
neirew J
 
DATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDDATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUD
ijsrd.com
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
 
Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High A...
Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High A...Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High A...
Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High A...
IJECEIAES
 
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUESANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
neirew J
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Editor IJARCET
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
IRJET Journal
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
IJERA Editor
 
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
IJERA Editor
 
A scalabl e and cost effective framework for privacy preservation over big d...
A  scalabl e and cost effective framework for privacy preservation over big d...A  scalabl e and cost effective framework for privacy preservation over big d...
A scalabl e and cost effective framework for privacy preservation over big d...amna alhabib
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUDA NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
ijsptm
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
Iaetsd Iaetsd
 

What's hot (17)

Improved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providersImproved deduplication with keys and chunks in HDFS storage providers
Improved deduplication with keys and chunks in HDFS storage providers
 
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
 
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
NEURO-FUZZY SYSTEM BASED DYNAMIC RESOURCE ALLOCATION IN COLLABORATIVE CLOUD C...
 
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
Neuro-Fuzzy System Based Dynamic Resource Allocation in Collaborative Cloud C...
 
DATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDDATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUD
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High A...
Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High A...Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High A...
Intelligent Hybrid Cloud Data Hosting Services with Effective Cost and High A...
 
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUESANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
 
Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
Research On Preserving User Confidentiality In Cloud Computing – Design Of A ...
 
A scalabl e and cost effective framework for privacy preservation over big d...
A  scalabl e and cost effective framework for privacy preservation over big d...A  scalabl e and cost effective framework for privacy preservation over big d...
A scalabl e and cost effective framework for privacy preservation over big d...
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUDA NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
A NEW FRAMEWORK FOR SECURING PERSONAL DATA USING THE MULTI-CLOUD
 
WJCAT2-13707877
WJCAT2-13707877WJCAT2-13707877
WJCAT2-13707877
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
 

Similar to Guaranteed Availability of Cloud Data with Efficient Cost

IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET Journal
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
ijdpsjournal
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
Editor IJMTER
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
IJMER
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
IRJET Journal
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
INFOGAIN PUBLICATION
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
IRJET Journal
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
IJERA Editor
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
ssuser84183f
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
eSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
eSAT Publishing House
 
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATASECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
IRJET Journal
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
pharmaindexing
 
V04405122126
V04405122126V04405122126
V04405122126
IJERA Editor
 

Similar to Guaranteed Availability of Cloud Data with Efficient Cost (20)

IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
Cooperative Schedule Data Possession for Integrity Verification in Multi-Clou...
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
 
50620130101004
5062013010100450620130101004
50620130101004
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Introduction to aneka cloud
Introduction to aneka cloudIntroduction to aneka cloud
Introduction to aneka cloud
 
Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATASECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
SECURITY MULTIKEYWORD MAPPING AND SEARCH OVER ENCRYPTED CLOUD DATA
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
V04405122126
V04405122126V04405122126
V04405122126
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 

Recently uploaded (20)

Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 

Guaranteed Availability of Cloud Data with Efficient Cost

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1358 Guaranteed Availability of Cloud Data with Efficient Cost Vignesh M1, Rajesh T M2 1 M. Tech, Dept. of Computer Science and Information Technology, Dayananda Sagar University, Bengaluru, India 2Assistant Professor, Dept. of Computer Science and Engineering, Dayananda Sagar University, Bengaluru, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing is an innovative proficiency in the field of information and expertise. It provides so many things in terms of “As-A-Service” basis. Cloud Computingis the long-fantasized visualization of computing as a utility, where users can unconvincingly store up their records into the cloud so as the benefit of cloud on-demand high availability applications and services from a shared pool of configurable computing resources is achieved. In recent days, with increasing the population of world, the cloud based storage space popularity is also increasing rapidly. The main advantage of using cloud storage is, customercanreducetheir expenditure for purchasingand maintainthestoragearea, but they have to use the cloud in optimized manner. In this work, we propose a cost proficient multi-cloudforthedatawith high accessibility. The proposed approach comprises of two techniques, the first is choosingafewreasonablecloudstorage providers and a suitable repetition procedure to store information with minimalized monetary cost and guaranteed data availability. The second is setting uparedundantstorage method to re-distribute the data among different available data access patterns and cloud pricing models. The proposed technique not just saves around 20 percent of monetary cost additionally shows comprehensive flexibility to information and value changes Key Words: Multi-cloud, data hosting, cloud storage 1.INTRODUCTION Cloud computing will be the core of information infrastructure in future. It provides all kinds of services for the users. The considerableservicehappeningbythecloudis nothing but storage competence. Storage outsourcing is fetching more and more attractiveness to both industry and academic outstanding to the advantages of low cost, ease of access, and easy distribution. As one of the storage outsourcing form, cloud storage gains broad interest in recent years. Many companies, such as Amazon, Google, and Microsoft provide their own cloud storage space services, where users can upload their filestotheservers,accessthem from a variety of devices, and share them with the others even though cloud storage services are extensively adopted in current days, there still stay behind many security issues and potential threats. Cloud computing provides different types of services to the users over the network. It enables enterprises to consume resources as a utility just like consumption of electricity. Data hosting services provide users with a efficient and reliable way to store data and this stored data can be accessed from anywhere, on any device, and at any time. The term Cloud computing is defined as an internet based computing which offers on demand access to shared pool of resources on pay per use basis. Cloud computing provides distributed environment which is essential to develop large scale applications rapidly. In recentyearsdata hosting services became more popular so that there are many cloud service providers offering data hosting services. In most of the casescompaniesmovingtowardshostingtheir data into a single cloud. However, in market there are several options are availablefromvariouscloudvendorsand hosting service 1.1 Heterogeneous clouds There are various cloud vendors exhibiting variations in working performancesandpricingpolicies.Theydesign with different system architectures and apply varioustechniques to provide better services. So that customers are unable to understand which clouds are suitable to host their data, this is called vendor lock in risk. It is inefficient for an organization to host all the data in a single cloud. It does not provide guaranteed availability 1.2 Multi cloud data hosting Multi cloud data hosting is to distribute data across numerous clouds to increase more availability of the data and to minimalize the loss of data, system failure risk due to a centralized component failure in a cloud environment. A failure can occur in hardware, software, or infrastructure, such a strategy also improves the overall enterprise performance by preventing possible risks such as vendor lock-in. 2. LITERATURE REVIEW There are many benefits of cloud computing, it also brings new challenges in maintaining data integrityand high reliable data availability. Cost is also a major concern when switching to multi-cloud system. The author Nitesh Shrivastava et al [1] made a research related to single and multi-cloud cost,securityandavailabilitybasedscenario.The work purposes to sustenance the usage of multi-cloud environment over single cloud in order to reduce the risk.