A Multi-Cloud based Approach to Enhance Data Security and Availability in Cloud Storage
|
|
|
- Liliana Bruce
- 10 years ago
- Views:
Transcription
1 A Multi-Cloud based Approach to Enhance Data Security and Availability in Cloud Storage Siva Rama Krishna T. a, * Dr. A. S. N. Chakravarthy a, Naveen Kumar G. b a Department of Computer Science and Engineering, University College of Engineering Vizianagaram - JNTUK, Vizianagaram, India b Department of Information Technology, University College of Engineering Vizianagaram - JNTUK, Vizianagaram, India Abstract Cloud computing is growing at a rapid pace, because of its promising low investment practices and the ease of access to data and services. But the security of sensitive data is an open challenge in untrusted cloud environments. Due to the single point failure model, single clouds possess the risk of service unavailability. The possibility of insider attacks in single clouds is also worrying cloud investors. As a remedy, movement towards multi-cloud environments is emerging. This paper focuses on recent research related to cloud security and highlights the advantages of high security and high data availability that is found using the multi-clouds. This paper proposes a new way of handling the cloud storage which is fairly simple to manage and also is robust to most of the data attacks that usually occur in the present cloud storage scenario. This paper explained the added advantage of using the existing infrastructure in a far effective way than that is being done now. This paper aims at relieving the end users of any concerns about the safety of the data being stored in the cloud storage and the availability of the services. Keywords: cloud computing; cloud storage; multi cloud; service availability; Depsky architecture; data security; malicious insider; byzantine fault. 1. Introduction Addressing privacy and security issues must high prioritized in cloud environments. Single cloud environments are becoming less popular due to their inefficiency in dealing with service availability issues and malicious insiders. In recent years, there has been a move towards multiclouds, inter-cloud or cloud-of-clouds [1]. This paper focused on the issues related to the data security and data availability aspects of single cloud storage. As data and information will be shared with a third party, cloud computing users want to avoid an untrustworthy cloud provider. Protecting private and important information, such as credit card details or a patient s medical records from attackers or malicious insiders is of critical importance. In addition, the potential for migration from a single cloud to a multi-cloud environment is examined and research related to security issues in single and multiclouds in cloud computing is surveyed. Main objectives of this paper are: Providing better accessibility to the data stored in the cloud. Effective security enforcements to the sensitive data in the cloud. Increasing the reliability of the storage services provided. Protective measures against the Insider-Hacking of Data. The remaining part of the paper is organized as follows: Section 2 emphasizes the benefits of using cloud services. Section 3 gives the existing scenario of cloud storage, challenges and risks in that. Section 4 analyzes the migration to multi-clouds and presents a brief overview of DepSky architecture. Section 5 presents the similar research done on multi cloud storage models. Section 6 presents the proposed cloud storage model with detailed insight of it. * Corresponding author. [email protected] 58
2 Section 7 presents the novelty and benefits of migrating to proposed model. Section 8 analyses the proposed model with respect to the attacks and faults it can withstand. Section 9 concludes the paper with a note on the future work. 2. Benefits with Cloud Services Some key benefits of using cloud services are listed below: Agility improves with users' ability to re-provision technological infrastructure resources. Cost is claimed to be reduced, and in a public cloud delivery model capital expenditure is converted to operational expenditure. Virtualization technology allows servers and storage devices to be shared and utilization be increased. Applications can be easily migrated from one physical server to another. Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing suitable for business continuity and disaster recovery. Scalability and elasticity via dynamic ("ondemand") provisioning of resources on a finegrained, self-service basis near real-time, without users having to engineer for peak loads. Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer and can be accessed from different places. On-demand self-service allows users to obtain, configure and deploy cloud services themselves. 