SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 4, April 2013
1405
www.ijarcet.org

Abstract— As novel storage model, cloud storage has gain
attentions from both the academics and industrial communities.
However along with variant advantages, it also brings new
challenges in maintaining data integrity and highly available
reliable data storage facility. The integrity of the data stored in
the service provider is one of challenges to be addressed
before the cloud storage is applied widely. Cost is also a major
issue in cloud computing when we are switching to multi cloud.
To address all the scenario we present a survey paper.
This survey paper is based on the recent research related to
single and multi cloud cost , security and availability based
scenario. This work aim to promote the use of multi cloud
environment over single cloud to reduce the risk.
Index Terms— cloud computing, data integrity, data intrusion,
service availability, cloud service provider.
I. INTRODUCTION
Cloud computing is an internet based model for enabling
convenient on demand network access to shared recourses [1].
It provides various services over internet such as software
hardware, data storage, infrastructure. Cloud computing
providers delivers application via internet, which are access
from desktop and mobile apps.Cloud computing technology
grouped into three section: they are SaaS, PaaS, laaS[2] as
shown in fig.1. . SaaS(software as a service) it’s an on demand
application service. It eliminates the need of installing and
running application on customers own computers.PaaS
(platform as a service)it’s an on demand platform service to
host costumer application. It is a delivery of computer
platform and solution as a service.IaaS (infrastructure as a
service) in this user can benefit from networking
infrastructure services,datastorage and computing services.
Rather than purchasing server , software, data centre space
client can buy those resources as a fully outsourced service.
To accessed these cloud services security and reliability we
are using different models like: i) Using single service
provider. ii) Using multiple service providers. The weakness
of single service provider is that it can be easily be hacked by
intruders and if the service provider fails or down for some
technical reasons than client will not at all access his/her data.
The problem in Multiple service provider models is to
compromise the security because there is lack of security
technique used here but availability is up to the mark
Fig.1 Overview of Cloud computing
The reminder of paper is organized as follows. Section 2
discuss about issues in cloud computing. Section 3 new
security analysis in cloud computing. Section 4 discuss the
comparison of security issues and Section 5 will conclude the
paper.
II. ISSUES IN CLOUD COMPUTING
Before considering the cloud computing technology. It is
important to understand the risks involved. You should carry
out the risk assessment process before any control is handed
over the to a service provider.
A. Data storage and security
Many cloud service provider provide storage as a service. They take
the data from the user and stored on the large data centers, hence
providing a user means of storage. Although these service provider
says that data stored in a cloud is safe but there have been some
cases where data is been modified or lost due to security holes.
Various cloud provider adopt various technology to resolve the
problem of cloud data storage. The virtualized nature of cloud make
the traditional mechanism unstable for handling the security risks so
these service provider use different encrypting technique to
overcome these problems.
Another major issue that is mostly neglected is of data
remanences.It refers to the data left out during tranfer.It cause
minimal security threat in private cloud computing offerings,
A survey on cost effective multi-cloud storage in
cloud computing
Nitesh Shrivastava, Ganesh Kumar
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 4, April 2013
All Rights Reserved © 2012 IJARCET
1406
however server security issues may emerge in case of public cloud
offerings as a result of data remanence.
Virtualization increases the security of cloud enviroment.With
virtualization a single machine can be divided into multiple virtual
machine, thus provide better data isolation. The vms provide the
security test bed for executing of untested code from entrusted user.
An hierarchical reputation system have been proposed in a paper [9]
for managing trust I n the cloud environment.
B. Application level security
Application level security refers to the usage of software and
hardware resources to provide the security to application such
as attackers are not make any changes in the application
formate.Now a days attacker launched them as a trusted user
and system consider them as trusted user and allow full access
to attacking party. The reason behind this is using outdated
network policies. With the technological advancement these
security policies become obsolete as there have been instances when
system security have been breached, but with the recent technology
advancements it is quit possible to imitate a trusted user. The threat
to application level security include sql injection attack ,dos attack
,captcha breaking , xss attack.
Hence, it is necessary to install high level security check to minimise
these risks.Thes traditional method to deal with increased security
issue have been to develop a task oriented asic device which can
handle the specific task and provide high level of security[10].But
with application level threat being dyanamic and adaptable to the
security check in place, these closed system have to observed to be
slow in compare to the open ended system.
C. Data intrusion
Another security risk that occurs in cloud computing
enviroment, such as the google doc cloud service is a hacked
password or data intrusion. If someone gain access to google
doc password then they will able to gain all account instance
and resources .The stolen password allow the hacker to
modify ,erase the full data and even disable the services.
Furthermore there is a possibility of hacking email [11] (google doc
user name ) to be hacked and since google allow the lost password to
be reset by email, the hacker may still able to access the account
after receiving the new password.
D. Single to multicloud
The use of cloud computing have increase in many
organization. The cloud computing provide a many benefit in
terms of cost and avalability.The pay per use model know as
cloud computing. One of the prominent service offer by cloud
computing is cloud data storage, in which subscriber don’t
want to store their data on their own server, instead of that
