Fragmentation and Replication Using Drops Methodology

M. Gangadhar, K .Rajesh


Cloud computing is one of the most prominent service for  remote accessing of data that practice of using a network of remote servers hosted on the internet to store, manage and process data, rather than a local server or a personal computer. For state individuality of cloud computing make it a prominent candidate for businesses, organizations, and individual users for acceptance. We cooperatively loom the issue of security and presentation as a secure data replication trouble. We present Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) that sensibly fragments user files into portions and replicates them at tactical locations within the cloud. The consequences of the reproduction exposed that the immediate meeting point on the safety and presentation, resulted in augmented security level of data escort by a minor presentation fall.


nodes, data retrieval, Centrality


K. Bilal, S. U. Khan, L. Zhang, H. Li, K. Hayat, S. A. Madani, N. Min-Allah, L. Wang, D. Chen, M. Iqbal, C. Z. Xu, A. Y. Zomaya, "Quantitative comparisons of the state of the art data center architectures", Concurrency Comput.: Prac. Exp., vol. 25, no. 12, pp. 1771-1783, 2013.

K. Bilal, M. Manzano, S. U. Khan, E. Calle, K. Li, A. Zomaya, "On the characterization of the structural robustness of data center networks", IEEE Trans. Cloud Comput., vol. 1, no. 1, pp. 64-77, Jan.–Jun. 2013.

D. Boru, D. Kliazovich, F. Granelli, P. Bouvry, A. Y. Zomaya, "Energy-efficient data replication in cloud computing datacenters", Proc. IEEE Globecom Workshops, pp. 446-451, 2013.

Y. Deswarte, L. Blain, J.-C. Fabre, "Intrusion tolerance in distributed computing systems", Proc. IEEE Comput. Soc. Symp. Res. Secur. Privacy, pp. 110-121, 1991.

B. Grobauer, T. Walloschek, E. Stocker, "Understanding cloud computing vulnerabilities", IEEE Secur. Privacy, vol. 9, no. 2, pp. 50-57, Mar./Apr. 2011.

W. K. Hale, "Frequency assignment: Theory and applications", Proc. IEEE, vol. 68, no. 12, pp. 1497-1514, Dec. 1980.

M. Ali, S. U. Khan, and A. V. Vasilakos, "Security in cloud computing: Opportunities and challenges", Info. Sci..

M. Hogan, F. Liu, A. Sokol, J. Tong, "NIST cloud computing standards roadmap", 2011.

W. A. Jansen, "Cloud hooks: Security and privacy issues in cloud computing", Proc. 44th Hawaii IEEE Int. Conf. Syst. Sci., pp. 1-10, 2011.

A. Juels, A. Opera, "New approaches to security and availability for cloud data", Commun. ACM, vol. 56, no. 2, pp. 64-73, 2013.

G. Kappes, A. Hatzieleftheriou, S. V. Anastasiadis, "Virtualization-aware access control for multitenant filesystems", pp. 1-6, 2014.

L. M. Kaufman, "Data security in the world of cloud computing", IEEE Secur. Privacy, vol. 7, no. 4, pp. 61-64, 2009.

S. U. Khan, I. Ahmad, "Comparison and analysis of ten static heuristics-based Internet data replication techniques", J. Parallel Distrib. Comput., vol. 68, no. 2, pp. 113-136, 2008.

A. N. Khan, M. L. M. Kiah, S. U. Khan, S. A. Madani, "Towards secure mobile cloud computing: A survey", Future Gener. Comput. Syst., vol. 29, no. 5, pp. 1278-1299, 2013.

A. N. Khan, M. L. M. Kiah, S. A. Madani, M. Ali, "Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing", J. Supercomput., vol. 66, no. 3, pp. 1687-1706, 2013.

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.|

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at