Improving File Storage Mechanism using Intelligent Data Fragmentation Model (IDFM) Algorithm and Providing Confidentiality of Data in Cloud Computing Environment
Improving File Storage Mechanism using Intelligent Data Fragmentation Model (IDFM) Algorithm and Providing Confidentiality of Data in Cloud Computing Environment |
||
|
||
© 2023 by IJETT Journal | ||
Volume-71 Issue-3 |
||
Year of Publication : 2023 | ||
Author : K. Rajalakshmi, M. Sambath, Linda Joseph |
||
DOI : 10.14445/22315381/IJETT-V71I3P214 |
How to Cite?
K. Rajalakshmi, M. Sambath, Linda Joseph, "Improving File Storage Mechanism using Intelligent Data Fragmentation Model (IDFM) Algorithm and Providing Confidentiality of Data in Cloud Computing Environment," International Journal of Engineering Trends and Technology, vol. 71, no. 3, pp. 130-142, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I3P214
Abstract
Cloud computing is a cutting-edge technology that offers users a useful environment where they can quickly and easily obtain and release reconfigurable computing resources. Cloud data security issues have attracted much attention recently since it is an integral part of cloud computing that is essential to make data and its related operations secure and safe. This study focuses on improving data confidentiality in a cloud environment by using an Intelligent Data Fragmentation Model (IDFM) that securely divides the file into different distinct fragments and generates the fact file for recovering the data in case of any catastrophic circumstances. A key problem in this research is the difficulty of ensuring confidentiality that prevents unauthorized disclosure of information, which could be achieved using fragmentation models that have their own computational overhead, key management concerns, and issues in the choice of fragment threshold. Data storage is the central part of cloud computing, where confidentiality is rendered a critical issue to be addressed. The proposed Intelligent Data Fragmentation Model (IDFM) works in two phases, wherein phase I initially concentrates on dividing the data file into smaller chunks according to some random values. Phase II concentrates on recovering the original file from the fact file in case of any disastrous situation. According to experimental results, an intermediate level of confidentiality may be reached using this model, and the efficiency of IDFM is O (n) for any number of data files.
Keywords
Cloud computing, Cloud service providers, Data fragmentation, Data security, Fitness value, Threshold selection.
References
[1] Zhao Jining et al., “Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 96, no. 12, pp. 2709-2716, 2013. Google Scholar | CrossRef | Publisher Link
[2] Swapnil V.Khedkar, and A.D.Gawande “Data Partitioning Technique to Improve Cloud Data Storage Security,” International Journal of Computer Science and Information Technologies, vol. 5, no. 3, pp. 3347-3350, 2014. Google Scholar | Publisher Link
[3] Nesrine Kaaniche, “Cloud Data Storage Security Based on Cryptographic Mechanisms,” (Doctoral dissertation, Institute National des Télécommunications), 2014.
[4] Poonam M. Pardeshi, and Deepali R. Borade, “Improving Data Integrity for Data Storage Security in Cloud Computing,” International Journal of Computer Science and Network Security (IJCSNS), vol. 15, no. 7, pp. 61-67, 2015. Google Scholar | Publisher Link
[5] Mazhar Ali et al., “DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security,” IEEE Transactions on Cloud computing, vol. 6, no. 2, pp. 303-315, 2015. Google Scholar | CrossRef | Publisher Link
[6] Mohammed M. Alani, Elements of Cloud Computing Security: A Survey of Key Practicalities, Springer International Publishing, 2016. Google Scholar | Publisher Link
[7] Mrs. Radhika Chavan, and S.Y.Raut “Cloud Security Solution: Fragmentation and Replication,” International Journal of Advance Research and Innovative Ideas in Education, vol. 2, no. 4, 2016. Google Scholar
[8] P. Sanjeevi P, G. Balamurugan, and P. Viswanathan, “The Improved DROP Security Based on Hard AI Problem in Cloud,” International Journal of Internet Protocol Technology, vol. 9, no. 4, pp. 207-217, 2016. Google Scholar | CrossRef | Publisher Link
[9] P.D. Patni, and S.N. Kakarwal, “Security Enhancement of Data in Cloud Using Fragmentation and Replication,” International Journal of Engineering and Management Research, vol. 6, no. 5, pp. 492-497, 2016. Google Scholar | Publisher Link
[10] S.Suganya, and R.Kalaiselvan, “An Optimization and Security of Data Replication in Cloud Using Advanced Encryption Algorithm.” International Journal of Engineering and Computer Science, vol. 5, no. 6, pp. 2319-7242, 2016. Google Scholar | Publisher Link
[11] S. Jegadeeswari, P. Dinadayalan, and N. Gnanambigai, “Enhanced Data Security Using Neural Network in Cloud Environment,” International Journal of Applied Engineering Research, vol. 11, no. 1, pp. 278-285, 2016. Google Scholar | Publisher Link
[12] Mohamed Al Morsy, John Grundy, and Ingo Müller, “An Analysis of the Cloud Computing Security Problem,” ArXiv preprint, 2016. Google Scholar | Publisher Link
[13] Nidal Hassan Hussein, and Ahmed Khalid “A Survey of Cloud Computing Security Challenges and Solutions.” International Journal of Computer Science and Information Security, vol. 14, no. 1, pp. 52, 2016.
