Asian Journal of Computer Science and Technology (AJCST)
File Fragmentation to Improve Security in Cloud Using Graph Topology Grid Algorithm: A SurveyAuthor : S. Abdul Saleem and N. Ramya
Volume 8 No.2 Special Issue:March 2019 pp 46-51
Cloud computing is an emerging patterning that provides computing, communication and storage resources-as-service over a network. In existing system, data stored in a cloud is unsafe due to the eaves dropping and hacking process. To overcome the drawbacks of earlier approaches, Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) methodology is used. The node selection is ensured by means of Graph Topology Grid Algorithm and also data is encrypted here for security. In this process, the common data are divided into multiple nodes and replicate the fragmented data over the cloud nodes. Each data is stored in a different node as fragments in individual locations. In case of any attackers attack a node, no meaningful information will expose to them. The controlled replication of the file fragments is ensured and each of the fragments is replicated only once for the purpose of improved security and minimal retrieval time. In this survey, various relevant approaches were studied and analyzed. Furthermore the DROPS with Graph Topology Grid Algorithm give the better way of security in cloud environment over the earlier approaches.
Fragmentation, Replication, Graph Topology Grid Data Encryption, DROPS, Cloud Security
 A.N. Khan, M.L.M. Kiah, S.U. Khan, and S.A. Madani, “Towards Secure Mobile Cloud Computing: A Survey”, Future Generation Computer Systems, Elsevier, Vol. 29, No. 5, pp. 1278-1299, 2013.
 D. Sun, G. Chang, L. Sun, and X. Wang, “Surveying and analyzing security, privacy and trust issues in cloud computingenvironments”, Procedia Engineering, Elsevier, Vol. 15, pp. 2852-2856, 2011
 Keiko Hashizume, David G Rosado, Eduardo FernndezMedina, and Eduardo B Fernandez, “An analysis of security issues for cloud computing”, Journal of Internet Services and Applications, Springer Open, 4-5, February 2013.
 Tang, Yang, Patrick PC Lee, John CS Lui, and RadiaPerlma, “Secure overlay cloud storage with access control and assured deletion”, IEEE transactions on dependable and secure computing, Vol. 9, No. 6, pp. 903-316, 2012
 Khan, Abdul Nasir, ML Mat Kiah, SajjadA.Madani, and Mazhar Ali, “Enhanced dynamic crendential generation scheme for protection of
user identity in mobile-cloud computing”, The Journal of Supercomputing, Vol. 66, No. 3, pp. 1687-1706, 2013.
 Bilal, Kashif, Marc Manzano, Samee U. Khan, EusebiCalle, Keqin Li, and Albert Y. Zomaya, “On the characterization of the structural robustness of data center networks”, IEEE Transactions on Cloud Computing, Vol. 1, No.1 pp.1-10, 2013.
 Radhika Chavan and A. Opera, “Cloud Security Solution: Fragmentation and Replication”, Communication of the ACM, Vol. 56, No. 2, pp. 64-73, 2013.
 Badre, Ranjana, “Cloud storage with improved access control and assured deletion”, International Journal of Innovations in Engineering and Technology (IJIET), Vol. 3, No.3, pp. 92-77, 2013
 Mr.Santosh Ramesh Kadlag, Prof. Mayur C Akewar, “An Approach for Efficient and Reliable Storage in Cloud Computing Environment , Vol. 3, No.11, 2015.
 Suganya, S., and R. Kalaiselvan, “An Optimization and Security of Data Replication in Cloud Using Advanced Encryption Algorithm”, International Journal Of Engineering And Computer Science, Vol.5, No. 6, pp. 16836-16841, June 2016.
 Mr. Mahesh Kharde, Prof.Ashish Kumar, “Enhancing security and Performance by Fragmenting and Deduplication in cloud”, International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Vol 4, No. 2, pp. 1227-1232, 2016.
 P.D. Patni, and S.N.Kakarwal, “Security Enhancement of Data in Cloud using Fragmentation and Replication”, International Journal of Engineering and Management Research (IJEMR), Vol. 6, No.5, pp. 492-497, 2016.
 Boru, Dejene, DzmitryKkiazovich, FabrizioGranelli, Pascal Bouvry, and Alberet Y. Zomaya, “Energy-efficient data replication in cloud computing datacenters”, Cluster computing, Vol. 18, No. 1 pp. 385-402, 2015.