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1359 Prof.V.N.Dhawas et al [2] proposed a secured cost-effective multi-cloud storage prototype in cloud computing which holds an efficient distribution of data amongst the available cloud Service Providers, to deliver customers with high data availability as well as secure storage. Providing improved privacy and guaranteeingdataavailabilitycanbeachievedby fragmenting the customers data blocks into data pieces and putting them among the various available Service Providers. High data availability in peer-to-peer data hosting scheme demands data redundancy. In this comparison, the author HakimWeatherspoon et al [3] compares two common redundancy schemes: replication and erasure coding. In contrast to previous comparisons,theauthorshavetakenthe features of the nodes that encompass the overlap into consideration, and investigate that in some cases the advantages from coding are restricted, and possibly will not be worth its disadvantages. Zhenhua Li et al [4], Cloud storage services such as Dropbox, Google Drive, and Microsoft OneDrive provide users with a convenient and reliable method to store and share data from anyplace, on any device, and at any time. The keystone of these services is the data synchronization operation which automatically maps the changes in users’ local filesystems to the cloud through a series of network communications in a appropriate timely manner. If not structured properly, the tremendous amount of data synchronization congestion can potentiallycausetroublestobothcloudserviceprovidersand cloud consumers. Understandingtheintegralsystemcharacteristicsiscrucialin designing and optimization of cloud storage system, and few studies have systematically explored the data features and access patterns. Authors S.Liu, et al [5] [6] have found that there are much diversity amongst cloud storage system and traditional file systems: the cloudstoragesystemhashighfile sizes, smaller read and write ratio, and low set of active files than that of a typical traditional file system. With a trace driven mockup,theyfoundthatthecacheeffectivenesscanbe enhanced by 5 times using the inputs from authors observations. To tackle the challenges in migrating the enterprise application servicesintomulti-cloudenvironment -based deployments, organizations processes are partially put on-premise and partly in the multi-cloud. The use multi- cloud architectures enable organizations to benefit from cloud-based architectures, though accepting application performance rations, and privacy limitations on which all services could be migrated to the multi-cloud. With the increasing popularity of cloud storage is leading many enterprises to consider moving data out of their own data centers and into the cloud. However, achievement for cloud storage providers can be a significant risk to clients, as it becomes very expensive to shift storage providers. In the work presented by author Hussam Abu-Libdeh at al [7], achieves a instance for using RAID-like techniques using disksand file systems in the cloud storage, writer claims that by method of striping the user’s data into multiple cloud service providers can consent customers to prevent from vendor lock-in risk, reduce the cost of switching cloud providers, andimprovedfault-tolerateproviderfailures.with introduce Redundant Array of Cloud Storage, a proxy technique that transparently blowouts the storage load across providers. The authorevaluatesa modelofthesystem and evaluate the costs incurred and benefits reaped. The study on storage system Manorama et al [8] the author implements erasure coding and replication across multiple data centers are conferred that with the cache is primary for data centers. The heterogeneity of multi cloud and the identifying of clouds are not worth the advantage, the cache benefits in storing back of data when accessed by erasure coding frequent data swap certainly induces additional cost which is longer competitive when compare to other data hosting schemes. An extensive research is done on datahostinginpeer-to-peer storage systems the authors has stated in [9],[10],[11],[12] deals with the major featureof storage system is thatstorage nodes are not stable. There are many merits and demerits of peer-to-peer system mechanism in multi cloud environment cannot be compared since it is proved very differentfromthe results of other techniques. In the existing model, the enterprise based data hosting systems, data high availability is usually defined by replication or erasure coding. In the replicationprocess,usuallyreplicasareplacedintonumerous clouds, and a read access is only permitted by the low-priced cloud, so that the cloud that charges a minimal price for an out-going bandwidth and GET operation. Data replication is used for systems that are hosted in hybrid cloud where data is stored in multiple locations that are accessed my multiple applications. If the data is distributed across the multiple geographical locations there will be huge latency to access the data and process it compared to the data stored in single datacenter or location. It might also come under multiple government laws and regulations. The existing systems works on single server which cannot ensure a guaranteed backup forthe optimal securityandavailabilityofthesystem. In the existing model concept of user data vulnerable to potential attacks are not implemented
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1360 3. PROPOSED METHODOLOGY Fig -1: Architecture of the proposed methodology In system model think about 3 kinds of entity: the cloud service providers, the server and cloud users. Each time when, the user uploads the file to the cloud storage system, the application server decides based on the size of the file, the file requirement need of the user, the bandwidth, application server decides which cloud providers to use and upload the files with compression so as the reduce the monetary cost. These are achieved through the following phases 3.1 Multi Cloud In the designed Application, we are proving the four-cloud storage sever for storing data from all the available clouds storage which meet the performance requirement, that is, they can offer acceptable throughput and latency when they are not in outage. The storage mode transition does not affect the performance of the service.Sinceitisnota latency- sensitive process, the priority oftransitionoperationscanbe decreased. 