Google Scholar
[14] S. Geetha et al., “Data Leakage Detection and Security Using Cloud Computing,” International Journal of Engineering Research and Applications, vol. 6, no. 3, 2016. Google Scholar
[15] Edwin E.Bijolin, P. Umamaheswari, and M. Thanka Roshni, “Fragmentation and Dynamic Replication Model in Multicloud by Data Hosting with Secured Data Sharing,” Asian Journal of Research in Social Sciences and Humanities, vol. 7, no. 2, pp. 459-474, 2017. Google Scholar | CrossRef | Publisher Link
[16] Jayshri Singh, and Keshav Kori, “Optimal Performance and Security in Cloud Using Division and Replication of Data,” Journal of Network Communications and Emerging Technologies, vol. 7, no. 5, 2017. Google Scholar | Publisher Link
[17] Sahar Abdalla Elmubarak, Adil Yousif, and Mohammed Bakri Bashir, “Performance Based Ranking Model for Cloud SaaS Services,” International Journal of Information Technology and Computer Science, vol. 9, no. 1, pp. 65-71, 2017. Google Scholar | CrossRef | Publisher Link
[18] Ahmed E. Abdel Raouf, Nagwa L. Badr, and Mohamed Fahmy Tolba, “Distributed Database System (DSS) Design over a Cloud Environment,” Multimedia Forensics and security, Intelligent Systems Reference Library, vol. 115, pp. 97-116, 2017. Google Scholar | CrossRef | Publisher Link
[19] N. Mansouri, M. Kuchaki Rafsanjani, and M.M. Javidi, “DPRS: A Dynamic Popularity Aware Replication Strategy with Parallel Download Scheme in Cloud Environments,” Simulation Modelling Practice and Theory, vol. 77, pp. 177-196, 2017. Google Scholar | CrossRef | Publisher Link
[20] Khan Faisal Ali, and Kanade Kalpana, “A Review On-Reducing The Data Attacks on the Cloud by Dividing and Replicating the Data Over Multiple Cloud Nodes,” International Journal of Advance Scientific Research and Engineering Trends, vol. 2, no. 4, 2017. Google Scholar | Publisher Link
[21] M U Omana, S. Nandhini, and R. Priyadharshini, “Improving Security and Performance by Implementing FS Algorithm in Distributed Cloud,” International Journal for Advance Research and Development, vol. 3, no. 4, pp. 96-99, 2018. Google Scholar | Publisher Link
[22] Thulasi Mohan et al., “Divisioning and Replicating Data in Cloud for Optimal Performance and Security,” International Journal of Pure and Applied Mathematics, vol. 118, no. 8, pp.271-274, 2018. Google Scholar | Publisher Link
[23] Dalia Nashat, and Ali A. Amer, “A Comprehensive Taxonomy of Fragmentation and Allocation Techniques in Distributed Database Design,” ACM Computing Surveys, vol. 51, no. 1, pp. 1-25, 2018. Google Scholar | CrossRef | Publisher Link
[24] Salvatore Lentini, Enrico Grosso, and Giovanni L. Masala “A Comparison of Data Fragmentation Techniques in Cloud Servers,” International Conference on Emerging Internetworking, Data & Web Technologies, vol. 17, pp. 560-571, 2018. Google Scholar | CrossRef | Publisher Link
