SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 103
Analysis of Cloud Security and Performance for Leakage of Critical
Information using DROPS Methodology
Monisha Thomas1, Laxmi Choudhary2, Indra Kishor 3
1,2B.Tech. Scholars, Dept. Of CSE, Arya Institute of Engineering and Technology, Kukas Jaipur Raj.
3Associate Prof. Department of CSE, Arya Institute of Engineering and Technology, Kukas Jaipur Raj.
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - When outsourcing of data to the third-party
administrative control is done in cloud computing then it can
cause security concerns or problems. The data may be
attacked by other users and nodes within the cloud. So, data
must be protected using high security measures within the
cloud. Moreover, the security measures must also be concern
with the optimization of the data at the retrieval time. In this
paper, we propose DROPS methodology that approaches both
the security and performance issues. Inthismethodology, afile
is divided into fragments and the fragmented data is
replicated over the cloud nodes. Each node stores only asingle
fragment of a particular data file that ensures no meaningful
information is revealed to theattackerinthesuccessfulattack.
Moreover, the nodes storing the fragments are separated by
the certain distance with the help of T-coloring graph to
restrict an attacker of guessing the locations of thefragments.
Key Words: cloud, division, replication, optimal,
security, T-coloring graph, fragmented, performance,
node, centrality, outsourcing, critical
1. INTRODUCTION
Cloud is a representation of the Internet and other
communications. The term cloud can be simply defined by
how a network or remote servers can be accessed via an
internet connection for managing and storing the
information. Cloud is a place where user can store all the
information in the computer.
DROPS (Division and Replication of Data in the Cloud for
Optimal Performance and Security) is a methodology that is
an approach for both securing and performance issue of the
data.[2]
Cloud drops technology is used for securing data over the
cloud so that, when the users outsource their data to third
party administrative control, it gives rise to security
concerns i.e., the data can be attacked by the other users,
processes and nodes within the cloud.[5]
Cloud Security can be enhanced using DROPS methodology
that improves both the security and performance issues.
Security is one of the most important aspects among those
restricting the widespread adoption of cloud computing.
Cloud security issues may arise due to the core technology’s
implementation (virtual machine (VM) escape, session
riding, etc.), cloud service offerings (structured query
language injection, weak authentication schemes, etc.), and
from cloud characteristics (data recovery vulnerability,
Internet protocol vulnerability, etc.). For a cloud to be
secure, all of the participating entities must be secure.Inany
given system with multiple units, the highest level of the
system’s security is equal to the security level oftheweakest
entity. Therefore, in a cloud, the security benefit does not
solely depend on an individual’s security measures.[2]
2. THREATS AND SECURITY STRATERGIES IN CLOUD
COMPUTING
2.1 THREATS
2.1.1 The entity or neighbouring entity may provide the
opportunity to an attacker to bypass the user security and
may access the user data files.
2.1.2 The off-site data storage cloud utility requires the
users to move data in cloud and shared environment that
may cause various security concerns and hamper the user
data.
2.1.3 In the poolingandelasticityofthecloudthephysical
resources are shared among many users. These shared
resources may be reassigned to other users for some
duration of time that may cause the risk to the data.
2.1.4 A multi-tenant virtual environment may result in
VM to escape the boundaries of virtual machine monitor
