Cloud Computing: Provide privacy and Security in Databaseas-a-Service
|
|
|
- Ernest Butler
- 10 years ago
- Views:
Transcription
1 Cloud Computing: Provide privacy and Security in Databaseas-a-Service By Alok Kumar, Saurabh Sharma, Sandeep Saxena IIT,Mumbai,India BSACET, Mathura,India NIT,Durgapur,India ABSTRACT Cloud computing Environment provides the platform to share computing resources and provide different services like SaaS, PaaS and IaaS that will used by organization as private, public or Hybrid. Cloud computing basically known as Everythingas-a-service.Since cloud computing is used shared distributed resources over the world wide network (e.g., internet) in the open environment, thus it will create various security issues in cloud environment and their application. On our personal computer we have full control on data and processes but in cloud environment we used data and application services which are provided by some of other Cloud Service Providers (CSP) (e.g., AWS, Google docs, Go Grid etc.).we overcome these issues of security and privacy by using Radius server which is known as AAA server (Authentication, Authorization and Accounting). Using this we will secure our CSP main server that further link with Data Center which store database of various cloud users. We use client password to encrypt and decrypt their data when they access or store data in Cloud Data Center (CDC). Keywords Cloud computing, Radius server, cloud security, database-asa-service, privacy, information security 1. INTRODUCTION 1.1 Cloud Computing Cloud computing is an increasingly popular technology for accessing computing resources using network connections. There are lots of cloud computing definitions [1], [2], [3] but the most accepted definition is from USA NIST (National Institute of Standards and Technology), which lays out five essential characteristics: on-demand self-service, broad network access, resource pooling, rapid elasticity and measured service. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. [4] Physical resources, infrastructure, middleware platforms and applications are being provided and consumed as services in the cloud computing. Main service models include: Infrastructure as a service (IaaS) displaces in-house servers, storage and networks by providing those resources ondemand. Instead of purchasing a server, users can now provision one within minutes and discard it when they are finished, often paying by the hour only for what they actually used. Platform as a service (PaaS) adds a layer to the infrastructure, providing a platform upon which applications can be written and deployed. These platforms aim to focus the programmers on the business logic, freeing them from the worries of the physical (or virtual) infrastructure. Software as a service (SaaS) refers to applications running on cloud infrastructures, typically delivered to the end user via a web browser. Cloud Database-as-a-Service (DaaS) hosts databases in the cloud environment and provides database features such as data definition, storage and retrieval, on a subscription basis over the Internet. Main cloud computing providers (Amazon, Google, IBM, Microsoft, Oracle) are targeting the DaaS market with their cloud DaaS solutions. DaaS solutions started as very simple, such as Amazon SimpleDB a keyvalue type of database, but more sophisticated offerings evolved to support larger and more complex applications, such as Amazon Relational Database Service (RDS) with the full features and capabilities of a relational database. A. Amazon Web Services (AWS) The most prominent cloud computing provider today is Amazon with its Amazon Web Services (AWS). Amazon 1
2 not only offers the most complete stack of services, but makes it especially easy to integrate different services. [5] There are three database solutions available at AWS: i) Amazon Relational Database Service (RDS) [6] ii) Amazon EC2 [7] iii) Amazon SimpleDB [8] B. Microsoft SQL Azure Microsoft SQL Azure Database is a cloud-based relational database service built on SQL Server technologies. It provides a highly available, scalable, multi-tenant database service hosted in the cloud. SQL Azure Database helps to ease provisioning and deployment of multiple databases. [9] C. Google AppEngine Datastore Google AppEngine Data store is built on BigTable [10], Google's internal storage system for handling structured data. In and of itself, the AppEngine Data store is not a direct access mechanism to BigTable, but can be thought of as a simplified interface on top of BigTable. The AppEngine Data store supports much richer data types within items than SimpleDB, including list types, which contain collections within a single item. [11] When sharing of physical resources in a cloud infrastructure, data security