[25] S. V. Divya, R. S. Shaji, P enkadesh, “An Efficient Data Storage and Forwarding Mechanism Using Fragmentation-Replication and DADR Protocol for Enhancing the Security in Cloud,” Journal of Computational and Theoretical Nanoscience, vol. 15, no. 1, pp. 111-120, 2018. Google Scholar | CrossRef | Publisher Link
[26] P. Ravi Kumar, P. Herbert Raj, and P. Jelciana “Exploring Data Security Issues and Solutions in Cloud Computing,” Procedia Computer Science, vol. 125, pp. 691-697, 2018. Google Scholar | CrossRef | Publisher Link
[27] Moin Hasan, and Major Singh Goraya, “Fault Tolerance in Cloud Computing Environment: A Systematic Survey,” Computers in Industry, vol. 99, pp. 156-172, 2018. Google Scholar | CrossRef | Publisher Link
[28] Sandeep Kumar Polu, “Security Enhancement for Data Objects in Cloud Computing,” International Journal for Innovative Research in Science & Technology, vol. 5, no. 6, pp. 18-21, 2018. Google Scholar | Publisher Link
[29] Mostefa Kara et al., “A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction Problem,” 4th International Conference on Future Networks and Distributed Systems, pp. 1-6, 2020. Google Scholar | CrossRef | Publisher Link
[30] R. Sugumar, A. Rajesh, and R. Manivannan, “Performance Analysis of Fragmentation and Replicating Data Over Multi-clouds with Security,” International Conference on Computer Networks and Communication Technologies, vol. 15, pp. 1031-1040, 2019. Google Scholar | CrossRef | Publisher Link
[31] K. R. Sajay, Suvanam Sasidhar Babu, and Yellepeddi Vijayalakshmi, “Enhancing the Security of Cloud Data Using Hybrid Encryption Algorithm,” Journal of Ambient Intelligence and Humanized Computing, pp.1-10, 2019. Google Scholar | CrossRef | Publisher Link
[32] Olly Beckham et al., “Techniques used to Formulate Confidential Data by Means of Fragmentation and Hybrid Encryption,” International Research Journal of Management, IT and Social Sciences, vol. 6, no. 6, pp.68-86, 2019. Google Scholar | CrossRef | Publisher Link
[33] Mahboobeh Najmi, “Investigation of Improving Load Balancing and Data Fragmentation in Cloud Computing Performance,” Indian Journal of Science and Technology, vol. 12, no. 7, pp. 1-9, 2019. Google Scholar | CrossRef | Publisher Link
[34] Nelson Santos et al., “Performance Analysis of Data Fragmentation Techniques on a Cloud Server,” International Journal of Grid and Utility Computing, vol. 10, no. 4, pp.393-401, 2019. Google Scholar | CrossRef | Publisher Link
[35] L. M. Nithya, and P. Anu Priya, “Data Fragmentation and Duplication in Cloud for Secure Performance,” Indian Journal of Science and Technology, vol. 12, no. 20, pp.1-6, 2019. Google Scholar | CrossRef | Publisher Link
[36] S. Sangeetha, and P. Suresh Babu, "An Investigation Analysis on Secured Communication with Big Data," International Journal of Computer Trends and Technology, vol. 70, no. 8, pp. 15-20, 2022.