(VMM) which can interfere to other VMs may access to
unauthorized data.
2.1.5 In crosstenantvirtualizednetwork,duetoimproper
media sanitization, the customer data can also get leaked.[4]
2.2 DATA SECURITY STRATERGIES
2.2.1 In the DROPS methodology, a file is divided into
fragments, and replicates the fragmented dataoverthecloud
nodes, which is duplicating the data. Each of the nodesstores
only a single fragment of a particular data file that ensures
that even in the case of a successful attack, no meaningful
information is revealed to the attackers [3].
2.2.2 The nodes storing the fragments are separated bya
certain distance by means of graph T-coloring to prohibit an
attacker of guessing the locations of the fragments.
2.2.3 For a cloud to be secured, all participating entities
must be secure. In a system with multiple units, the highest
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 104
level of systems security is equal to the security level of the
weakest entity.[3]
Fig. 1: Cloud storage
3. DROPS METHODOLOGY SYSTEM
In the DROPS methodology system, wecollectively approach
the issue of security and performance as a secure data
replication problem. The division of a file into fragments is
performed based on a given user criteria. Divided File can
store in different nodes. In such a scenario, the security
mechanism mustsubstantiallyincreaseanattacker’seffortto
retrieve a reasonable amount of data even after a successful
intrusion in the cloud. Moreover, the probableamountofloss
(as a result of data leakage) mustalso beminimized. Security
is one of the most crucialaspectsamongthoseprohibitingthe
widespread adoption of cloud computing. [5]
Cloud security issues may stem due to the core technologies
implementation (virtual machine(VM). The data outsourced
to a public cloud must be secured. Unauthorized data access
of the user data files by other users, processes and nodes
must be prevented. The main aim is to secure the files store
on cloud. The division of a file into fragments is performed
based on a given user criteria and only single replication of
the fragment is done. DROPS methodology suggests that
successful attack on the single node will not reveal the
locations and the important information of other fragments
within the cloud. To keep an intruder uncertain about the
locations of the file fragmentstofurtherimprovethesecurity.
The selection of the nodes is done in a manner that they are
not adjacent and are at certain distance from each other. To
improve data retrieval time, the nodes are selected based on
the centrality measures thatensurean improved accesstime
[9].
3.1 SYSTEM ARCHITECTURE
The data which is outsourced must be secured so that
third party user cannot access the data which is stored in the
cloud. Unauthorized access to the data of the user by the
other users or process must be denied or prevented. [8]
Any weak entity which is present can risk the whole cloud.In
such a case, the security mechanism must substantially
increase an attacker’s effort to retrieve a reasonable amount
of data even after a successful intrusion in the cloud.
Moreover, the probable amount of loss must also be
minimized. Scheme is developed for outsourced data that
takes into account both the security and performance.
Fig. 2: DROPS Architecture
The DROPS system scheme fragments the user data and
replicates the fragmented data or files all over cloud nodes.
The proposed DROPS scheme ensures that even in the
successful intrusion, no important information is revealedto
the attacker. In this paper, the traditional cryptographic
techniques for data security is not used as it is slower and
does not provide the security required to protect the data
from the intruder. The operations (placement and retrieval)
on the data are made faster by the help of non-cryptographic
natureof the proposed scheme. The controlled replication of