3. The drawbacks with existing Cloud Models The top three concerns in current cloud market are: Security, Service Availability and Performance [2]. This paper mainly focused on the first two Security Risks Although cloud service providers can offer benefits to users, security risks play a major role in the cloud computing environment. According to a recent IDC survey, the top challenge for 87% of IT executives in relation to cloud computing is security [2]. Protecting private and important information such as credit card details or patients medical records from attackers or malicious insiders is of critical importance. Resources in the cloud are accessed through the Internet; consequently even if the cloud provider focuses on security in the cloud infrastructure, the data is still transmitted to the users through networks which may be insecure. As a result, internet security problems will affect the cloud, with greater risks due to valuable resources stored within the cloud and cloud vulnerability. Data intrusion of the cloud through the Internet by hackers and cybercriminals also needs to be addressed. The two security factors that particularly affect single clouds are data integrity, and data intrusion Data Integrity One of the most important issues related to cloud security risks is data integrity. The data stored in the cloud may suffer from damage during transition operations from or to the cloud storage provider [3] [4]. An example of breached data occurred in 2009 in Google Docs, which triggered the Electronic Privacy Information Centre for the Federal Trade Commission to open an investigation into Google s Cloud Computing Services [5]. Another example of a risk to data integrity occurred in Amazon S3 where users suffered from data corruption [6]. It is argued that when multiple clients use cloud storage or when multiple devices are synchronized by one user, it is difficult to address the data corruption issue [7]. One of the solutions that are proposed is to use a Byzantine fault-tolerant replication protocol within the cloud Data Intrusion Another security risk that may occur with a cloud provider, such as the Amazon S3, is a hacked password or data intrusion. If someone gains access to an Amazon account password, they will be able to access all of the account s instances and resources. Thus the stolen password allows the hacker to erase all the information inside any virtual machine instance for the stolen user account, modify it, or even disable its services. Furthermore, there is a possibility for the user s (Amazon user name) to be hacked, and since Amazon allows a lost password to be reset by , the hacker may still be able to log in to the account after receiving the new reset password Service Availability Another major concern in cloud services is service availability. Amazon mentions in its licensing agreement [8] that it is possible that the service might be unavailable from time to time. In addition, if any damage occurs to any Amazon web service and the service fails, in this case there will be no charge to the Amazon Company for this failure. Companies seeking to protect services from such failure need measures such as backups or use of multiple providers. Both Google Mail and Hotmail experienced service down-time recently [9] [10]. If a delay affects payments from users for cloud storage, the users may not be able to access their data. Due to a system administrator error, 45% of stored client data was lost in the LinkUp (MediaMax) as a cloud storage provider [11]. 59
3 3.3. Limitations of Existing System Here is the brief listing of limitations in the traditional cloud storage service: Sensitive data is prone to Insider Hacking. Security protocols being implemented are outdated. Data service availability is moderate. Service failure rates are high. Byzantine fault rates are high. Data Grabbing is a highly possible threat. 4. Migrating to Multi-Clouds This section elaborates on the migration of cloud computing from single to multi-clouds to ensure the security of the user s data DepSky System: Multi-Clouds Model The DepSky system [14] addresses the availability and the confidentiality of data in their storage system by using multi-cloud providers, combining Byzantine quorum system protocols, cryptographic secret sharing and erasure codes DepSky Architecture The DepSky architecture (Fig. 1) [14] consists of four clouds and each cloud uses its own particular interface. The DepSky algorithm exists in the clients machines as a software library to communicate with each cloud. These four clouds are storage clouds, so there are no codes to be executed. The DepSky library permits reading and writing operations with the storage clouds Introduction to Multi-Clouds The term multi-clouds is similar to the terms interclouds or cloud-of-clouds [1] that were introduced by Vukolic. These terms suggest that cloud computing should not end with a single cloud. Recent research has focused on the multi-cloud environment which control several clouds and avoids dependency on any one individual cloud [12]. Research identified two layers in the multi- cloud environment: the bottom layer is the inner-cloud, while the second layer is the inter-cloud. In the