there data stored in cloud service provider. This service don’t
provide only flexibility and scalability for data storage but it
also provide the customer with the benefit of only for the
amount of data they need to store for the particular period of
time. In addition to these benefits customer can access their
data from anywhere as long as they are connected to internet.
Since the cloud service provider is the different market
entities, data integrity and privacy are the most common
issues that need to be address in cloud computing. Even
thought the cloud service provider have standard regulation
and power infrastructure to ensure the customer data privacy
and provide a better availability. The political influence might
become an issue with the availability of the service.
customers
Fig. 2. Cloud computing architecture
In this work we observe that relaying on single service provider for
his out sourcing data is not very promising. The availability of the
data is not up to the mark. if suppose the cloud service provider goes
down due to any technical reason, then no one will access the data
from any where this means high availability violated as shown in fig
2.To address this issue we are switching from single service
provider to multiple service provider where we can store the
customer data into multiple service provider so that if any service
provider get down even then user can access their data as shown in
fig 3.
customers
Fig. 3 Multi. cloud computing architecture
E. Data integrity
In cloud computing, data move to remotely cloud server
[12].cloud remotely store the data and get back to owner
whenever it needed. But there is no guarantee that the data
stored is not alter by cloud or third party auditor(TPA).In
order to overcome the threat of data integrity , the user must
be able to use the assist of TPA.The TPA have experience
about checking the integrity of a data, that cloud user do not
have, and that is difficult for the owner to check.
Data integrity is one of the important issues in cloud
computing. Because data integrity ensure that data is of high
quality, correct, consistent and accessiable.After moving the
data to cloud, user thought that there data are secured. The
hope may be fail some times, the user data may be alter or
deleted.
In this scenario it is important to verify the tempered or
deleted data
cloud
c
s
p
c
s
p
CSP1
Redundant
data
CSP2
Redundant
data
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 4, April 2013
1407
www.ijarcet.org
F. Cost
Cost is also the one of the major issue in a cloud computing.
As the size of data increase the cost of data also increases, this
means cost is directly proportion to size of data. But there is
different cost in term of single cloud and multi cloud. Because
data stored in the multi cloud is to achieve high avalability,so
redundant data are store in multiple service provider then the
cost will be calculated by adding the cost of all service
provider that contain the redundant data that will be the total
cost[2]. There is one more factor by which cost will be
increase, i.e. algorithm, as the algorithm complexity increase
cost of service provider will also increase, which mean
algorithm complexity is directly proportional to cost.
III. NEW SECURITY ANALYSIS IN CLOUD COMPUTING
In this section we analyze the security mechanism related with
data integrity, data inrusion, and service availability.
A. Homomorphic token technique
In the cloud data storage system, users store their data in the cloud
and no longer possess the data locally. Thus, the correctness and
availability of the data files being stored on the distributed cloud
servers must be guaranteed. One of the key issues is to effectively
detect any unauthorized data modification and corruption, possibly
due to server compromise and/or random Byzantine failures.
Besides, in the distributed case when such inconsistencies are
successfully detected, to find which server the data error lies in is
also of great significance, since it can always be the first step to fast
recover the storage errors and/or identifying potential threats of
external attack.
Fig. 3Towared secure storage multi. cloud computing architecture
To address these problems, our main scheme for ensuring cloud
data storage is presented in this section. The first part of the section
is devoted to a review of basic tools from coding theory that is
needed in our scheme for file distribution across cloud servers.
Then, the homomorphic token is introduced. The token computation
function we are considering belongs to a family of universal hash
function, chosen to preserve the homomorphic properties, which
can be perfectly integrated with the verification of erasure-coded
data. Subsequently, it is shown how to derive a challenge response
protocol for verifying the storage correctness as well as identifying
misbehaving servers. The procedure for file retrieval and error
recovery based on erasure correcting code is also outlined. Finally,
we describe how to extend our scheme to third party auditing with
only slight modification of the main design.
B. File division technique
In order to achieve secure, storage and access on outsource data in
the cloud we exploit the technique of multiple division to protect the
data files. Proposed model has enabled us to store data easily and
securely. As in this method dividing the data into multiple parts and
as the number of part increase the security of data also increase
because it is difficult for intruder to check all file to match the
content as shown in fig.2. Here we are not focusing on using any
technique for multiple division we can use any basic mechanism to
divide file to reduce the cost.
To illustrate this model we use example there are three clients
represented as a C1 and C2.And they stored there data in two
different cloud service provider its represent as CSP1 and CSP2.
client store there data in the CSP that data will be divided in
the form of multi division technique in the client side and that
multiple data stored in an redundant form into both the cloud
service provider simultaneously such that if any cloud service.
Customers
Fig. 4 A cost effective multi. cloud computing model
C. Depsky model
This section will explain the recent work that have been done
in the area of multi cloud. A virtual cloud storage system is
called depsky.It address the issue like data integrity ,
availability in multi cloud.
Fig. 5 A depsky architecture [3]
A depsky architecture [3] consist four cloud and each cloud uses its
own particular interfaces. The depsky algorithm exist in client
machine as a software library to communicate with cloud as shown
in fig.5.These four cloud are storage cloud, so there are no code to
CSP
D1+D2
..+
Dn
CSP
D1+D2+


