An Efficient Data Segmentation and Replication Technique for Cloud using Fruit Fly Optimized Centrality Measures
S.Periyanatchi1, K.Chitra2

1S. Periyanatchi, Research Scholar, Bharathiyar University, Coimbatore (TamilNadu), India.

2Dr. K. Chitra, Associate Professor, Department of Computer Science Engineering, Govt Arts College, Melur (TamilNadu), India.

Manuscript received on 08 April 2019 | Revised Manuscript received on 15 April 2019 | Manuscript Published on 26 July 2019 | PP: 497-501 | Volume-8 Issue-6S4 April 2019 | Retrieval Number: F11040486S419/19©BEIESP | DOI: 10.35940/ijitee.F1104.0486S419

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cloud computing is a creating worldview to give dependable and versatile framework permitting the clients (data proprietors) to store their data and the data customers (clients) can get to the data from cloud servers. This paradigm decreases stockpiling and upkeep cost of the data proprietor. However, cloud data storage still gives rise to security related problems. In case of shared data, the data face both cloud-specific and insider threats. In this work, we propose FOA( fruit fly optimization algorithm ) optimized centrality measure fragmentation and replication of information in the cloud for optimum performance and security that consider both security and performance issues. FOA is a technique for deducing global optimization based on the foraging character of the fruit fly. The sensory perception of the fruit fly is superior than that of other species, particularly the sense of smell and vision . In our methodology, we divide a data files and replicate the fragmented data over the cloud nodes using FOA centrality measures. Every one of the cloud node just store a single information data fragment that ensures even if there arise an occurrence of a successful attack ,no important information is shown to the attacker .We also compare the performance of the our methodology with other standard replication schemes. Observed results shows higher level of security and performance imrpovements.

Keywords: Cloud for Optimum Performance and Security that Consider Both Security and Performance Issues.
Scope of the Article: Computer Science and Its Applications