and privacy cannot be guaranteed by physical boundaries of machines or networks. [12], [13], [14] Interfaces offered by DaaS providers are proprietary in nature and thus can be difficult to leverage from applications that need to access the data So users need to understand and test their interfaces and/or APIs. Some DaaS providers offer only a subset of the capabilities found in traditional on-premise enterprise databases. For example, stored procedures and triggers may not be supported in the same manner as in onpremise databases. Scalability, traditional databases do not scale effectively to thousands of nodes being deployed in a massively shared infrastructure though advance planning must be applied [15] Cloud computing will need to find ways to protect client privacy. One way is to use authentication techniques such as user names and passwords. Another is to employ an authorization format -- each user can access only the data and applications relevant to his or her job. Cloud has centralized server administration system Centralized server administers the system, balances client supply, adjusts demands, monitors traffic Here, all the data are backed up at multiple locations. In cloud computing, it is very common to store data of multiple customers at one common location. Cloud computing should have provide proper techniques for data security and confidentiality. 1.2 Radius Server RADIUS technology was developed in the nineties as an access server authentication and accounting protocol, massively deployed in order to solve authentication concerns raised by the increasing number of users who aimed to reach their Internet Service Provider by mean of modems based on PPP protocols. It was then again largely exploited when IEEE 802.1x architecture was introduced, for RADIUS is the key protocol of AAA architecture (Authentication, Authorization and Accounting) and it supports access control mechanisms for wired and wireless infrastructures. RADIUS enables centralized management of authentication data, such as usernames and passwords. When a user attempts to login to a RADIUS client, such as a router, the router send the authentication request to the RADIUS server. The communication between the RADIUS client and the RADIUS server are authenticated and encrypted through the use of a shared secret, which is not transmitted over the network. The RADIUS server may store the authentication data locally, but it can also store authentication data in an external SQL database or an external UNIX /etc/password file. It can also plug into PAM (Pluggable Authentication Service) architecture to retrieve authentication data. The role of the RADIUS server as the centralized authentication server makes is an excellent choice for also performing accounting. It can significantly increase security by enabling the centralization of password management. Of course, the other side of that argument is that once you take over the RADIUS server, you have everything. RADIUS servers are available from many vendors. In addition, GNU RADIUS is an excellent non-commercial option. It utilizes the MD5 algorithm for secure password hashing.. 2. RELATED WORK Cloud Computing has been envisioned as the next generation architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the Application software, System software and databases to the large data centers, where the management and security of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security issues which have not been well understood. Cong Wang et al. were focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users data in the cloud, they propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks. [16] Jian Wang et al. where says that Privacy is an important issue for cloud computing, both in terms of legal compliance and user trust, and needs to be considered at every phase of design. Their paper provides some privacy preserving technologies used in cloud computing services. Basically used Anonymity based method for privacy preservation in cloud computing. [17] Zhang Jian-hua et al. was proposed an architecture of cloud storage and presents the deployment of the disaster recovery and other applications in inter-private cloud storage, which can achieve a true cloud computing shown in figure 1. [18] 2