the file fragments is ensured and each fragment is replicated
only once to improve the security of the data. [6]
The system consists of three modules:
 Owner
 User
 Cloud Admin
o Owner- In the owner module,ownercanaddthemultiple
users in the cloud system and moreover, can uploads
the text files in the cloud storage. The owner can delete
the files which is not required.
o User- In the user module, user first completely their
registration and then login in system. The user can
upload the text files, delete, update or modify the files
on the cloud storages per the need of the user.
o Cloud Admin- In the cloud Admin module, theadmincan
view users, view owner, view all the status and reports,
etc. This modules file can be fragmented using the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 105
different algorithms such as fragment placement and
fragment replication algorithms.[7]
CONCLUSIONS
Division and Replication of Data in Cloud for Optimal
Performance and Security (DROPS) is used for securing and
improving the data which outsourced on the cloud so that no
intruder can access the data. The data which is outsourced is
divided into the fragmentsandreplicated.Thereplicatedfiles
are sent to the different nodes of the cloud. The node stores
only the single fragment of the data files. The fragments are
only replicated once so that there is no redundancy of the
data and security of the data can be improved using DROPS
Methodology.
Division and Replication of Data in Cloud for Optimal
Performance and Security (DROPS) use the P-class of
polynomial solvable problems. P contains all sets in which
membership may be decided by an algorithm whoserunning
time is bounded by a polynomial.
REFERENCES
[1] Bhole Laxmikant, Mrs. M.S haikh, Patil Pratik kumar,
Salve Rahul, WaradePratik :‖A SURVEY ON CLOUD
DATA ACCESS PRIVILEGE WITH FULLY ATTRIBUTE –
BASEDENCRYPTION WITHGEOSOCIAL SECURITY‖,Vol.
3, Issue 11, November 2015.
[2] DROPS: Division and Replication of Data in Cloud for
Optimal Performance and Security‟ Mazhar Ali, Student
Member, IEEE, Kashif Bilal, Student Member, IEEE,
Samee U. Khan, Senior Member, IEEE, Bharadwaj
Veeravalli, Senior Member, IEEE, Keqin Li, Senior
Member, IEEE, and Albert Y. Zomaya, Fellow, IEEE
[3] 3. T. Loukopoulos and I. Ahmad, ―Static and adaptive
distributed data replication using genetic algorithms, ‖
Journal of Parallel and Distributed Computing, Vol. 64,
No. 11, 2004, pp.1270-1285.
[4] Bi, X., Grossman, T., Matejka, J., & Fitzmaurice, G.: Magic
desk: bringing multi-touch surfaces into desktop work.
Proc. CHI ’11.
[5] Dey, A. K. and Guzman, E.: From awareness to
connectedness: the design and deployment of presence
displays. Proc. CHI '06.
[6] Dourish, P., and Bly, S.: Portholes:supportingawareness
in a distributed work group. Proc. CHI’92.
[7] Elliot, K., Neustaedter, C., and Greenberg,S.:StickySpots:
using location to embed technology in the social
practices of the home. Proc. TEI’07.
[8] B. Grobauer, T.Walloschek, and E. Stocker,
―Understanding cloud computingvulnerabilities,‖IEEE
Security and Priva cy, Vol.9, No. 2, 2011, pp. 50-57.
[9] A. Mei, L. V. Mancini, and S. Jajodia, ―Secure dynamic
fragment and replica allocation in large- scale
distributed file systems, ‖IEEE Transactions on Parallel
and Distributed Systems, Vol.14, No. 9, 2003, pp. 885-
896
ACKNOWELEGMENT
Under the guidance of Mr. Indra Kishor, Associate Prof.
Department of CSE, Arya Institute of Engineering and
Technology, we analyzed the paperentitledAnalysisofcloud
Security and performance for leakage of critical information
using DROPS Methodology
AUTHOR PROFILE
[1] Mr. Indra Kishor, Associate Prof. Department of CSE,
Arya Institute of Engineering and Technology
[2] Monisha Thomas, B.Tech. Scholar, Department of CSE,
Arya Institute of Engineering and Technology
[3] Laxmi Choudhary, B.Tech. Scholar, Department of CSE,
Arya Institute of Engineering and Technology