.Dn
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 4, April 2013
All Rights Reserved © 2012 IJARCET
1408
be executed. The depsky library allow only reading and writing
permission with the cloud storage.
D. Privacy protocol
Data and software process protocol steps executed by cloud
customers to add the privacy enforcement structure to the software
and data before transferring them to the cloud.
Privacy feedback protocol describe essential component that should
be considered and planned through when designing privacy aware
cloud service .The main aim of this protocol to inform user for the
various privacy mechanism applied on their data and make them to
aware of risk.
IV. COMPARING THE SECURITY ISSUES IN CLOUD
COMPUTING
Ref
Year
Dataintegrity
Dataavailability
Singlecloud
Multicloud
Securitymechanism
CostLow
Medium
High
[1 2012
Follow
Follow
Follow
Homomorp
hictoken
technique
Follow
[2 2011
Follow
Follow
Follow
File
division
technique
Follow
[3 2011
Follow
Follow
Follow
Depsky
algorithm
Follow
[4 2011
Follow
survey
Follow
Follow
[5 2010
Follow
RAIDlike
technique
Follow
[6 2010
Follow
Follow
[7 2009
Follow
follow
Privacy
protocol
Follow
Table 1 Comparison based on issues in cloud computing
Table 1 illustrate the advantage of single cloud model over
multi cloud model. It also address some specific issues in
single cloud as well as multi cloud and give the comparison
between them. It is clear from the table that there are more
research have been done in the past in single cloud as well as
in multicloud. Multicloud can address the issues like data
integrity, data availability and data intrusion. and in addition
most of the research focus on providing the secure storage
such as in depsky.Therefore providing the cloud data base
storage system instead of normal storage system is a
significant role in order to run queries and deal with database.
Table 1 also illustrate that in 2010 80% of the research are
based on single cloud and about 20% of research are based on
multi cloud .It is clear from the past that the more research has
been conducted in the area of single cloud in comparison to
multi cloud
Cost is the one of major issue in multi cloud model because as
the data redundancy increase among the service provider cost
will increase and as the data store redundantly security of data
also needed, so moving to complex algorithm also charge cost
of implementation .The cost increase as the complex
algorithm increase .To overcome these problem some author
used some technique like token, file division method to
reduce the cost. By applying these technique the cost will be
reduce as compare to algorithm. But this scheme is not fully
secure they just balance the security risks and cost. in future
they need to go for more secure scheme to make their user
data more secure.
V. CONCLUSION
The end of this decade is marked by a paradigm shift of the
industrial information technology towards a pay-per-use service
business model known as cloud computing. Cloud data Storage
redefines the security issues targeted on customer’s outsourced data
(data that is not stored/retrieved from the costumers own servers). In
this work we observed that, from a customer’s point of view, relying
upon a solo SP for his outsourced data is not very promising, so we
are switching toward multi cloud. The cloud computing security is
still a major issue in cloud computing enviroment.in addition the
loss of service availability and data integrity are the major problem
for the customer.Furthermorte data intrusion increase so many
problem to the user of cloud computing.
The purpose of this work is to focus on the security issue and cost
related with single cloud as well as multi cloud. Much research has
been done on the single cloud and more research are going in the
area of multi cloud to overcome these cost and security issue as well.
we support the migration on multi cloud.
REFERENCES
[1] Cong Wang,student member,ieee,Qian Wang,student member,ieee,
Kui Ren,member,ieee,Ning Cao,student member,ieee and Wenjing
Lou,senior member,ieee,”Towared secure and dependable storage in
cloud computing” 2012.
.
[2] Yashaswi Singh,Farah Kandah,Weiyi Zhang,” secure cost effective
multi cloud storage in cloud computing”2011.
[3] A.Bessani, M. Correia, B.Quaresma, F.Andre and P.Soura
“Depsky:dependable and secure storage in cloud computing.”2011.
[4] F.Rocha and M.Correia “lucy in the Sky without Diamond: stealing
Confidential Data in the Cloud”, Proc 1stIntl . Workshop od
Dependability of Clouds, Data Centres and Virtual Computing
Environments, 2011.
[5] Computing, 18(5), 2006, pp. 387-408. H.Abu-Libdeh, L.Princehouse
and H.Weatherspoon, “ RACS: a case for Cloud storage
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 4, April 2013
1409
www.ijarcet.org
diversity”,SoCC ’10: Proc. 1stACM symposium on Cloud
Computing,2010.
[6] E.Grosse, J.Howie, J.Ransome, J Reavis and S.Schmidt, “ Cloud
computing roundtable”, IEEE Security & Privacy,8(6),2010.
[7] W.Itani, A.Kayssi, A.Chehab, “Privacy as a Service: Privacy-Aware
Data Storage and Processing in Cloud Computing Architectures” Eight
IEEE International Conference on Dependable, Autonomic ans Secure
Computing,Dec 2009.
[8] R.Gellman, “Privacy in the cloud: Risks to privacy and confidentiality
from cloud computing”,Prepared for the World Privacy Forum Feb
2009.
[9] B.R.Kandukuri, R.V.Paturi and A.Rakshit, “Cloud Security Issues,”
2009 IEEE International Conference on Service Computing, 2009.
[10] Scalable Security Solutions, Check Point Open Performance
Architecture, Quad-Core Intel Xeon Processors,”Delivering
Application-Levels Security at Data Centre Performance Levels,”Intel
Corporation, 2008.
[11] S.L.Garfinkel,” Email-based identifcation and authentication: An
alternative to PKI? ”,IEEE Security and Privacy.
[12] Identifying the data integrity in cloud storage IJCSI International
Journal of Computer Science ISSUES, Vol.9, Issue 2,No 1,March
2012.
.