3 3. PROPOSED WORK As well as technology grow; security issues are rapidly increasing in various dimensions and it very difficult to make any system completely free from vulnerability. In any system three major issues are concerns that are unforgettable as follow: Authentication Authorization Accounting In this research we focus on client privacy and security when he store his data on cloud and take database-as-a-service from cloud Service Provider (CSP). Figure 1: The typical architecture of disaster recovery system V. Mateljan et al. were Proposed Return On Investment (ROI) analysis outlines how to decide and the things to consider whether an application is suited for a cloud computing environment, on-premise (inhouse) infrastructure or to outsourcing to managed services. They give formula to calculate ROI in DaaS. [19] The most appropriate ROI formula (1) for evaluating IT investments is net project benefits divided by cost. The ratio is usually expressed as a percentage when the fractional values are multiplied by 100. Net benefits are project benefits minus project costs. [20] Second aspect of database security is also cover in basic level to ensure that secure the data of client on cloud storage servers. It will manage with the help of encryption /decryption management scheme on cloud server. We start our research from AAA services analysis and we select Radius server for these services and install and check out it and will add in cloud environment. We find that Radius server is a best suited for cloud environments to make sure client identity authenticated and what type of authorized services is provisioned to client. It will also used to accounting services through which we can account the client cloud provisioning services. ROI (%) = (Net Project Benefits *100)/Project Costs. (1) Yan Zhao et al. were propose a novel privacy preserving approach based on k-anonymity model and multidimensional model, which combines global recoding and local recoding technology and provides privacy preserving in data publishing. The novel anonymity strategy can efficiently and Dynamically designate sensitive information according to the requirements of users. Then we develop an anonymous strategy algorithm which adapts to the anonymity strategy and achieves the purpose of preventing homogeneity attack and background knowledge attack. [21] Chenguang Wang, Huaizhi Yan were proposed a method to solve cloud computing security issue with private face recognition. The method has three parts: user part provides face images; cloud initialization part has a face subspace and templates database; cloud private matching identification part contains the core algorithm of the method, comparing two encrypted numbers under double-encrypted conditions. The experimental results show the method can ensure that cloud neither know user s real face data, nor the face private matching identification result, to make user s face data secure, we develop a credible, efficient, low-complex method to guarantee cloud computing security. [22] Lior Okman et al. were reviews two of the most popular NoSQL databases (Cassandra and MongoDB) and outlines their main security features and problems. [23] Figure 2: Working of AAA Server (E.g. Radius Server) [24] Figure 2 represent working of Radius Server, in which shows how client interact with cloud server to use their space for uploading/ downloading data files on cloud server. To connect with Cloud server (Database Server), three steps involve in this process. Step 1: client send connect request to NAS client which forward request to Radius Server. Which authenticate user and send acknowledge to NAS client. Step 2: if user is authenticated then access Accept otherwise Request Reject and process is end here. Step 3: if user is authenticated then accounting request is start and Accounting Session is start during complete login period till disconnected. 3
4 4. Experimental Setup In this research we use Linux environment to implement our model, we are simply deploy Eucalyptus in Virtual Machine to create a cloud Environment for testing. In which we are create a single server as cloud server (CSP) and create multiple client to access the services provides CSP. Here is not need to discuss complete implementation setup. keys to encrypt and decrypt data during access and this key is private and takes from cloud user as database password. 6. Conclusion The cloud services is rapidly growing and favoring the new advent of service providers. User confidence and its privacy is the biggest challenging phenomenon for cloud service providers. In this paper we proposed a novel Authentication and privacy and its legal jurisdiction to assure the confidentiality of user of clouds. In order to perform Authentication, Authorization and Accounting of users accounts To make this process right there is a procedure of service level agreement with customer. In future we will focus on the rule base of security matrix and integrity part of user s data. Figure 3: Eucalyptus cloud capacity in cloud environment. 