Open Access Open Access  Restricted Access Subscription or Fee Access

Increasing Data Availability in Cloud using Seeding Concept

S. Jeyadevan, Dr.S. Basavaraj Patil

Abstract


Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth. Cloud computing provides computation, software applications, data access, data management and storage resources without requiring cloud users to know the location and other details of the computing infrastructure. In cloud data are stored in cloud server in fragmented format. When more number of users try to access same file then traffic will occur in cloud. To solve this problem we proposed Increasing Data Availability in Cloud using Seeding Concept (IDACC) model in cloud computing which helps to reduce traffic in cloud and cost of the storage data.

Keywords


Cloud Computing, Data Availability, Security, Storage, Cost-Effective, Cloud Service Provider.

Full Text:

PDF

References


P. Samarati and S.De Capitani di Vimercati. Data Protection in Out-sourcing Scenarios: Issues and Directions, in Proc. Of ASIACCS 2010, Beijing, China, April 2010.

W. Wang, Z. Li, R. Owens , and B. Bhargava. Secure and Efficient Access to Outsourced Data, in Proc. of CCSW 2009, the 2009 ACM Workshop on Cloud Computing Security .

G. Aggarwal, et al. Two can keep a secret: a distributed architecture for secure database services, in: Proc. CIDR 2005,Asilomar, CA, USA, January 2005.

V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia,S.Paraboschi, and P. Samarati, Fragmentation design for efficient query execution over sensitive distributed databases, in: Proc. Of ICDCS 2009, Montreal, QC, Canada, June 2009.

V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Keep a few: Outsourcing data while maintaining confidentiality, in: Proc. of ESORICS 2009, Saint Malo, France, September 2009.

V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Enforcing Confidentiality Constraints in: Proc. of DBSec 2009, Montreal, QC, Canada, July 2009.

V. Ciriani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Selective data outsourcing for enforcing privacy, in: Journal of Computer Security (2011), 531-566.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.