Weitere Àhnliche Inhalte

Was ist angesagt?

Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
Cloud Computing Security From Sngle to multi Clouds Full Documentaion
Cloud Computing Security From Sngle to multi Clouds Full DocumentaionCloud Computing Security From Sngle to multi Clouds Full Documentaion
Cloud Computing Security From Sngle to multi Clouds Full DocumentaionVamshi Chowdary
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...ijccsa
 
An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingIAEME Publication
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationEditor IJMTER
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learningManimaran A
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055IJERA Editor
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingIOSR Journals
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and RetrievalIOSR Journals
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...cscpconf
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlijdpsjournal
 

Was ist angesagt? (20)

Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Cloud Computing Security From Sngle to multi Clouds Full Documentaion
Cloud Computing Security From Sngle to multi Clouds Full DocumentaionCloud Computing Security From Sngle to multi Clouds Full Documentaion
Cloud Computing Security From Sngle to multi Clouds Full Documentaion
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computing
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 

Andere mochten auch

The Impact of Supervision on Bank Performance
The Impact of Supervision on Bank PerformanceThe Impact of Supervision on Bank Performance
The Impact of Supervision on Bank PerformanceTolip khan
 
ACC certificate
ACC certificateACC certificate
ACC certificateSunil Setpaul
 
Ijarcet vol-2-issue-2-323-329
Ijarcet vol-2-issue-2-323-329Ijarcet vol-2-issue-2-323-329
Ijarcet vol-2-issue-2-323-329Editor IJARCET
 
ćŁèŻ­äș€é™…
ćŁèŻ­äș€é™…ćŁèŻ­äș€é™…
ćŁèŻ­äș€é™…Yee Ivy
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Editor IJARCET
 
Financing the infrastructure; What Islamic Finance may offers
Financing the infrastructure; What Islamic Finance may offersFinancing the infrastructure; What Islamic Finance may offers
Financing the infrastructure; What Islamic Finance may offersWiku Suryomurti
 
Ijarcet vol-2-issue-7-2341-2343
Ijarcet vol-2-issue-7-2341-2343Ijarcet vol-2-issue-7-2341-2343
Ijarcet vol-2-issue-7-2341-2343Editor IJARCET
 
Ijarcet vol-2-issue-4-1579-1582
Ijarcet vol-2-issue-4-1579-1582Ijarcet vol-2-issue-4-1579-1582
Ijarcet vol-2-issue-4-1579-1582Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060Editor IJARCET
 