5. CONCEPT IMPLEMENTAION 7. REFERENCES [1] B. Hayes, "Cloud computing", Communications of the ACM, (7):9 11, [2] J. Geelan, "Twenty one experts define cloud computing", Electronic Magazine, [3] G. Gruman and E. Knorr, "What cloud computing really means", InfoWorld, [4] P. Mell and T. Grance, The NIST Definition of Cloud Computing; (accessed ) h [5] Amazon Web Services (AWS), (accessed ) [6] Amazon EC2 - Relational Database Amazon Machine Image (AMI), /#relational, (accessed ) [7] Amazon Relational Database Service (RDS), (accessed ) Figure 4: cloud architecture for DaaS with Radius Server In this research we have install RADIUS server in our proposed architecture in which we are used some cryptographic techniques to encrypt/decrypt our database during storage/retrieval. This is very much secure and useful service which provide more privacy and security to client user in comparative we had discuss in previous proposed techniques in related work in this paper. In this architecture, when external user try to access cloud resources in cloud environment they first interact with RADIUS installed Gateway on which they authenticate itself that he is right user. On the basis of their authenticated account we identified their authorized services to which they are allow to access. In run time when user access resources in cloud environment Radius Server monitor their access each and every time. If Radius Server fined any unauthorized access then it reports to main cloud server and save details of that cloud user in main server. In this implementation cloud main server used some cryptographic techniques and used [8] Amazon SimpleDB, (accessed ) [9] Microsoft SQL Azure, (accessed ) [10] BigTable, (accessed ) [11] Google AppEngine Datastore, (accessed ) [12] E. Mykletun and G. Tsudik, Incorporating a secure coprocessor in the database-as-a-service model, IWIA, [13] S. Pearson, "Taking Account of Privacy when Designing Cloud Computing Services", CLOUD 09, [14] W. K. Wong, W. Cheung, B. Kao, and N. Mamoulis, Secure knn Computation on Encrypted Databases, 4
5 SIGMOD, 2009 Journal of Advanced Computing and Communication Technologies (ISSN: ) [15] Z. Wei, G. Pierre and C.H. Chi, "Scalable Transactions for Web Applications in the Cloud", Proceedings of the Euro- Par conference, [16] Cong Wang, Qian Wang, and Kui Ren Ensuring Data Storage Security in Cloud Computing published in IEEE [17] Jian Wang Yan Zhao Shuo Jiang Jiajin Le Providing Privacy Preserving in cloud computing published in IEEE 2009 International Conference on Test and Measurement. [18] Zhang Jian-hua and Zhang Nan Cloud Computing-based Data Storage and Disaster Recovery published in IEEE 2011 International Conference on Future Computer Science and Education. [19] V. Mateljan et al. Cloud Database-as-a-Service (DaaS) - ROI published in IEEE MIPRO 2010, May 24-28, 2010, Opatija, Croatia. [20] B. Roulstone and J.J. Phillips, "ROI for Technology Projects: Measuring and Delivering Value", Elsevier, [21] Yan Zhao,Yongcheng Luo, Jian Wang and Jiajin Le, A Novel Privacy Preserving Approach for Database Security 2009 International Conference on Test and Measurement. [22] Chenguang Wang, Huaizhi Yan Study of Cloud Computing Security Based on Private Face Recognition published in IEEE [23] Lior Okman, Nurit Gal-Oz, Yaron Gonen, Ehud Gudes and Jenny Abramov, Security Issues in NoSQL Databases published in 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11 [24] Image hosted on 5
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
How To Design A Cloud Data Storage Service For A Cloud Computer System
Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
Private Cloud in Educational Institutions: An Implementation using UEC
Private Cloud in Educational Institutions: An Implementation using UEC D. Sudha Devi L.Yamuna Devi K.Thilagavathy,Ph.D P.Aruna N.Priya S. Vasantha,Ph.D ABSTRACT Cloud Computing, the emerging technology,
A Study of Infrastructure Clouds
A Study of Infrastructure Clouds Pothamsetty Nagaraju 1, K.R.R.M.Rao 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur., Affiliated to JNTUK,
Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009
Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
A Secure and Dependable Cloud Storage Service in Cloud Computing
A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
Cloud & Security. Dr Debabrata Nayak [email protected]
Cloud & Security Dr Debabrata Nayak [email protected] AGENDA General description of cloud Cloud Framework Top issues in cloud Cloud Security trend Cloud Security Infrastructure Cloud Security Advantages
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011 Cloud Basics Cloud Basics The interesting thing about cloud computing is that we've redefined cloud computing to include everything
How To Ensure Correctness Of Data In The Cloud
Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Security & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
What Is It? Business Architecture Research Challenges Bibliography. Cloud Computing. Research Challenges Overview. Carlos Eduardo Moreira dos Santos