inter-cloud, the Byzantine fault tolerance finds its place Byzantine Protocols In cloud computing, any faults in software or hardware are known as Byzantine faults that usually relate to inappropriate behaviour and intrusion tolerance. In addition, it also includes arbitrary and crash faults. Much research has been dedicated to Byzantine Fault Tolerance (BFT) since its first introduction. Although BFT research has received a great deal of attention, it still suffers from the limitations of practical adoption and remains peripheral in distributed systems [13]. As mentioned earlier, BFT protocols are not suitable for single clouds. Vukolic argues that one of the limitations of BFT for the inner-cloud [3] [4] is that BFT requires a high level of failure independence, as do all fault-tolerant protocols. If Byzantine failure occurs to a particular node in the cloud, it is reasonable to have a different operating system, different implementation, and different hardware to ensure such failure does not spread to other nodes in the same cloud. In addition, if an attack happens to a particular cloud, this may allow the attacker to hijack the particular inner-cloud infrastructure. Fig. 1. The DepSky Model of Cloud Storage 4.4. Analysis of Multi-Cloud Storage Moving from single clouds or inner-clouds to multiclouds is reasonable and important for many reasons. According to research [3], Services of single clouds are still subject to outage. In addition, a survey [15] showed that over 80% of IT executives fear security threats and loss of control of data and systems. We assume that the main purpose of moving to interclouds is to improve what was offered in single clouds by distributing reliability, trust, and security among multiple cloud providers. In addition, reliable distributed storage which utilizes a subset of BFT techniques is used in multi-clouds. 5. Related Work There has been a little viable research in the direction of using multiple clouds to store data but the following have been observed by us: In the model of G.Rakesh Reddy, et al [16], there was a usage of two entities i.e. storage locations to store the data. The user is given the choice to store between the two of these storage locations based on the budget he/she can afford. But this model does not successfully secure the user 60
4 content since the plain data is present on the server and it is prone to insider hacking which is one of the major threats that the current storage models being implemented face. In the other model by Alysson Bessani, et al [14], DepSky Architecture was implemented. Basically the functionality of the entire system is divided into 3 layers namely: Conceptual Data Unit, Generic Data Unit and Implementation Data Unit. The data stored can be of arbitrary size and of variable versions on any given data storage unit. This model does not withstand the insider hacking, data theft and man-in-the-middle attacks. In addition to this the model has data entities that have specific functionalities thereby eliminating the chance of usage of multiple clouds to distribute the load on the servers being used in the architecture. Besides this model allow variable sized files and versions that could lead to ambiguity. being uploaded. This gives the second layer of security. It makes sure that only the authorized user can read the respective file. Blowfish algorithm is chosen for encryption as is highly secure, has a high data manipulation rate and has the weakest cryptanalysis to-date. 6. Proposed Cloud Storage Model With roots in DepSky architecture, a cloud storage model is proposed below, promising more secured and more available service than the existing. This approach is broadly divided into two phases: Upload Phase and Download Phase. The algorithms of these two phases execute in the client machine. And 4 autonomous traditional cloud storage servers are required to get these algorithms work. These servers might present in different geographical locations, and even from different cloud service providers Upload Phase The data to be uploaded is subjected to the following procedures and in the order (as shown in Fig. 2): Compression Encryption Splitting Replication The data file is first subjected to compression giving us two advantages: reducing the file content to be uploaded and providing an overall envelope to the data being transferred. In the proposed system the compression ensures at least 2% deflating of the data to be uploaded using zip. This paper focuses on usage of multiple clouds instead of a single cloud. This obviously leads to the focus to be shifted on usage of more network resources than the existing system. Compression reduces this extra utilization and stress on the network bandwidth usage to some extent. Compression also provides the first layer of security to the file by enveloping the content. This helps in later stages when the file is split, all the split parts of the original file have to be rejoined in the same order. In absence of which the