Tienganhtreem summerschool-dondutuyen-giaovien-updated2013
Tienganhtreem summerschool-dondutuyen-giaovien-updated2013Tienganhtreem summerschool-dondutuyen-giaovien-updated2013
Tienganhtreem summerschool-dondutuyen-giaovien-updated2013tienganhtreemhn
 
Ijarcet vol-2-issue-2-347-351
Ijarcet vol-2-issue-2-347-351Ijarcet vol-2-issue-2-347-351
Ijarcet vol-2-issue-2-347-351Editor IJARCET
 

Andere mochten auch (20)

The Impact of Supervision on Bank Performance
The Impact of Supervision on Bank PerformanceThe Impact of Supervision on Bank Performance
The Impact of Supervision on Bank Performance
 
ACC certificate
ACC certificateACC certificate
ACC certificate
 
Ijarcet vol-2-issue-2-323-329
Ijarcet vol-2-issue-2-323-329Ijarcet vol-2-issue-2-323-329
Ijarcet vol-2-issue-2-323-329
 
ćŁèŻ­äș€é™…
ćŁèŻ­äș€é™…ćŁèŻ­äș€é™…
ćŁèŻ­äș€é™…
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
 
Financing the infrastructure; What Islamic Finance may offers
Financing the infrastructure; What Islamic Finance may offersFinancing the infrastructure; What Islamic Finance may offers
Financing the infrastructure; What Islamic Finance may offers
 
Ijarcet vol-2-issue-7-2341-2343
Ijarcet vol-2-issue-7-2341-2343Ijarcet vol-2-issue-7-2341-2343
Ijarcet vol-2-issue-7-2341-2343
 
Ijarcet vol-2-issue-4-1579-1582
Ijarcet vol-2-issue-4-1579-1582Ijarcet vol-2-issue-4-1579-1582
Ijarcet vol-2-issue-4-1579-1582
 
Presentation1
Presentation1Presentation1
Presentation1
 
1784 1788
1784 17881784 1788
1784 1788
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
1841 1843
1841 18431841 1843
1841 1843
 
Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060Volume 2-issue-6-2056-2060
Volume 2-issue-6-2056-2060
 
Tienganhtreem summerschool-dondutuyen-giaovien-updated2013
Tienganhtreem summerschool-dondutuyen-giaovien-updated2013Tienganhtreem summerschool-dondutuyen-giaovien-updated2013
Tienganhtreem summerschool-dondutuyen-giaovien-updated2013
 
Ijarcet vol-2-issue-2-347-351
Ijarcet vol-2-issue-2-347-351Ijarcet vol-2-issue-2-347-351
Ijarcet vol-2-issue-2-347-351
 
1674 1677
1674 16771674 1677
1674 1677
 
1829 1833
1829 18331829 1833
1829 1833
 

Ähnlich wie Ijarcet vol-2-issue-4-1405-1409

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193IJERA Editor
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?IRJET Journal
 
G033030035
G033030035G033030035
G033030035ijceronline
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTUREcscpconf
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
V04405122126
V04405122126V04405122126
V04405122126IJERA Editor
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 

Ähnlich wie Ijarcet vol-2-issue-4-1405-1409 (20)

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
How secured and safe is Cloud?
How secured and safe is Cloud?How secured and safe is Cloud?
How secured and safe is Cloud?
 
G033030035
G033030035G033030035
G033030035
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
B1802041217
B1802041217B1802041217
B1802041217
 
70 74
70 7470 74
70 74
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
 
I017225966
I017225966I017225966
I017225966
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
V04405122126
V04405122126V04405122126
V04405122126
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 

Mehr von Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Editor IJARCET
 

Mehr von Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097
 

KĂŒrzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

KĂŒrzlich hochgeladen (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Ijarcet vol-2-issue-4-1405-1409