More Related Content

What's hot

Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
csandit
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
IJCNCJournal
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
IJERA Editor
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
iaemedu
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
iaemedu
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implications
eSAT Publishing House
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
MonishaNehkal
 
489 493
489 493489 493
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
IRJET Journal
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
IJCNCJournal
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
IJSRD
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
IJERA Editor
 
FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTING
ijccsa
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
mlaij
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
ijcsa
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
IRJET Journal
 

What's hot (18)

Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implications
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
489 493
489 493489 493
489 493
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
FRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTINGFRAMEWORK FOR SECURE CLOUD COMPUTING
FRAMEWORK FOR SECURE CLOUD COMPUTING
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 

Similar to IRJET- Analysis of Cloud Security and Performance for Leakage of Critical Information using DROPS Methodology

Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Editor IJCATR
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
IRJET Journal
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
IJCERT JOURNAL
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
IRJET Journal
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
eSAT Publishing House
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...
Pvrtechnologies Nellore
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
dannyijwest
 
Review and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud ComputingReview and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud Computing
IRJET Journal
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
IRJET Journal
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
Iaetsd Iaetsd
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
IRJET Journal
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
IIRindia
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET Journal
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
eSAT Publishing House
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
eSAT Journals
 

Similar to IRJET- Analysis of Cloud Security and Performance for Leakage of Critical Information using DROPS Methodology (20)

Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
Review and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud ComputingReview and Analysis of Self Destruction of Data in Cloud Computing
Review and Analysis of Self Destruction of Data in Cloud Computing
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
 
Iaetsd storage privacy protection against data
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
Breast Tissue Identification in Digital Mammogram Using Edge Detection Techni...
 
IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 
Ensuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storageEnsuring secure transfer, access and storage over the cloud storage
Ensuring secure transfer, access and storage over the cloud storage
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
gaafergoudaay7aga
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
riddhimaagrawal986
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
architagupta876
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
IJECEIAES
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 

Recently uploaded (20)

An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
integral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdfintegral complex analysis chapter 06 .pdf
integral complex analysis chapter 06 .pdf
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
People as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimalaPeople as resource Grade IX.pdf minimala
People as resource Grade IX.pdf minimala
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
 
An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...An improved modulation technique suitable for a three level flying capacitor ...
An improved modulation technique suitable for a three level flying capacitor ...
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 

IRJET- Analysis of Cloud Security and Performance for Leakage of Critical Information using DROPS Methodology