decompression throws a check sum error that would immediately stop the process and thereby protecting the user data. The compressed file is then subjected to encryption using Blowfish algorithm, to ensure the security of the data Fig. 2. Process Flow in Upload Phase of the Proposed Model The encrypted file is then subjected to split into four chunks. Then the file chunks are replicated. And finally these chunks are randomly stored in four autonomous cloud servers, with each server having two different chunks of a file. The advantages of having this process are: since data is available in multiple cloud servers, failure of one or two servers doesn t affect the data availability and even in case of data loss the replicated file chunks act as backup. And since only chunks were replicated once there is only 100% excess storage required, but in traditional systems entire file is replicated three times making the storage requirement 300% excess. This procedure also provides the third layer of security by making sure that the entire file content is never present at one location. The details of chunks and their respective storage locations are recorded in a log for proper retrieval of file. Since there are replicas each chunk of a file makes two entries in the log file. 61
5 6.2. Download Phase This phase is a simple inversion of the upload phase. The location of file chunks is found by a simple search in the log file. Since each chunk has a replica, only one entry in log is used for download, if the first entry didn t work (service down) the other entry is used. All the four chunks of file are to be downloaded, rejoined in the same order of split followed by decryption with the same key supplied to encryption and then decompression, to get the original data file. 7. Novelty of the Proposed Model The main objective of the model is to decentralize the data storage system that is being currently implemented. By following the current model the following advantages were observed: 7.1. Load The load on the servers can be reduced since every user accesses the server to store only a fraction of the file instead of the entire file thereby reducing the interaction time with one given server out of the four in the model Secured content Communication In this model we send/receive data that is split and encrypted. Therefore the content is secure when it, leaves/comebacks to, the user terminal. This advantage could be furthered by sending the data over a secure SSL channel which makes sure there is no foul play such as data grabbing, phishing. This aspect is further discussed in Section Augmented Data Access The data is split and stored in four different servers. Therefore under the circumstances that one of the servers is down it is coded in such a way that the file can be accessed by the user by communicating with only three of the four servers in the architecture. This comes into picture when one of the servers is down due to maintenance or is under attack or is under a heavy stress due to the load on it Preservation of Data Integrity Since there is a replication of every partition of the previous upload, in circumstances where the integrity of the data is under question we already have a reference file that is reliable which can be used to restore the user data to the reliable state. This could prove beneficial in situations where the data has been modified by an unauthorized party or also when the user is accessing the file through multiple devices such as Tablets, PCs and Laptops. 8. Security and Availability Audit of the Proposed Model The major strength of this model lies in the three level security proposed in section 6. The proposed model can withstand the following attacks and faults: 8.1. Insider Hacking The current model is facing the huge threat of insider hacking of sensitive data where in if a hacker/malicioususer were to bypass the security and got access to the storage server, there are chances of data-theft and datamanipulations. This is because the files are entirely stored at one location. The proposed model eliminates this by splitting and distributing the data files into four different locations rather than one single location. Even when one of the locations is breached it is ineffective being the content at any single location is encrypted and not complete and even enveloped by compression algorithm. Another advantage with the proposed model is that the location that is attacked functions as an early warning system that alerts the security enforcers of the service provider Man-in-the-Middle Attack The data is split and encrypted hence the files when being uploaded/downloaded cannot be accessed entirely. Hence a man-in-the-middle attack will yield no fruitful result as the entire content encrypted and is never present at one instant and at a single location Byzantine Faults and Manual Faults Byzantine faults and manual faults may results into data loss and/or data inconsistency. The proposed model deals with these faults pretty effectively as