RFDA: Reliable framework for data administration based on split-merge policy

Emerging technologies in cloud environment have not only increased its use but also posed some severe issues. These issues can cause considerable harm not only to data storage but also to the large amount of data in distributed file structure which are being used in collaborative sharing. The data s...

Full description

Saved in:
Bibliographic Details
Main Authors: Olanrewaju, Rashidah Funke, Khan, Burhan ul Islam, Baba, Asifa Mehraj, Mir, Roohie Naaz, Lone, Sajaad Ahmad
Format: Conference or Workshop Item
Language:English
English
English
Published: Institute of Electrical and Electronics Engineers Inc. 2016
Subjects:
Online Access:http://irep.iium.edu.my/72893/1/72893_RFDA_SCOPUS.pdf
http://irep.iium.edu.my/72893/7/72893_RFDA%20Reliable%20Framework.pdf
http://irep.iium.edu.my/72893/8/72893_RFDA%20Reliable%20Framework_WOS.pdf
http://irep.iium.edu.my/72893/
https://ieeexplore.ieee.org/document/7556033
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
English
English
Description
Summary:Emerging technologies in cloud environment have not only increased its use but also posed some severe issues. These issues can cause considerable harm not only to data storage but also to the large amount of data in distributed file structure which are being used in collaborative sharing. The data sharing technique in the cloud is prone to many flaws and is easily attacked. The conventional cryptographic mechanism is not robust enough to provide a secure authentication. In this paper, we overcome this issue with our proposed Reliable Framework for Data Administration (RFDA) using split-merge policy, developed to enhance data security. The proposed RFDA performs splitting of data in a unique manner using 128 AES encryption key. Different slots of the encrypted key are placed in different places of rack servers of different cloud zones. The effectiveness and efficiency of the proposed system are analyzed using comparative analysis from which it is seen that the proposed system has outperformed the existing and conventional security standard.