16-06-2014, 11:33 AM
File Splitting
File Splitting.docx (Size: 15.61 KB / Downloads: 11)
Abstract
In addition, providing better privacy as well as ensuring data availability can be achieved by dividing the user’s data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block. In this paper, we propose a secured cost-effective multi-fill split and multi storage model in cloud computing which holds an economical distribution of data among the available SPs in the market, to provide customers with data availability as well as secure storage
EXISTING SYSTEM
The users have to trust the cloud service provider (SP) with security of their data. In, the author discussed the criticality of the privacy issues in cloud computing, and pointed out that obtaining information from a third party is much easier than from the creator himself. Following the pattern of paradigm shift, the security policies also evolved from the conventional cryptographic schemes applied in centralized and distributed data storage, for enabling the data privacy
PROPOSED SYSTEM
Our proposed approach will provide the cloud computing users a decision model, that provides a better security by distributing the data over multiple cloud service providers in such a way that, none of the SP can successfully retrieve meaningful information from the data pieces allocated at their servers. Also, in addition, we provide the user with better assurance of availability of data, by maintaining redundancy in data distribution. In this case, if a service provider suffers service outage or goes bankrupt, the user still can access his data by retrieving it from other service providers
[b]File Splitting
In this paper, we propose a secured cost-effective multi File Splitting storage model in cloud computing which holds an economical distribution of data among the available SPs in the market, to provide customers with data availability as well as secure storage. Our results show that, our proposed model provides a better decision for customers according to their available budgets
Validation Module
In this module, the users create the dynamic form in a particular name. Once user to enter the submit button the form is created. Then, the user set the validation to the dynamic fields based on the user requirements. If the user does not insert the value in a particular validation field, system automatically display the validated word
Insert Module
The user is giving value to the particular form. Based on the user requirements it will be check to the validation conditions. While entering the value does not match or correct in a validation condition automatically to stop them. The users enter the correct details from the textbox. The data will be stored in a dynamic table to the database