3.2 Data Hosting Data Hosting scheme stores data by means of replication or erasure coding, according to the size and frequency of the data access. Storage Mode Switching (SMS) will decide the replication process for storing the client data. The implementation of changing storage mode runs in the background, in order not to impact Client Application. Data Hosting and SMS are two significant modules in proposed work. The data hosting decides storage mode and theclouds that the data should be stored in. 3.3 File Uploading with Hashing In File uploading module, User has to select thefiletoupload to cloud by selecting the number of copies of replication required to store. While uploading our application will reading file size in kb .Then it will select the best cloud storage server based on the storageavailability,PricingCost, Predictor, Size etc.. For integrity Verification process it will generate the Hash Key (HK1) using MD5 algorithm and it will keep it in the user DB. Finally based on the Replication details the File will be store in the Cloud Storage Server. 3.4 Storage mode Switching In Storage Mode Switching proxy, it will get the Cloud Storage Server credential from the DB like Size of the file in KB, Cost for the Uploading File. Availability Cloud Storage based on this credential it will get the Cloud Storage Server Details. Then Using FTP Protocol, it will connect to cloud to store the user data. 3.5 Cost Process To Show the Multi-Cost Data Hosting, we have to collect the Cloud Storage Server Details like Cost, availability,Priceetc., The Cost Details will be calculating by in KB. 3.6 File Download When User wants to download the File from the Multi Cloud Storage Server, User has to select the file from the Charm Application then the Charm Server will select the corresponding cloud sever details from the DB and also it will check for the cloud availability for downloading if cloud is not available then it will download from another cloud server. While downloading it will generate the HASH Key (HK2), then it will check for the HK1 &HK2 for the Integrity Check. Finally, it will be download to the user local System 4. CONCLUSION AND FUTURE SCOPE This paper expands Guaranteed Availability of Cloud Data with Efficient Cost that ensures High Availability, a novel storage scheme which guides customers to distribute data among clouds efficiently in large, geographically distributed and highly dynamic environments. As the demand for decentralization and delocalization of data isgrowing,Cloud services are experiencing rapid development and the services based on multi-cloud also become prevailing. A major challenge to moving services to the clouds is the capital involvement. The server providesa superiorsolution to the complexities involving as to which storage mode to use and which clouds to place data in. It appeals to the particularities of multi-cloud environment, and hosts data into multiple clouds cost-effectively, while guaranteeing flexible availability and avoiding vender lock-in. The
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1361 advantages of proposed methodology,multi-cloudapproach is where an enterprise uses two or more cloud services, hence minimizing the risk of widespread data loss or outage due to a component failure, as in a single cloud computing environment. Data Hosting with low cost cloud storage Server will make effective use for client benefit. In this present work, if any one of the cloud service is inactive, the admin gets a notification in this screen, along with the available clouds and costs and push the data to the available clouds manually. In the future, we can automate the process by automatically migrate the data to the available clouds. REFERENCES [1] NiteshShrivastava, Ganesh Kumar A survey on cost effective multi-cloud storage in cloud computing” International Journal ofAdvancedResearchinComputer Engineering & Technology,Volume2,Issue4,April 2013 [2] Prof.V.N.Dhawas,PranaliJuikar“ASecuredCostEffective Multi-Cloud Storage in Cloud Computing” International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 1017 ISSN 2229-5518. [3] HakimWeatherspoon and John D. Kubiatowicz"Erasure Coding Vs. Replication: A Quantitative Comparison" 2012 [4] Zhenhua Li 1;2, Christo Wilson 3, Zhefu Jiang 4, Yao Liu 5, Ben Y. Zhao 6, Cheng Jin 7, Zhi-Li Zhang 7, and Yafei Dai. Efficient Batched Synchronization in Dropbox-like Cloud Storage Services [5] S.Liu, X.Huang, H.Fu, and G.Yang, “Understanding Data Characteristics and Access Patterns in a Cloud Storage System” in CCGrid IEEE, 2013 [6] Mohammad Hajjat, Xin Sun, Yu-Wei Eric Sung, David Maltz, Sanjay Rao Kunwadee Sripanidkulchai andMohit Tawarmalani,Cloudward Bound: PlanningforBeneficial Migration ofEnterprise Applications to the Cloud,2010 [7] Hussam Abu-Libdeh, Lonnie Princehouse, Hakim Weatherspoon RACS: A Case for Cloud StorageDiversity [8] Y. Ma, T. Nandagopal, K. P. Puttaswamy, and S. Banerjee, “An Ensemble of Replication and Erasure Codes for Cloud File Systems,” in INFOCOM. IEEE, 2013 [9] M. Pitkanen, R. Moussa, M. Swany, and T. Niemi, “Erasure Codes for Increasing the Availability of Grid Data Storage,” in AICT-ICIW. IEEE, 2006 [10] H. B. Ribeiro and E. Anceaume, “Datacube: A P2P Persistent Data Storage Architecture Based on Hybrid Redundancy Schema,” in PDP. IEEE, 2010 [11] A. Duminuco and E. W. Biersack, “Hierarchical Codes: A Flexible Trade-off for Erasure Codes in Peer-to Peer Storage Systems,” Peerto- Peer Networking and Applications, vol. 3, no. 1, pp. 52–66, 2010 [12] W. Lin, D. Chiu, and Y. Lee, “Erasure Code Replication Revisited,” in P2P. IEEE, 2004. BIOGRAPHIES Vignesh M M.Tech, Computer science and Information Technology Dayananda Sagar University, Bengaluru, India Dr. Rajesh T M Assistant Professor, Department of Computer science and Engineering, Dayananda Sagar University, Bengaluru, India