DSS: Divide Share and Secure of Data Over cloud for enhancing Security and Performance in multi-cloud environment

  • Sajja Krishna Kishore, Gudipati Murali


As with cloud-computing, outsourcing to management poses a security issue. Data may be mapped due to other way of users, clients and nodes across the cloud. Thereafter, a very-high level of security is required to protect data within the multi-cloud. However, the security strategy used should focus on optimizing the timing of information retrieval. In this paper, we propose the sharing of DSS data for optimal performance and security, which addresses security and performance issues together. According to the DSS method, the file is divided into fragments and the split data is copied to the cloud node. Each node stores only a portion of a specific information file, which ensures that the attacker does not have any meaningless information, even if it is successfully attacked. In addition, the nodes that store the fragments are separated by a certain distance using T-staining to prevent the intruder from predicting the location of the fragments. Furthermore, the DSS methodology is not based on traditional cryptographic methods to ensure data security the uploaded file are owners data is classified into three different fragments and encrypted individually with generated keys which helps in providing high security; thus eliminating the costly system of calculations and provided high efficiency and security across multi cloud environment. We show that it is very unlikely that all nodes that store fragments of a single file will be placed and compromised. We also compare the performance of the DSS methodology with the other 10 schemes. A high -level of security with the enhancement of performance was observed.

How to Cite
Sajja Krishna Kishore, Gudipati Murali. (2020). DSS: Divide Share and Secure of Data Over cloud for enhancing Security and Performance in multi-cloud environment. International Journal of Advanced Science and Technology, 29(05), 10845 - 10851. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/24238