Research Challenges Overview May 3, 2010 Table of Contents I 1 What Is It? Related Technologies Grid Computing Virtualization Utility Computing Autonomic Computing Is It New? Definition 2 Business Business
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1)
EMPOWER DATA PROTECTION AND DATA STORAGE IN CLOUD COMPUTING USING SECURE HASH ALGORITHM (SHA1) A.William Walls Research Scholar Department of Computer Science SSM College of Arts and Science Komarapalayam,
How To Compare Cloud Computing To Cloud Platforms And Cloud Computing
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Platforms
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor
I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification
The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
Security in Data Storage and Transmission in Cloud Computing
Security in Data Storage and Transmission in Cloud Computing Ramawat Lokesh Kumar B. Tech 3 rd year, Alliance College of Engineering and Design Alliance University, Bengaluru, India P Dhananjay B. Tech
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD
IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Chapter 1 Introduction
1 1.1. Cloud Computing Chapter 1 Introduction Cloud computing provides the next generation of internet-based, highly scalable distributed computing systems in which computational resources are offered
Oracle Applications and Cloud Computing - Future Direction
Oracle Applications and Cloud Computing - Future Direction February 26, 2010 03:00 PM 03:40 PM Presented By Subash Krishnaswamy [email protected] Vijay Tirumalai [email protected]
Cloud Computing: Making the right choices
Cloud Computing: Making the right choices Kalpak Shah Clogeny Technologies Pvt Ltd 1 About Me Kalpak Shah Founder & CEO, Clogeny Technologies Passionate about economics and technology evolving through
Cloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1
Cloud Security and Algorithms: A Review Divya saraswat 1, Dr. Pooja Tripathi 2 1 M.Tech Dept. of Computer Science, IPEC, Ghaziabad, U.P. 2 Professor, Dept. of Computer science, IPEC, Ghaziabad, U.P. Abstract:
Cloud Computing For Distributed University Campus: A Prototype Suggestion
Cloud Computing For Distributed University Campus: A Prototype Suggestion Mehmet Fatih Erkoç, Serhat Bahadir Kert [email protected], [email protected] Yildiz Technical University (Turkey) Abstract
Cloud Computing Architecture: A Survey
Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and
White Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
NCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
What is Cloud Computing? Tackling the Challenges of Big Data. Tackling The Challenges of Big Data. Matei Zaharia. Matei Zaharia. Big Data Collection
Introduction What is Cloud Computing? Cloud computing means computing resources available on demand Resources can include storage, compute cycles, or software built on top (e.g. database as a service)
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
Ensuring Data Storage Security in Cloud Computing
Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute
Cloud Glossary. A Guide to Commonly Used Terms in Cloud Computing
Cloud Glossary A Guide to Commonly Used Terms in Cloud Computing 1 Cloud Talk The cloud is evolving. As it does, new terms are constantly appearing and some of the older terms are gaining new meaning.
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
[email protected] [email protected]
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
Cloud Computing. Karan Saxena * & Kritika Agarwal**
Page29 Cloud Computing Karan Saxena * & Kritika Agarwal** *Student, Sir M. Visvesvaraya Institute of Technology **Student, Dayananda Sagar College of Engineering ABSTRACT: This document contains basic
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
Customer Security Issues in Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
Lecture 02a Cloud Computing I
Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking
Cloud Computing: The Next Computing Paradigm
Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea [email protected],
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
Building Blocks of the Private Cloud
www.cloudtp.com Building Blocks of the Private Cloud Private clouds are exactly what they sound like. Your own instance of SaaS, PaaS, or IaaS that exists in your own data center, all tucked away, protected
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON MOBILE APPLICATION IN A CLOUD COMPUTING SECURE AND SCALABLE USING CLOUD
SURVEY PAPER ON SECURITY IN CLOUD COMPUTING
SURVEY PAPER ON SECURITY IN CLOUD COMPUTING Jasleen Kaur Research Scholar, RIMT, Mandi Gobindgarh Dr. Sushil Garg Principal, RIMT, Mandi Gobindgarh ABSTRACT: Cloud Computing provides resources to the users