there are always two instances of the same split file at two different locations. This makes sure that a file chunk is always accessible even when one of the four servers is under stress or is irresponsive or is failing to process a request efficiently. The file integrity is also maintained as the back-ups ensure a safety net that helps in maintaining a reliable instance of the particular file. 9. Conclusion and Future Work This paper could address the two important aspects that are targeted the end-user: to make the user feel secure about the sensitive data being stored in the cloud and to guarantee the user that his data is always available. The data security protocols being followed in the paper ensure an extremely secure environment for the user to place his sensitive data. The proposed model is invulnerable to many of the attacks that are presently 62
6 affecting the cloud users. This model also ensures resilient cloud storage. In the proposed model, four cloud servers are used that are present at random locations. It is a given fact that the data transfer rate is inversely proportional to the geographical location of these servers. When a server is selected randomly the data rate via server access takes a hit and is unpredictable. Instead if efficient algorithms to identify optimal servers are used, to place the file partitions based on weights and location based on the user, the speed of file access increases thereby increasing overall efficiency. In the future work, we want to add the above said feature to the proposed model. References [1] Mohammed A. AlZain, Eric Pardede, Ben Soh, James A. Thom. Cloud computing security: from single to multi-clouds. In: Proceedings of the 45th Hawaii International Conference on System Sciences: 2012 Jan 4-7; Grand Wailea, Maui, Hawaii. IEEE: p [2] Frank Gens. New IDC IT cloud services survey: top benefits and challenges. IDC Enterprise Panel; Available from: URL: [3] C. Cachin, I. Keidar, A. Shraer. Trusting the cloud. ACM SIGACT News 2009; 40: [4] C. Cachin, S. Tessar. Optimal resilience for erasure-coded Byzantine distributed storage. In: Proceedings of the 19th International Conference on Dependable Systems and Networks: 2006 Jun 25-28; Philadelphia, USA. IEEE: p [5] EPIC v. Google Inc., Complaint and request for injunction, request for investigation and for other relief in the matter of Google, Inc. and cloud computing services (Federal Trade Commission 2009). [6] Amazon cloud service goes down and takes popular sites with it. The New York Times 2012 Oct 22; Sect. Technology. [7] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song. Provable data possession at untrusted stores. In: Proceedings of the14th ACM Conference on Computer and Communications Security: 2007 Oct 29 Nov 02; Alexandria, USA. ACM: p [8] Amazon Web Services customer agreement. Amazon Web Services Inc.; [9] Gmail goes down in India. The Times of India 2013 Jun 12; Sect. TOI Tech. [10] Arthur de Haan. Details of the Hotmail / Outlook.com outage. Outlook Blog; Available from: URL: details-of-the-hotmail-outlook-com-outage-on-march-12.aspx. [11]Loss of customer data spurs closure of online storage service The Linkup. Network World News 2008 Aug 11. [12] C. Cachin, R. Haas, M. Vukolic. Dependable storage in the intercloud. IBM Research Report RZ IBM Research; [13] I. Abraham, G. Chockler, I. Keidar, D. Malkhi. Byzantine disk paxos: optimal resilience with Byzantine shared memory. Distributed Computing 2006; 18(5): [14] Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa. DepSky: dependable and secure storage in a cloud-ofclouds. In: Proceedings of EuroSys'11 - the sixth conference on Computer systems: 2011 Apr 10-13: Salzburg, Austria. ACM: p [15] 2009 global survey of cloud computing. Avanade and Kelton Research; [16] G. Rakesh Reddy, Dr. M.B. Raju, Dr. B. Ramana Naik. A Novel Approach for Multi-Cloud Storage security in Cloud Computing. Int J Comp Sci and Inf Tech 2012; 3 (5):
Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking
Secure Framework for Data Storage from Single to Multi clouds in Cloud Networking B.Sujana 1, P.Tejaswini 2, G.Srinivasulu 3, Sk.Karimulla 4 1,2,3,4 QUBA COLLEGE OF ENGINEERING & TECH, NELLORE Abstract:
MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING. K.Sireesha 1 and S. Suresh 2
IJCITP Volume.8* Number 2* December 2013, pp. 53-58 Serials Publications MIGRATION FROM SINGLE TO MULTI-CLOUDS TO SHRIVEL SECURITY RISKS IN CLOUD COMPUTING K.Sireesha 1 and S. Suresh 2 1 M.Tech. Student,
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Ensuring Data Storage Security in Cloud Crop
ISSN : 2347-8446 (Online) International Journal of Advanced Research in Ensuring Data Storage Security in Cloud Crop Rakesh Kumar ER Asst. Prof. & Head (CSE), SAMS College of Engineering and Technology,
DepSky Dependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa
epsky ependable and Secure Storage in a Cloud-of-Clouds Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, Paulo Sousa University of Lisbon, Faculty of Sciences 1 Moving to Clouds ata is
