A Survey on Drops: Division and Replication of Data in Cloud for Optimal Performance and Security

IJCSEC Front Page

The people with disabilities are facing problem for moving one place to another. An android based wheelchair can provide a feasible solution to their problem. The android technology provides a new approach of human interaction with machines or tools. This design helps the people with disability to live their life with less dependence on others. This project is designed to control a wheelchair by using an android application with facilities of button movement, voice system and accelerometer movement. It also includes the features such as obstacle detection, displays basic needs of patient with an alert, heart rate monitoring, temperature monitoring and an automatic message on emergency condition. In addition, line following algorithm based movement is also included. A Wi–Fi camera is embedded in the wheelchair for totally disabled person, so that the others can control the wheelchair. The control unit consists of PIC16F877A microcontroller with Bluetooth module HC05, Heart beat sensor, temperature sensor LM35, Infrared sensor and L293D motor driving IC for controlling motor.

Keywords: Cloud Computing, DROPS, Fragmentation, Replication, Security, Storage, T- coloring


  1. Wayne A. Jansen, "Cloud Hooks: Security and Privacy Issues in Cloud Computing" Proceedings of the 44th Hawaii International Conference on System Sciences - 2011.
  2. G. Kappes, A.Hatzieleftheriou, S.V.Anastasiadis, "Virtualization-aware Access Control for Multitenant Filesystems" 978-1-4799-5671-5/14/$31.00 © 2014 IEEE.
  3. Yang Tang, Patrick P.C. Lee, John C.S.Lui, Radia Perlman, "Secure Overlay Cloud Storage with Access Control and Assured Deletion" IEEE transactions on dependable and secure computing, vol.9, No.6, November/December 2012.
  4. Thanasis Loukopoulos, Ishfaq Ahmad, "Static and adaptive data replication algorithms for fast information access in large distributed systems" IEEE International conference on Disributed Computing Systems.
  5. Yves Deswarte Laurent Blain Jean-Charles Fahe, "Intrusion Tolerance in Distributed Computing Systems" CH2986-8/91/0000/0110$01 .OO@ 1991 IEEE.
  6. Abdul Nasir Khan, M.L. Mat Kiah, Sajjad A. Madan, Atta ur Rehman Khan, Mazhar Ali,"A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach" Jouranl of Grid Computing, Volume 13 Issue4, December 2015,pp.651-675.
  7. Samee Ullah Khan, Ishfaq Ahmad, "Comparison and analysis of ten static heuristics- based Internet data replication techniques", J. Parallel Distrib. Comput. 68 (2008) 113–136.
  8. Alessandro Mei, Luigi V. Mancini, Sushil Jajodia, "Secure dynamic fragment and replica allocation in large-scale distributed file systems" IEEE Transactions on Parallel and Distributed Systems, 14(9), 885-896.
  9. Jaydip Sen, "Security and privacy issues in cloud computing", Innovation Labs, Tata Consultancy Services Ltd., Kolkata, India.
  10. Dr G.Kesavaraj, K.Anitha, R.Divya, "Addressing cloud computing security issues", IJIRCCE vol.4 issue 6 June 2016.
  11. Aiqiang Gao, Luhong Diao, "Lazy Update Propagation for Data Replication in Cloud Computing" 978-1-4244-9142-1/10/$26.00©2010 IEEE.