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 103 Analysis of Cloud Security and Performance for Leakage of Critical Information using DROPS Methodology Monisha Thomas1, Laxmi Choudhary2, Indra Kishor 3 1,2B.Tech. Scholars, Dept. Of CSE, Arya Institute of Engineering and Technology, Kukas Jaipur Raj. 3Associate Prof. Department of CSE, Arya Institute of Engineering and Technology, Kukas Jaipur Raj. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - When outsourcing of data to the third-party administrative control is done in cloud computing then it can cause security concerns or problems. The data may be attacked by other users and nodes within the cloud. So, data must be protected using high security measures within the cloud. Moreover, the security measures must also be concern with the optimization of the data at the retrieval time. In this paper, we propose DROPS methodology that approaches both the security and performance issues. Inthismethodology, afile is divided into fragments and the fragmented data is replicated over the cloud nodes. Each node stores only asingle fragment of a particular data file that ensures no meaningful information is revealed to theattackerinthesuccessfulattack. Moreover, the nodes storing the fragments are separated by the certain distance with the help of T-coloring graph to restrict an attacker of guessing the locations of thefragments. Key Words: cloud, division, replication, optimal, security, T-coloring graph, fragmented, performance, node, centrality, outsourcing, critical 1. INTRODUCTION Cloud is a representation of the Internet and other communications. The term cloud can be simply defined by how a network or remote servers can be accessed via an internet connection for managing and storing the information. Cloud is a place where user can store all the information in the computer. DROPS (Division and Replication of Data in the Cloud for Optimal Performance and Security) is a methodology that is an approach for both securing and performance issue of the data.[2] Cloud drops technology is used for securing data over the cloud so that, when the users outsource their data to third party administrative control, it gives rise to security concerns i.e., the data can be attacked by the other users, processes and nodes within the cloud.[5] Cloud Security can be enhanced using DROPS methodology that improves both the security and performance issues. Security is one of the most important aspects among those restricting the widespread adoption of cloud computing. Cloud security issues may arise due to the core technology’s implementation (virtual machine (VM) escape, session riding, etc.), cloud service offerings (structured query language injection, weak authentication schemes, etc.), and from cloud characteristics (data recovery vulnerability, Internet protocol vulnerability, etc.). For a cloud to be secure, all of the participating entities must be secure.Inany given system with multiple units, the highest level of the system’s security is equal to the security level oftheweakest entity. Therefore, in a cloud, the security benefit does not solely depend on an individual’s security measures.[2] 2. THREATS AND SECURITY STRATERGIES IN CLOUD COMPUTING 2.1 THREATS 2.1.1 The entity or neighbouring entity may provide the opportunity to an attacker to bypass the user security and may access the user data files. 2.1.2 The off-site data storage cloud utility requires the users to move data in cloud and shared environment that may cause various security concerns and hamper the user data. 2.1.3 In the poolingandelasticityofthecloudthephysical resources are shared among many users. These shared resources may be reassigned to other users for some duration of time that may cause the risk to the data. 2.1.4 A multi-tenant virtual environment may result in VM to escape the boundaries of virtual machine monitor (VMM) which can interfere to other VMs may access to unauthorized data. 2.1.5 In crosstenantvirtualizednetwork,duetoimproper media sanitization, the customer data can also get leaked.[4] 2.2 DATA SECURITY STRATERGIES 2.2.1 In the DROPS methodology, a file is divided into fragments, and replicates the fragmented dataoverthecloud nodes, which is duplicating the data. Each of the nodesstores only a single fragment of a particular data file that ensures that even in the case of a successful attack, no meaningful information is revealed to the attackers [3]. 2.2.2 The nodes storing the fragments are separated bya certain distance by means of graph T-coloring to prohibit an attacker of guessing the locations of the fragments. 2.2.3 For a cloud to be secured, all participating entities must be secure. In a system with multiple units, the highest
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 104 level of systems security is equal to the security level of the weakest entity.[3] Fig. 1: Cloud storage 3. DROPS METHODOLOGY SYSTEM In the DROPS methodology system, wecollectively approach the issue of security and performance as a secure data replication problem. The division of a file into fragments is performed based on a given user criteria. Divided File can store in different nodes. In such a scenario, the security mechanism mustsubstantiallyincreaseanattacker’seffortto retrieve a reasonable amount of data even after a successful intrusion in the cloud. Moreover, the probableamountofloss (as a result of data leakage) mustalso beminimized. Security is one of the most crucialaspectsamongthoseprohibitingthe widespread adoption of cloud computing. [5] Cloud security issues may stem due to the core technologies implementation (virtual machine(VM). The data outsourced to a public cloud must be secured. Unauthorized data access of the user data files by other users, processes and nodes must be prevented. The main aim is to secure the files store on cloud. The division of a file into fragments is performed based on a given user criteria and only single replication of the fragment is done. DROPS methodology suggests that successful attack on the single node will not reveal the locations and the important information of other fragments within the cloud. To keep an intruder uncertain about the locations of the file fragmentstofurtherimprovethesecurity. The selection of the nodes is done in a manner that they are not adjacent and are at certain distance from each other. To improve data retrieval time, the nodes are selected based on the centrality measures thatensurean improved accesstime [9]. 