High Security Mechanism: Fragmentation and Replication in the Cloud with Auto Update in the System.
Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of filles is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology.
 D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Future Generation Computer Systems, Vol. 28, No. 3, Pp. 583-592, 2012.
 M. Hogan, F. Liu, A.Sokol, and J. Tong, “NIST cloud computing standards roadmap,” NIST Special Publication, 2011.
 A. N. Khan, M. L. M. Kiah, S. U. Khan, and S. A. Madani, “Towards Secure Mobile Cloud Computing: A Survey”, Future Generation Computer Systems, Vol. 29, No. 5, Pp. 1278-1299, 2013.
 A. Mei, L. V. Mancini, and S. Jajodia, “Secure dynamic fragment and replica allocation in large scale distributed file systems,” IEEE Transactions on Parallel and Distributed Systems, Vol. 14, No. 9, Pp. 885-896, 2003.
 A. Juels and A. Opera, “New Approaches to Security and Availability for Cloud Data”, Communications of ACM, Vol. 56, No. 2, Pp. 64-73, 2013.
 G. Kappes, A. Hatzieleftheriou, and S. V. Anastasiadis, “Dike: Virtualization-aware Access Control for Multi Tenant Filesystems”, University of Ioannina, Greece, Technical Report No.DCS 2013-1, 2013.
 Y. Tang, P. P. Lee, J. C. S. Lui, and R. Perlman, “Secure overlay cloud storage with access control and assured deletion,” IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 6, Pp.903-916, 2012.