Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 4

DROPS: Division and Replication of Data for Optimal

Performance and Security

ABSTRACT

In this paper, we propose Division and Replication of Data for Optimal Performance and
Security (DROPS) that collectively approaches the security and performance issues.
Outsourcing data to a third-party administrative control, as is done in cloud computing,
gives rise to security concerns. The data compromise may occur due to attacks by other
users and nodes within the cloud. Therefore, high security measures are required to
protect data within the cloud. However, the employed security strategy must also take
into account the optimization of the data retrieval time.

In the DROPS methodology, we divide a file into fragments, and replicate the fragmented
data over the cloud nodes. Each of the nodes stores only a single fragment of a particular
data file that ensures that even in case of a successful attack, no meaningful information
is revealed to the attacker. The nodes storing the fragments are separated with certain
distance by means of graph T-coloring to prohibit an attacker of guessing the locations of
the fragments. Furthermore, the DROPS methodology does not rely on the traditional
cryptographic techniques for the data security.
EXISTING SYSTEM PROPOSED SYSTEM
EXISTING CONCEPT:- PROPOSED CONCEPT:-
 In existing, the security issue is main thing for  Our proposed approach consists of Division
the users because data compromise may occur and Replication of Data for Optimal
due to attacks by other users and nodes within Performance and Security (DROPS) that
the cloud. collectively approaches the security and
performance issues.
 The data will be loss because of security  We divide a file into fragments, and replicate
issues. Therefore, high security measures are the fragmented data over the cloud nodes.
required to protect data within the cloud. Each of the nodes stores only a single
fragment of a particular data file.

EXISTING TECHNIQUE:- PROPOSED TECHNIQUE:-


 Space efficient Technique  A-star based searching Technique(DRPA-
star)
TECHNIQUE DEFINITION:- TECHNIQUE DEFINITION:-
 This technique has no file fragmentation is  We develop a scheme for outsourced data
happening and also maintaining full file copies that takes into account both the security and
in the storage. performance. The proposed scheme
 In this any unauthorized users can stole the fragments and replicates the data file over
data’s of the users. cloud nodes.
 The proposed DROPS scheme ensures that
even in the case of a successful attack, no
meaningful information is revealed to the
attacker
DRAWBACKS:- ADVANTAGES:-
 Data’s are not secure.  Data’s will be highly securable.
 No file fragmentation is in existing system.  Each of the fragments is replicated only once
for the purpose of improved security.

APPLICATIONS
 Multiple file maintainer using cloud system
 It’s used for File fragmenting Application

HARDWARE REQUIREMENT
 PROCESSOR : PENTIUM IV 2.6 GHz, Intel core 2
Duo
 RAM : 512 MB DD RAM
 MONITOR : 15” COLOR
 HARD DISK : 40 GB

SOFTWARE REQUIREMENT
 FRONT END : J2EE.
 BACK END : MY SQL 5.5
 OPERATING SYSTEM : Windows 07
 IDE : ECLIPSE

PROPOSED SYSTEM FUTURE ENHANCEMENT


PROPOSED CONCEPT:- FUTURE CONCEPT : -
 Our proposed approach consists of Division and  In future, it will save the time and resources utilized
Replication of Data for Optimal Performance in downloading, updating, and uploading the file
and Security (DROPS) that collectively again.
approaches the security and performance issues.  Moreover, the implications of TCP incast over the
 We divide a file into fragments, and replicate the DROPS methodology need to be studied that is
fragmented data over the cloud nodes. Each of relevant to distributed data storage and access.
the nodes stores only a single fragment of a
particular data file

PROPOSED TECHNIQUE:- FUTURE TECHNIQUE: -


 A-star based searching technique(DRPA-star)  Computation offloading Technique
TECHNIQUE DEFINITION:- TECHNIQUE DEFINITION:-
 We develop a scheme for outsourced data that  This is to migrate the files to the servers which is
takes into account both the security and fast and time consumption.
performance. The proposed scheme fragments  This avoids taking a long application execution time
and replicates the data file over cloud nodes. which results in large amount of power consumption.
 The proposed DROPS scheme ensures that even
in the case of a successful attack, no meaningful
information is revealed to the attacker.
ENRICHMENT:- EXTRAVAGANCE:-
 Data’s will be highly securable.  File transfer will be very fast and time consumption.
 Each of the fragments is replicated only once for  Large amount of power consumption.
the purpose of improved security.

You might also like