Migrating Data Between Physical Server and Cloud: Improving Accuracy and Data Integrity

The Cloud (Cloud Computing) has been the center of attraction for both businesses and organizations. As the organizations make the ultimate decision of embracing the technology and moving their services and data to the Cloud, a greater danger of losing the data in the process of migrating from the traditionally physical computing to Cloud computing is something that cannot be overlooked. In this paper, we propose a system that detects and eliminates data loss, incomplete transfer or modification of data during the migration process from the traditionally physical computing to cloud computing. This system will ensure that the migrated data in the cloud server is an exact replica of the data in the physical server from which the data is being migrated from. This will be achieved by a combination of algorithms that will segment, encrypt and compare the migrated data with the original data beside 3-way handshake signaling protocol that has never been effectively implemented in the cloud computing migration environment.

[1]  K. Patel,et al.  Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing , 2016 .

[2]  Ya Juan Zhang,et al.  On Data Security and Encryption Algorithms in Cloud Environment , 2014 .

[3]  Yitzhak Birk,et al.  Deferred segmentation for wire-speed transmission of large TCP frames over standard GbE networks , 2001, HOT 9 Interconnects. Symposium on High Performance Interconnects.

[4]  Mykola Karpinskyy,et al.  Reliability of RSA algorithm and its computational complexity , 2003, Second IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2003. Proceedings.

[5]  Xiaoqi Ma,et al.  Analysing the EAP-TLS handshake and the 4-way handshake of the 802.11i standard , 2014 .

[6]  Jianqiang Li,et al.  Computation Partitioning for Mobile Cloud Computing in a Big Data Environment , 2017, IEEE Transactions on Industrial Informatics.

[7]  Meng Liu,et al.  Using segmentation to improve schedulability of real-time traffic over RRA-based NoCs , 2016, SIGBED.

[8]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[9]  Manoj V. Thomas,et al.  Big Data Migration between Data Centers in Online Cloud Environment , 2016 .

[10]  Pratosh Bansal,et al.  Emphasizing on Various Security Issues in Cloud Forensic Framework , 2017 .

[11]  Katsuyoshi Iida,et al.  Multipath Transmission Model and Its Route Selection Policy Considering Packet Re-sequencing Buffers Availability , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops.

[12]  Parvinder Kaur,et al.  Integration of Heterogeneous Cloud Storages through an Intermediate WCF Service , 2015 .

[13]  Yu Chen,et al.  Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices , 2010, 2010 18th Euromicro Conference on Parallel, Distributed and Network-based Processing.

[14]  Shiping Chen,et al.  Secure Data Sharing in the Cloud , 2014 .

[15]  Yuan Jun Zou Cloud Data Management Based on Cloud Computing Technology , 2014 .