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 4, April 2013 1405 www.ijarcet.org  Abstract— As novel storage model, cloud storage has gain attentions from both the academics and industrial communities. However along with variant advantages, it also brings new challenges in maintaining data integrity and highly available reliable data storage facility. The integrity of the data stored in the service provider is one of challenges to be addressed before the cloud storage is applied widely. Cost is also a major issue in cloud computing when we are switching to multi cloud. To address all the scenario we present a survey paper. This survey paper is based on the recent research related to single and multi cloud cost , security and availability based scenario. This work aim to promote the use of multi cloud environment over single cloud to reduce the risk. Index Terms— cloud computing, data integrity, data intrusion, service availability, cloud service provider. I. INTRODUCTION Cloud computing is an internet based model for enabling convenient on demand network access to shared recourses [1]. It provides various services over internet such as software hardware, data storage, infrastructure. Cloud computing providers delivers application via internet, which are access from desktop and mobile apps.Cloud computing technology grouped into three section: they are SaaS, PaaS, laaS[2] as shown in fig.1. . SaaS(software as a service) it’s an on demand application service. It eliminates the need of installing and running application on customers own computers.PaaS (platform as a service)it’s an on demand platform service to host costumer application. It is a delivery of computer platform and solution as a service.IaaS (infrastructure as a service) in this user can benefit from networking infrastructure services,datastorage and computing services. Rather than purchasing server , software, data centre space client can buy those resources as a fully outsourced service. To accessed these cloud services security and reliability we are using different models like: i) Using single service provider. ii) Using multiple service providers. The weakness of single service provider is that it can be easily be hacked by intruders and if the service provider fails or down for some technical reasons than client will not at all access his/her data. The problem in Multiple service provider models is to compromise the security because there is lack of security technique used here but availability is up to the mark Fig.1 Overview of Cloud computing The reminder of paper is organized as follows. Section 2 discuss about issues in cloud computing. Section 3 new security analysis in cloud computing. Section 4 discuss the comparison of security issues and Section 5 will conclude the paper. II. ISSUES IN CLOUD COMPUTING Before considering the cloud computing technology. It is important to understand the risks involved. You should carry out the risk assessment process before any control is handed over the to a service provider. A. Data storage and security Many cloud service provider provide storage as a service. They take the data from the user and stored on the large data centers, hence providing a user means of storage. Although these service provider says that data stored in a cloud is safe but there have been some cases where data is been modified or lost due to security holes. Various cloud provider adopt various technology to resolve the problem of cloud data storage. The virtualized nature of cloud make the traditional mechanism unstable for handling the security risks so these service provider use different encrypting technique to overcome these problems. Another major issue that is mostly neglected is of data remanences.It refers to the data left out during tranfer.It cause minimal security threat in private cloud computing offerings, A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 4, April 2013 All Rights Reserved © 2012 IJARCET 1406 however server security issues may emerge in case of public cloud offerings as a result of data remanence. Virtualization increases the security of cloud enviroment.With virtualization a single machine can be divided into multiple virtual machine, thus provide better data isolation. The vms provide the security test bed for executing of untested code from entrusted user. An hierarchical reputation system have been proposed in a paper [9] for managing trust I n the cloud environment. B. Application level security Application level security refers to the usage of software and hardware resources to provide the security to application such as attackers are not make any changes in the application formate.Now a days attacker launched them as a trusted user and system consider them as trusted user and allow full access to attacking party. The reason behind this is using outdated network policies. With the technological advancement these security policies become obsolete as there have been instances when system security have been breached, but with the recent technology advancements it is quit possible to imitate a trusted user. The threat to application level security include sql injection attack ,dos attack ,captcha breaking , xss attack. Hence, it is necessary to install high level security check to minimise these risks.Thes traditional method to deal with increased security issue have been to develop a task oriented asic device which can handle the specific task and provide high level of security[10].But with application level threat being dyanamic and adaptable to the security check in place, these closed system have to observed to be slow in compare to the open ended system. C. Data intrusion Another security risk that occurs in cloud computing enviroment, such as the google doc cloud service is a hacked password or data intrusion. If someone gain access to google doc password then they will able to gain all account instance and resources .The stolen password allow the hacker to modify ,erase the full data and even disable the services. Furthermore there is a possibility of hacking email [11] (google doc user name ) to be hacked and since google allow the lost password to be reset by email, the hacker may still able to access the account after receiving the new password. D. Single to multicloud The use of cloud computing have increase in many organization. The cloud computing provide a many benefit in terms of cost and avalability.The pay per use model know as cloud computing. One of the prominent service offer by cloud computing is cloud data storage, in which subscriber don’t want to store their data on their own server, instead of that there data stored in cloud service provider. This