CFP last date
20 December 2024
Reseach Article

An Improved Ec2s2 Framework for Secure Storage Virtualization

by Gurvir Kaur, Gagandeep Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 144 - Number 2
Year of Publication: 2016
Authors: Gurvir Kaur, Gagandeep Kaur
10.5120/ijca2016910108

Gurvir Kaur, Gagandeep Kaur . An Improved Ec2s2 Framework for Secure Storage Virtualization. International Journal of Computer Applications. 144, 2 ( Jun 2016), 10-15. DOI=10.5120/ijca2016910108

@article{ 10.5120/ijca2016910108,
author = { Gurvir Kaur, Gagandeep Kaur },
title = { An Improved Ec2s2 Framework for Secure Storage Virtualization },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2016 },
volume = { 144 },
number = { 2 },
month = { Jun },
year = { 2016 },
issn = { 0975-8887 },
pages = { 10-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume144/number2/25150-2016910108/ },
doi = { 10.5120/ijca2016910108 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:46:32.631433+05:30
%A Gurvir Kaur
%A Gagandeep Kaur
%T An Improved Ec2s2 Framework for Secure Storage Virtualization
%J International Journal of Computer Applications
%@ 0975-8887
%V 144
%N 2
%P 10-15
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The expanding interest for storage and computation has driven the development of vast information centers–the gigantic server cultivates that run huge numbers of today's Internet and business applications. This work proposes another upgraded design for storage virtualization. In a local customer server environment stores information, as well as oversees information appropriately. The principle center of this work is to accomplish four noteworthy goals. In the first place, security parameter where another chronicled data based approach is utilized which stores the MAC address so that there is one time security check along these lines lessening the time and expanding the property. Second metadata creation, in this duplication is uprooted by evacuating the copy words and utilizing the new indexing plan to diminish the span of metadata and hunt time where is enhanced the execution of the framework. At long last, the records are compacted with a misfortune less pressure technique and it is being scrambled and put away in the database therefore diminishing the storage room and securing the document by encoding the record.

References
  1. Chuanyi LIU, Dapeng JU, Yu GU, Youhui ZHANG, Dongsheng WANG and David H.C.Du, (2008), Semantic Data de-Duplication for Archival Storage Systems, 13th IEEE Asia-Pacific Computer Systems Architecture Conference, pp. 1–9.
  2. Deepa Raj and Seema Gupta, Framework of Adaptive Lossless Compression with Block Wise Data, 2015 International Conference on Advances in Computer Engineering and Applications (ICACEA), pp. 103–107, March 2015.
  3. Felipe Díaz, Elias A. Doumith and Maurice Gagnaire, (2011), Impact of Resource Over-Reservation (ROR) and Dropping Policies on Cloud Resource Allocation, 2011 3rd IEEE International Conference on Cloud Computing Technology and Science, pp. 470–476.
  4. Jun Wei Ge, Yong Long Deng, and Yi Qiu Fang, (2010), Research on Storage Virtualization Structure in Cloud Storage Environment, 2010 International Conference on Multimedia Technology, ICMT 2010, pp. 1-4.
  5. Kai Quian, Letian Yi and Jiwu Shu, ThinStore: Out-of-Band Virtualization with Thin Provisioning, 6th IEEE International Conference on Networking, Architecture, and Storage, pp. 1–10, July 2011.
  6. Lei Liu, (2008), An Autonomous Search Method for Storage Virtualization, International Conference on High-Performance Clustered Computing, pp.1-10.
  7. Lin Qiao, Balakrishna R. Iyer, Divyakant Agrawal and Amr El Abbadi, SVL: Storage Virtualization Engine Leveraging DBMS Technology. 21st International Conference on Data Engineering (ICDE), pp. 1048–1059, April 2005.
  8. R.Aishwarya and Dr.S.Malliga, (2014), Intrusion detection system- An efficient way to thwart against Dos/DDos attack in the cloud environment, 2014 International Conference on Recent Trends in Information Technology,
  9. Sandeep Kumar and Syam Kumar P, Secure and Efficient Design and Implementation of out-of-band Storage Virtualization, 2015 IEEE International Advance Computing Conference (IACC), pp. 1021–1025, June 2015.
  10. Sho Kawahara and Kenichi Kourai, (2014). The Continuity of Out-of-band Remote Management Across Virtual Machine Migration in Clouds, IEEE/ACM 7th International Conference on Utility and Cloud Computing, pp. 176–185.
  11. Tzu-Fang Sheu, Nen-Fu Huang and Hsiao-Ping Lee, 2010. In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm, IEEE Transactions on Dependable and Secure Computing, Vol. 7, No. 2, June 2010, pp. 175-188.
  12. Xiaolong Xu and Qun Tu, (2015). Data Deduplication Mechanism for Cloud Storage Systems, 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 286-294.
  13. Yingping LU, Chuanyi LIU, Chunhui Shi, Guanlin LU, David H.C.Du and Dongsheng WANG, (2008), ADMAD: Application-Driven Metadata Aware de-Duplication Archival Storage System, 5th IEEE International Workshop on Storage Network Architecture and Parallel I/Os, pp. 29–35.
  14. Zhen Qin, Xian-ping Tao, Yu Huang, Jian Lu and Tao Wu, (2010) Policy Generation for Privacy Protection Based on Granular Computing, 7th Web Information Systems and Applications Conference, WISA 2010, pp. 53–58.
  15. Songchun Gong, Songyin Fu, and Zheng Chen, Research on the Key Technologies of Storage Virtualization, 2012 International Conference on Cybernetics and Informatics, Springer, Volume 163, 2014, pp. 1273-1279.
Index Terms

Computer Science
Information Sciences

Keywords

Storage virtualization thin provisioning indexing.