CrossRef | Publisher Link
[37] Sharifah Hafizah Sy Ahmad Ubaidillah, Noraziah Ahmad, and Julius Beneoluchi Odili, “Fragmentation Techniques for Ideal Performance in Distributed Database–A Review,” International Journal of Software Engineering and Computer Systems, vol. 6, no. 1, pp. 18-24, 2020. Google Scholar | CrossRef | Publisher Link
[38] Riad Mokadem, and Abdelkader Hameurlain, “A Data Replication Strategy with Tenant Performance and Provider Economic Profit Guarantees in Cloud Data Centers,” Journal of Systems and Software, vol. 159, pp. 110447, 2020. Google Scholar | CrossRef | Publisher Link
[39] Shrutika Khobragade, Rohini Bhosale, and Rahul Jiwane, “High Security Mechanism: Fragmentation and Replication in the Cloud with Auto Update in the System,” Computer Science and Information Technologies, vol. 1, no. 2, pp. 78-83, 2020. Google Scholar | CrossRef | Publisher Link
[40] P. Peter Jose, and S.P. Victor, “Cloud Storage Security Scheme using Dynamic Data Division and Replication,” Solid state Technology, vol. 63, no. 6, pp. 9599-9607, 2020. Google Scholar | Publisher Link
[41] S. Periyanatchi, and K. Chitra “A Lion Optimization Algorithm for an Efficient Cloud Computing with High Security,” Journal of Scientific Research, vol. 64, no. 1, pp. 278-284, 2020. Google Scholar | CrossRef | Publisher Link
[42] Priteshkumar Prajapati, and Parth Shah “A Review on Secure Data Deduplication: Cloud Storage Security Issue,” Journal of King Saud University-Computer and Information Sciences, vol. 34, no. 7, pp. 3996-4007, 2020. Google Scholar | CrossRef | Publisher Link
[43] Slim Kallel et al., “Restriction‐Based Fragmentation of Business Processes over the Cloud,” Concurrency and Computation: Practice and Experience, vol. 33, no. 7, pp. 1-1, 2021. Google Scholar | CrossRef | Publisher Link
[44] Ali Shakarami et al., “Data Replication Schemes In Cloud Computing: A Survey,” Cluster Computing, vol. 24, no. 3, pp. 2545-2579, 2021. Google Scholar | CrossRef | Publisher Link
[45] Uros Tos et al., “Achieving Query Performance in the Cloud via a Cost-Effective Data Replication Strategy,” Soft Computing, vol. 25, no. 7, pp. 5437-5454, 2021. Google Scholar | CrossRef | Publisher Link
[46] Quadri Waseem, et al., “Quantitative Analysis and Performance Evaluation of Target-Oriented Replication Strategies in Cloud Computing,” Electronics, vol. 10, no. 6, pp. 672, 2021. Google Scholar | CrossRef | Publisher Link
[47] Tawfiq S. Barhoom, and Mahmoud Y. Abu Shawish, “Text File Privacy on the Cloud Based on Diagonal Fragmentation and Encryption,” Journal of Engineering Research and Technology, vol. 8, no. 1, 2021. Google Scholar | CrossRef | Publisher Link
[48] Annette Shajan, and Shanta Rangaswamy, “Survey of Security Threats and Countermeasures in Cloud Computing,” International Journal for Research & Technology, vol. 2, no. 7, 2021. Google Scholar | Publisher Link
[49] Sridhar Reddy Vulapula, and Hima Bindu Valiveti, “Secure and Efficient Data Storage Scheme for Unstructured Data in Hybrid Cloud Environment,” Soft Computing, pp. 1-8, 2022. Google Scholar | CrossRef | Publisher Link
[50] Yong-Feng Ge et al., “MDDE: Multitasking Distributed Differential Evolution for Privacy-Preserving Database Fragmentation,” The VLDB Journal, pp. 1-19, 2022. Google Scholar | CrossRef | Publisher Link
[51] Bijeta Seth et al., “Integrating Encryption Techniques for Secure Data Storage in the Cloud,” Transactions on Emerging Telecommunications Technologies, vol. 33, no. 4, pp. 4108, 2022. Google Scholar | CrossRef | Publisher Link
[52] S. Yuvaraman, and D. Saveetha, “Secure Cloud Data Storage and Retrieval System Using Regenerating Code,” In Proceedings of International Conference on Deep Learning, Computing and Intelligence, pp. 313-321, 2022. Google Scholar | CrossRef | Publisher Link
[53] K. Rajalakshmi, K. Ramesh, and P.N. Renjith, “Comparative Study of Cryptographic Algorithms in Cloud Storage Data Security,” International Conference on Intelligent Technologies, pp. 1-7, 2022. Google Scholar | CrossRef | Publisher Link
[54] Deepak Kumar Sharma et al., “Modified Minimum Spanning Tree Based Vertical Fragmentation, Allocation and Replication Approach in Distributed Multimedia Databases,” Multimedia Tools and Applications, vol. 81, pp. 37101-37118, 2022. Google Scholar | CrossRef | Publisher Link