service don’t provide only flexibility and scalability for data storage but it also provide the customer with the benefit of only for the amount of data they need to store for the particular period of time. In addition to these benefits customer can access their data from anywhere as long as they are connected to internet. Since the cloud service provider is the different market entities, data integrity and privacy are the most common issues that need to be address in cloud computing. Even thought the cloud service provider have standard regulation and power infrastructure to ensure the customer data privacy and provide a better availability. The political influence might become an issue with the availability of the service. customers Fig. 2. Cloud computing architecture In this work we observe that relaying on single service provider for his out sourcing data is not very promising. The availability of the data is not up to the mark. if suppose the cloud service provider goes down due to any technical reason, then no one will access the data from any where this means high availability violated as shown in fig 2.To address this issue we are switching from single service provider to multiple service provider where we can store the customer data into multiple service provider so that if any service provider get down even then user can access their data as shown in fig 3. customers Fig. 3 Multi. cloud computing architecture E. Data integrity In cloud computing, data move to remotely cloud server [12].cloud remotely store the data and get back to owner whenever it needed. But there is no guarantee that the data stored is not alter by cloud or third party auditor(TPA).In order to overcome the threat of data integrity , the user must be able to use the assist of TPA.The TPA have experience about checking the integrity of a data, that cloud user do not have, and that is difficult for the owner to check. Data integrity is one of the important issues in cloud computing. Because data integrity ensure that data is of high quality, correct, consistent and accessiable.After moving the data to cloud, user thought that there data are secured. The hope may be fail some times, the user data may be alter or deleted. In this scenario it is important to verify the tempered or deleted data cloud c s p c s p CSP1 Redundant data CSP2 Redundant data
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 4, April 2013 1407 www.ijarcet.org F. Cost Cost is also the one of the major issue in a cloud computing. As the size of data increase the cost of data also increases, this means cost is directly proportion to size of data. But there is different cost in term of single cloud and multi cloud. Because data stored in the multi cloud is to achieve high avalability,so redundant data are store in multiple service provider then the cost will be calculated by adding the cost of all service provider that contain the redundant data that will be the total cost[2]. There is one more factor by which cost will be increase, i.e. algorithm, as the algorithm complexity increase cost of service provider will also increase, which mean algorithm complexity is directly proportional to cost. III. NEW SECURITY ANALYSIS IN CLOUD COMPUTING In this section we analyze the security mechanism related with data integrity, data inrusion, and service availability. A. Homomorphic token technique In the cloud data storage system, users store their data in the cloud and no longer possess the data locally. Thus, the correctness and availability of the data files being stored on the distributed cloud servers must be guaranteed. One of the key issues is to effectively detect any unauthorized data modification and corruption, possibly due to server compromise and/or random Byzantine failures. Besides, in the distributed case when such inconsistencies are successfully detected, to find which server the data error lies in is also of great significance, since it can always be the first step to fast recover the storage errors and/or identifying potential threats of external attack. Fig. 3Towared secure storage multi. cloud computing architecture To address these problems, our main scheme for ensuring cloud data storage is presented in this section. The first part of the section is devoted to a review of basic tools from coding theory that is needed in our scheme for file distribution across cloud servers. Then, the homomorphic token is introduced. The token computation function we are considering belongs to a family of universal hash function, chosen to preserve the homomorphic properties, which can be perfectly integrated with the verification of erasure-coded data. Subsequently, it is shown how to derive a challenge response protocol for verifying the storage correctness as well as identifying misbehaving servers. The procedure for file retrieval and error recovery based on erasure correcting code is also outlined. Finally, we describe how to extend our scheme to third party auditing with only slight modification of the main design. B. File division technique In order to achieve secure, storage and access on outsource data in the cloud we exploit the technique of multiple division to protect the data files. Proposed model has enabled us to store data easily and securely. As in this method dividing the data into multiple parts and as the number of part increase the security of data also increase because it is difficult for intruder to check all file to match the content as shown in fig.2. Here we are not focusing on using any technique for multiple division we can use any basic mechanism to divide file to reduce the cost. To illustrate this model we use example there are three clients represented as a C1 and C2.And they stored there data in two different cloud service provider its represent as CSP1 and CSP2. client store there data in the CSP that data will be divided in the form of multi division technique in the client side and that multiple data stored in an redundant form into both the cloud service provider simultaneously such that if any cloud service. Customers Fig. 4 A cost effective multi. cloud computing model C. Depsky model This section will explain the recent work that have been done in the area of multi cloud. A virtual cloud storage system is called depsky.It address the issue like data integrity , availability in multi cloud. Fig. 5 A depsky architecture [3] A depsky architecture [3] consist four cloud and each cloud uses its own particular interfaces. The depsky algorithm exist in client machine as a software library to communicate with cloud as shown in fig.5.These four cloud are storage cloud, so there are no code to CSP D1+D2
..+ Dn CSP D1+D2+
 