3.1 SYSTEM ARCHITECTURE The data which is outsourced must be secured so that third party user cannot access the data which is stored in the cloud. Unauthorized access to the data of the user by the other users or process must be denied or prevented. [8] Any weak entity which is present can risk the whole cloud.In such a case, the security mechanism must substantially increase an attacker’s effort to retrieve a reasonable amount of data even after a successful intrusion in the cloud. Moreover, the probable amount of loss must also be minimized. Scheme is developed for outsourced data that takes into account both the security and performance. Fig. 2: DROPS Architecture The DROPS system scheme fragments the user data and replicates the fragmented data or files all over cloud nodes. The proposed DROPS scheme ensures that even in the successful intrusion, no important information is revealedto the attacker. In this paper, the traditional cryptographic techniques for data security is not used as it is slower and does not provide the security required to protect the data from the intruder. The operations (placement and retrieval) on the data are made faster by the help of non-cryptographic natureof the proposed scheme. The controlled replication of the file fragments is ensured and each fragment is replicated only once to improve the security of the data. [6] The system consists of three modules:  Owner  User  Cloud Admin o Owner- In the owner module,ownercanaddthemultiple users in the cloud system and moreover, can uploads the text files in the cloud storage. The owner can delete the files which is not required. o User- In the user module, user first completely their registration and then login in system. The user can upload the text files, delete, update or modify the files on the cloud storages per the need of the user. o Cloud Admin- In the cloud Admin module, theadmincan view users, view owner, view all the status and reports, etc. This modules file can be fragmented using the
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 105 different algorithms such as fragment placement and fragment replication algorithms.[7] CONCLUSIONS Division and Replication of Data in Cloud for Optimal Performance and Security (DROPS) is used for securing and improving the data which outsourced on the cloud so that no intruder can access the data. The data which is outsourced is divided into the fragmentsandreplicated.Thereplicatedfiles are sent to the different nodes of the cloud. The node stores only the single fragment of the data files. The fragments are only replicated once so that there is no redundancy of the data and security of the data can be improved using DROPS Methodology. Division and Replication of Data in Cloud for Optimal Performance and Security (DROPS) use the P-class of polynomial solvable problems. P contains all sets in which membership may be decided by an algorithm whoserunning time is bounded by a polynomial. REFERENCES [1] Bhole Laxmikant, Mrs. M.S haikh, Patil Pratik kumar, Salve Rahul, WaradePratik :‖A SURVEY ON CLOUD DATA ACCESS PRIVILEGE WITH FULLY ATTRIBUTE – BASEDENCRYPTION WITHGEOSOCIAL SECURITY‖,Vol. 3, Issue 11, November 2015. [2] DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security‟ Mazhar Ali, Student Member, IEEE, Kashif Bilal, Student Member, IEEE, Samee U. Khan, Senior Member, IEEE, Bharadwaj Veeravalli, Senior Member, IEEE, Keqin Li, Senior Member, IEEE, and Albert Y. Zomaya, Fellow, IEEE [3] 3. T. Loukopoulos and I. Ahmad, ―Static and adaptive distributed data replication using genetic algorithms, ‖ Journal of Parallel and Distributed Computing, Vol. 64, No. 11, 2004, pp.1270-1285. [4] Bi, X., Grossman, T., Matejka, J., & Fitzmaurice, G.: Magic desk: bringing multi-touch surfaces into desktop work. Proc. CHI ’11. [5] Dey, A. K. and Guzman, E.: From awareness to connectedness: the design and deployment of presence displays. Proc. CHI '06. [6] Dourish, P., and Bly, S.: Portholes:supportingawareness in a distributed work group. Proc. CHI’92. [7] Elliot, K., Neustaedter, C., and Greenberg,S.:StickySpots: using location to embed technology in the social practices of the home. Proc. TEI’07. [8] B. Grobauer, T.Walloschek, and E. Stocker, ―Understanding cloud computingvulnerabilities,‖IEEE Security and Priva cy, Vol.9, No. 2, 2011, pp. 50-57. [9] A. Mei, L. V. Mancini, and S. Jajodia, ―Secure dynamic fragment and replica allocation in large- scale distributed file systems, ‖IEEE Transactions on Parallel and Distributed Systems, Vol.14, No. 9, 2003, pp. 885- 896 ACKNOWELEGMENT Under the guidance of Mr. Indra Kishor, Associate Prof. Department of CSE, Arya Institute of Engineering and Technology, we analyzed the paperentitledAnalysisofcloud Security and performance for leakage of critical information using DROPS Methodology AUTHOR PROFILE [1] Mr. Indra Kishor, Associate Prof. Department of CSE, Arya Institute of Engineering and Technology [2] Monisha Thomas, B.Tech. Scholar, Department of CSE, Arya Institute of Engineering and Technology [3] Laxmi Choudhary, B.Tech. Scholar, Department of CSE, Arya Institute of Engineering and Technology