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
A survey on cost effective multi-cloud storage in cloud computing
A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial
Secure Store of User Authentication Tokens in Multi-cloud Storage System
Journal of Computational Information Systems 11: 3 (015) 1013 100 Available at http://www.jofcis.com Secure Store of User Authentication Tokens in Multi-cloud Storage System Jinjin SUN 1,, Ming XU 1, Shifang
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
Identifying Data Integrity in the Cloud Storage
www.ijcsi.org 403 Identifying Data Integrity in the Cloud Storage Saranya Eswaran 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application, Hosur. 2 Professor and
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
Session 11 : (additional) Cloud Computing Advantages and Disadvantages
INFORMATION STRATEGY Session 11 : (additional) Cloud Computing Advantages and Disadvantages Tharaka Tennekoon B.Sc (Hons) Computing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Cloud
Cloud Computing Security: From Single to Multi-Clouds
2012 45th Hawaii International Conference on System Sciences Cloud Computing Security: From Single to Multi-Clouds Mohammed A. AlZain #, Eric Pardede #, Ben Soh #, James A. Thom* # Department of Computer
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
Web Services & Database Services Availability through Multi-Cloud Environment
Web Services & Database Services Availability through Multi-Cloud Environment Veenesh Kumar Shrotriya 1, Ashutosh Kumar 2 1 M.Tech, 2 Assistant Professor, Department of Computer Science and Engineering,
AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EXPOSURE TO RELIABLE STORAGE SERVICES IN CLOUD COMPUTING Ayesha Romana 1, Akheel Mohammed 2, Ayesha 3 1 M.Tech Student, Dept
Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Scientific Journal Impact Factor (SJIF): 1.711
Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com OneTK: Key Distribution Center at Cloud
CLOUD COMPUTING AND ITS SECURITY ASPECTS
CLOUD COMPUTING AND ITS SECURITY ASPECTS Subhash Basishtha 1, Saptarshi Boruah 2 1 Department of Information Technology, Assam University, Silchar-788011, India 2 Department of Information Technology,
How To Design A Cloud Data Storage Service For A Cloud Computer System
Ensuring Security Services for Data Storing and Data Sharing in Cloud Computing D. Raman 1, Bojja Vamshikrishna 2 1 Associate Professor Department of Computer Science and Engineering, Vardhaman College
Cloud Computing Security Issues and Controls
Cloud Computing Security Issues and Controls ACC 626 Information System Assurance & Computer-Assisted Auditing Peter Shih-Hsien Chen June 30th, 2013 Table of Contents Introduction... 1 History of Cloud
Security Evaluation Using Shamir s Algorithm in Multi Cloud Data Storage
Security Evaluation Using Shamir s Algorithm in Multi Cloud Data Storage 1 ASHA PRIYA DARSHINI. MANDA, 2 N. JAGAJEEVAN 1 Mtech, CHALAPATHI INSTITUE OF ENGINEERING AND TECHNOLOGY, CHALAPATHI NAGAR, LAM,
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Everything You Need To Know About Cloud Computing
Everything You Need To Know About Cloud Computing What Every Business Owner Should Consider When Choosing Cloud Hosted Versus Internally Hosted Software 1 INTRODUCTION Cloud computing is the current information
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG [email protected] Bhupesh Kumar Dewangan Assistant Professor,CSE,
Keyfort Cloud Services (KCS)
Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency
Cloud Data Protection for the Masses
Cloud Data Protection for the Masses N.Janardhan 1, Y.Raja Sree 2, R.Himaja 3, 1,2,3 {Department of Computer Science and Engineering, K L University, Guntur, Andhra Pradesh, India} Abstract Cloud computing
IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
February. ISSN: 2321-8134
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.
Secrecy Maintaining Public Inspecting For Secure Cloud Storage
Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan
Cloud Computing: Issues Related with Cloud Service Providers
Cloud Computing: Issues Related with Cloud Service Providers Nikhil Ranjan Assistant Professor Tula s Institute, Dehradun (An Engineering & Management College) Abstract- The Cloud Computing and the storage
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING
OVERVIEW OF SECURITY ISSUES IN CLOUD COMPUTING K. Arumugam 1, P. Sumathi 2 1 Research Scholar/Department Of Computer Science, Government Arts College, Coimbatore (India) 2 Assistant Professor/Department
Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.
Mapping Your Path to the Cloud A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Table of Contents Why the Cloud? Mapping Your Path to the Cloud...4
A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey on Scalable Data Security and Load Balancing in Multi Cloud
The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.