.Dn
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 4, April 2013 All Rights Reserved © 2012 IJARCET 1408 be executed. The depsky library allow only reading and writing permission with the cloud storage. D. Privacy protocol Data and software process protocol steps executed by cloud customers to add the privacy enforcement structure to the software and data before transferring them to the cloud. Privacy feedback protocol describe essential component that should be considered and planned through when designing privacy aware cloud service .The main aim of this protocol to inform user for the various privacy mechanism applied on their data and make them to aware of risk. IV. COMPARING THE SECURITY ISSUES IN CLOUD COMPUTING Ref Year Dataintegrity Dataavailability Singlecloud Multicloud Securitymechanism CostLow Medium High [1 2012 Follow Follow Follow Homomorp hictoken technique Follow [2 2011 Follow Follow Follow File division technique Follow [3 2011 Follow Follow Follow Depsky algorithm Follow [4 2011 Follow survey Follow Follow [5 2010 Follow RAIDlike technique Follow [6 2010 Follow Follow [7 2009 Follow follow Privacy protocol Follow Table 1 Comparison based on issues in cloud computing Table 1 illustrate the advantage of single cloud model over multi cloud model. It also address some specific issues in single cloud as well as multi cloud and give the comparison between them. It is clear from the table that there are more research have been done in the past in single cloud as well as in multicloud. Multicloud can address the issues like data integrity, data availability and data intrusion. and in addition most of the research focus on providing the secure storage such as in depsky.Therefore providing the cloud data base storage system instead of normal storage system is a significant role in order to run queries and deal with database. Table 1 also illustrate that in 2010 80% of the research are based on single cloud and about 20% of research are based on multi cloud .It is clear from the past that the more research has been conducted in the area of single cloud in comparison to multi cloud Cost is the one of major issue in multi cloud model because as the data redundancy increase among the service provider cost will increase and as the data store redundantly security of data also needed, so moving to complex algorithm also charge cost of implementation .The cost increase as the complex algorithm increase .To overcome these problem some author used some technique like token, file division method to reduce the cost. By applying these technique the cost will be reduce as compare to algorithm. But this scheme is not fully secure they just balance the security risks and cost. in future they need to go for more secure scheme to make their user data more secure. V. CONCLUSION The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-per-use service business model known as cloud computing. Cloud data Storage redefines the security issues targeted on customer’s outsourced data (data that is not stored/retrieved from the costumers own servers). In this work we observed that, from a customer’s point of view, relying upon a solo SP for his outsourced data is not very promising, so we are switching toward multi cloud. The cloud computing security is still a major issue in cloud computing enviroment.in addition the loss of service availability and data integrity are the major problem for the customer.Furthermorte data intrusion increase so many problem to the user of cloud computing. The purpose of this work is to focus on the security issue and cost related with single cloud as well as multi cloud. Much research has been done on the single cloud and more research are going in the area of multi cloud to overcome these cost and security issue as well. we support the migration on multi cloud. REFERENCES [1] Cong Wang,student member,ieee,Qian Wang,student member,ieee, Kui Ren,member,ieee,Ning Cao,student member,ieee and Wenjing Lou,senior member,ieee,”Towared secure and dependable storage in cloud computing” 2012. . [2] Yashaswi Singh,Farah Kandah,Weiyi Zhang,” secure cost effective multi cloud storage in cloud computing”2011. [3] A.Bessani, M. Correia, B.Quaresma, F.Andre and P.Soura “Depsky:dependable and secure storage in cloud computing.”2011. [4] F.Rocha and M.Correia “lucy in the Sky without Diamond: stealing Confidential Data in the Cloud”, Proc 1stIntl . Workshop od Dependability of Clouds, Data Centres and Virtual Computing Environments, 2011. [5] Computing, 18(5), 2006, pp. 387-408. H.Abu-Libdeh, L.Princehouse and H.Weatherspoon, “ RACS: a case for Cloud storage
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 4, April 2013 1409 www.ijarcet.org diversity”,SoCC ’10: Proc. 1stACM symposium on Cloud Computing,2010. [6] E.Grosse, J.Howie, J.Ransome, J Reavis and S.Schmidt, “ Cloud computing roundtable”, IEEE Security & Privacy,8(6),2010. [7] W.Itani, A.Kayssi, A.Chehab, “Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures” Eight IEEE International Conference on Dependable, Autonomic ans Secure Computing,Dec 2009. [8] R.Gellman, “Privacy in the cloud: Risks to privacy and confidentiality from cloud computing”,Prepared for the World Privacy Forum Feb 2009. [9] B.R.Kandukuri, R.V.Paturi and A.Rakshit, “Cloud Security Issues,” 2009 IEEE International Conference on Service Computing, 2009. [10] Scalable Security Solutions, Check Point Open Performance Architecture, Quad-Core Intel Xeon Processors,”Delivering Application-Levels Security at Data Centre Performance Levels,”Intel Corporation, 2008. [11] S.L.Garfinkel,” Email-based identifcation and authentication: An alternative to PKI? ”,IEEE Security and Privacy. [12] Identifying the data integrity in cloud storage IJCSI International Journal of Computer Science ISSUES, Vol.9, Issue 2,No 1,March 2012. .