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Analogous
Topics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
Research Paper Available online at: www.ijarcsse.com A COMPARATIVE STUDY OF CLOUD COMPUTING SERVICE PROVIDERS
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A COMPARATIVE STUDY OF CLOUD
How To Understand Cloud Computing
Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD
PRIVACY ASSURED IMAGE STACK MANAGEMENT SERVICE IN CLOUD Ms. Shubhangi Edake 1, Prof. Sunil Rathod 2 1 PG Student, Computer Engineering, Dr.D.Y.Patil School of Engineering, Lohgaon,Pune,India 2 Assistant
A Survey on Cloud Computing
A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India [email protected] G. Sahoo Department of Information Technology Birla
Cloud Computing. Cloud computing:
Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:
A survey on cost effective multi-cloud storage in cloud computing
A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial
Mobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
DATA SECURITY MODEL FOR CLOUD COMPUTING
DATA SECURITY MODEL FOR CLOUD COMPUTING POOJA DHAWAN Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001 [email protected] ABSTRACT Cloud Computing
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1
Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1 Taking a Deeper Look at the Cloud: Solution or Security Risk? LoyCurtis Smith East Carolina University TAKING A DEEPER LOOK AT THE CLOUD:
CLOUD COMPUTING. A Primer
CLOUD COMPUTING A Primer A Mix of Voices The incredible shrinking CIO CIO Magazine, 2004 IT Doesn t Matter, The cloud will ship service outside the institution and ship power from central IT groups to
CLOUD COMPUTING. When It's smarter to rent than to buy
CLOUD COMPUTING When It's smarter to rent than to buy Is it new concept? Nothing new In 1990 s, WWW itself Grid Technologies- Scientific applications Online banking websites More convenience Not to visit
An Intelligent Approach for Data Fortification in Cloud Computing
An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
Using Cloud Services for Test Environments A case study of the use of Amazon EC2
Using Cloud Services for Test Environments A case study of the use of Amazon EC2 Lee Hawkins (Quality Architect) Quest Software, Melbourne Copyright 2010 Quest Software We are gathered here today to talk
Cloud Computing Technology
Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver [email protected], +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
CLOUD COMPUTING SECURITY - DATA STORAGE AND TRANSMISSION
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 CLOUD COMPUTING SECURITY - DATA STORAGE AND TRANSMISSION 1 Mrs. C.Theebendra, 2 N.Santhini 1 Assistant Professor in
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD
Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National
Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing
Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Renuka Goyal, Navjot Sidhu Centre for Computer Science and Technology, Central University of Punjab Bathinda,
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
Security Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD. Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas
CLOUD SECURITY SECURITY ASPECTS IN GEOSPATIAL CLOUD Guided by Prof. S. K. Ghosh Presented by - Soumadip Biswas PART 1 A brief Concept of cloud Issues in cloud Security Issues A BRIEF The Evolution Super
Implementing & Developing Cloud Computing on Web Application
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Deploying a Geospatial Cloud
Deploying a Geospatial Cloud Traditional Public Sector Computing Environment Traditional Computing Infrastructure Silos of dedicated hardware and software Single application per silo Expensive to size
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE
SECURING CLOUD DATA COMMUNICATION USING AUTHENTICATION TECHNIQUE 1 PARISHA TYAGI, 2 VIRENDRA KUMAR 1Department of Information Technology, Suresh Gyan Vihar University, Rajasthan, India 2 Department of
Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory
Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Caveats and Disclaimers This presentation provides education on cloud technology and its benefits
Cloud Server Storage Security Using TPA
Cloud Server Storage Security Using TPA I K.Meenakshi, II Victo Sudha George I Student (M.Tech), DR. MGR Educational and Research Institute, India II Assisstant Professo, DR. MGR Educational and Research
A Prototype Implementation of Database-as-a-Service for the Cloud
A Prototype Implementation of Database-as-a-Service for the Cloud Kashif Laeeq Asst. Professor and PhD Scholar Dept. of Computer Science National University of Computer & Emerging Sciences, Karachi, Pakistan