The Magical Cloud Lennart Franked Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall. 2014-10-20 Lennart Franked (MIUN IKS) The Magical Cloud 2014-10-20 1 / 35
Cloud Computing for Libraries: A SWOT Analysis
Cloud Computing for Libraries: A SWOT Analysis 8 th Convention PLANNER 2012 Abstract Cloud Computing for Libraries: A SWOT Analysis Miteshkumar Pandya This paper provides brief information on cloud computing
Data Integrity and Dynamic Storage Way in Cloud Computing
1 Data Integrity and Dynamic Storage Way in Cloud Computing Dinesh.C, P.G Scholar, Computer Science and Engineering, Mailam Engineering College, Mailam, Tamilnadu. Abstract It is not an easy task to securely
Security Model for VM in Cloud
Security Model for VM in Cloud 1 Venkataramana.Kanaparti, 2 Naveen Kumar R, 3 Rajani.S, 4 Padmavathamma M, 5 Anitha.C 1,2,3,5 Research Scholars, 4Research Supervisor 1,2,3,4,5 Dept. of Computer Science,
Module 1: Facilitated e-learning
Module 1: Facilitated e-learning CHAPTER 3: OVERVIEW OF CLOUD COMPUTING AND MOBILE CLOUDING: CHALLENGES AND OPPORTUNITIES FOR CAs... 3 PART 1: CLOUD AND MOBILE COMPUTING... 3 Learning Objectives... 3 1.1
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
Designing a Cloud Storage System
Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes
CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY
1 CLOUD TECHNOLOGY IMPLEMENTATION/SECURITY Torrell Griffin 2 Cloud Technology Implementation/Risk Mitigation The purpose of this report, in essence, is to define cloud technology as well as describe some
A Secure and Dependable Cloud Storage Service in Cloud Computing
A Secure and Dependable Cloud Storage Service in Cloud Computing Yalla Ram Charan MTech Student Department of CSE Sri Venkateswra College of Engineering & Technology Abstract: Cloud storage is a model
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Peer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
Cloud Computing - Architecture, Applications and Advantages
Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
Increased Security, Greater Agility, Lower Costs for AWS DELPHIX FOR AMAZON WEB SERVICES WHITE PAPER
Increased Security, Greater Agility, Lower Costs for AWS DELPHIX FOR AMAZON WEB SERVICES TABLE OF CONTENTS Introduction... 3 Overview: Delphix Virtual Data Platform... 4 Delphix for AWS... 5 Decrease the
The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.
Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
A Survey on Data Integrity of Cloud Storage in Cloud Computing
A Survey on Data Integrity of Cloud Storage in Cloud Computing A B S T R A C T Mr.Vitthal Raut, Prof. Suhasini Itkar Department Computer Engineering, PES Modern College of Engineering, Pune, India. [email protected],
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Erasure correcting to enhance data security in cloud data storage
Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University [email protected] A.Sajeevram Department of computer science Vels University
Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
Cloud Computing for SCADA
Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry
"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: [email protected] Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Clouds
International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013 1 An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Clouds Md Kausar Alam,
International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: 2347-3622, Volume-1, Issue-5, February 2014
An Overview on Cloud Computing Services And Related Threats Bipasha Mallick Assistant Professor, Haldia Institute Of Technology [email protected] Abstract. Cloud computing promises to increase the velocity
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Data Protection Act 1998. Guidance on the use of cloud computing
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration
Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration Part I of an ebook series of cloud infrastructure and platform fundamentals not to be avoided when preparing
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.com 844-644-4600 This publication describes the implications of HIPAA (the Health
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October 2015. Page 1 of 9
Security CLOUD VIDEO CONFERENCING AND CALLING Whitepaper October 2015 Page 1 of 9 Contents Introduction...3 Security risks when endpoints are placed outside of firewalls...3 StarLeaf removes the risk with
Energy Efficiency in Secure and Dynamic Cloud Storage
Energy Efficiency in Secure and Dynamic Cloud Storage Adilet Kachkeev Ertem Esiner Alptekin Küpçü Öznur Özkasap Koç University Department of Computer Science and Engineering, İstanbul, Turkey {akachkeev,eesiner,akupcu,oozkasap}@ku.edu.tr
