SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Noman Mazher et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

A Survey on data security models in cloud computing
Noman Mazher1 Imran Ashraf2
1
2

Department of Information Technology University of Gujrat, Gujrat Pakistan
Lecturer Faculty of CS & IT, University of Gujrat, Gujrat Pakistan

Abstract:
The world of data computing is becoming larger and complex day by day. Could computing is the most popular
model for supporting large and complex data. Organizations are moving toward cloud computing for getting
benefit of its cost reduction and elasticity features. However cloud computing has potential riks and
vulnerabilities. One of major hurdle in moving to cloud computing is its security and privacy concerns. As in
cloud computing environment data is out of user possession this leads to great risk of data integrity, data
confidentiality and data vulnerability etc. A number of security models have been developed to cope with these
security threats. Our research aims at investigating security models that were developed for securing data during
whole lifecycle of cloud computing.
Keywords—Cloud computing , data security , security model
I.
INTRODUCTION
The world of computation has becoming
larger and complex day by day. Could computing is
most popular model for supporting large and complex
data. Organizations are moving toward cloud
computing for getting benefit of its cost reduction
and elasticity features. Yet cloud computing have
potential disadvantages and threats. One of the major
hurdles in moving to cloud computing is its security
and privacy concerns. As in cloud computing
environment data is out of user possession this
increases the risk of data integrity, data
confidentiality etc. To reduce these risks researchers
have purposed many security models. In our research
we will investigate security models that were
developed for securing data during whole lifecycle of
cloud computing.
The data life cycle is divided into seven stages
that are Data generation , data transfer , use , share ,
storage , archival and destruction (Chen e Zhao,
2012) .
In proceeding section we will introduce different
security models purposed for different security
threats.
II.
RELATED WORKS
Cloud computing collects all the computing
resources and manages them automatically through
software. The historical data and present data are
integrated to make the collected information more
accurate. In this way cloud computing provides more
intelligent service to the users. The users are not
bothered about how to buy a server or solution.
Instead they can buy the computing resources on the
internet according to their need. However cloud
computing emerge as promising technology in order
www.ijera.com

to provide the services remotely. But there are many
security issues in cloud computing. For example in
February, 2010, the Amazon network host service, S3
(Simple Storage Service) was broken down for 4
hours. This made people think about the security of
cloud computing again. Since Amazon provides S3, it
has attracted a lot of entrepreneur on Web 2.0 put
their website on the data center of Amazon to save a
large hardware investment (Zhang et al., 2010). So
the service of cloud computing is not stable and
believable. Security is still a major concern in cloud
computing and one of the reason that’s why cloud
computing is still not admitted by the users.
To improve security of cloud many models
have been purposed. User would like to know which
security scheme they should implement for securing
our data. Comparison of these security schemes have
also been done by many researchers such as Farzad
Sabahi discuss many security problems to cloud
computing against these problems. (Sabahi, 2011) .
In this section we will introduce different security
models which were purposed by different
researchers. We will also tell about each security
model that in which layer it works.
A. Private Virtual Infrastructure (PVI):
This model is proposed by F.John Krothein
.(Author Guidelines for 8 - krautheim.pdf, 2013) In
this model he addresses risks associated with data. As
in cloud computing data is out of control of
organization so privacy and security of data is the
major concern of the organizations. PVI ensures
security of data while transferring data from client to
service provider and vice versa. Main purpose of PVI
is to secure data during its transfer stage. In this
413 | P a g e
Noman Mazher et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417

www.ijera.com

purposed architecture data security is ensured with
the help of two layers: PVI layer and cloud fabric
layer.
PVI layer:
Datacenter of PVI is controlled by information
owner. Each client is responsible of security of data
through firewall, intrusion detection system and other
monitoring and logging system to ensure that data is
confidential.
Cloud fabric layer:
Cloud datacenter or fabrics are controlled by cloud
service provider. This layer is responsible of
maintaining physical and logical security of data.
They ensure the security through security tools.
Another tool Locator Botprovider is also used.
Locator Botprovider provides details of all activities

by monitoring the cloud security. He claims that
locator Botprovider will also ensure security during
destruction stage of data. This architecture is
general and does not restrict itself to any specific
XaaS (IaaS, PaaS, and SaaS) service. It is a suggested
architecture and there is no implementation detail
provided.

Fig 1: cloud data storage service (Wang et al., 2010)
Third Party Auditor (TPA) is pivotal point in this
architecture as he has expertise and experience of
auditing data. TPA can send regular audit reports of
data. From those report user can evaluate that either
his data is going securely on cloud or not. To show
the performance of the proposed model a
mathematical notational proof is provided as well.
However no implementation detail in any domain is
provided. This architecture can be used for all XaaS
(IaaS, PaaS, and SaaS) services.

infrastructure for sensitive, private data and
computation, while integrating public clouds for no
sensitive, public data and computation. In this paper
the purposed model Hybprex is also implemented in
a specific environment called Mapreduce. Mapreduce
is a programming model used to execute large dataset
with parallel algorithm.

C. Cloud data storage security scheme:
This scheme is developed by Syed Azahad
and Mr.Srinivas Rao(Azhad e Rao). In this scheme
their main focus is on data storage security. This
scheme is developed with SaaS in mind. This scheme
addresses the correctness of data in the cloud
environment. In this scheme they use homomorphic
token with distributed verification. They claim to
achieve integration of correctness of storage data
and error localization of data. They also give security
analysis and the results of their analysis with the help
of graphs.
D. Hypbrex (Hybrid Execution) model:
Steven.Y.Ko et.al purposed that model (Ko,
Jeon e Morales, 2011). The HybrEx model provides a
seamless way for an organization to utilize their own
www.ijera.com

B. Privacy-preservation public Auditing:
This model is purposed by Cong-wang
et...al. (Wang et al., 2010)This architecture is
suggested typically for securing data of cloud during
during storage stage. In prototype of this model he
takes three entities 1) cloud user 2) cloud server 3)
cloud service provider.

Fig 2: Architecture of Hypbrex model (Azhad e Rao)
Hypbrex model typically worsk on storage stage of
data. For ensuring integrity of data on public cloud he
purposed to maintain hashes of public data in private
cloud. With the help of these hashing algorithms
hybprex can validate integrity of both public and
private data

414 | P a g e
Noman Mazher et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417
E. . Airavat :
Indraji roy et al purposed that model for security and
privacy for Mapreduce .(Untitled - roy.pdf, 2013)
Mapreduce is a programming model used to execute
large dataset with parallel algorithm. Airavat
guarantees to bound information leakage from any
individual data that is computed over mapreduce..

Fig 3 : Architecture of mapreduce (Roy et al., 2010)
In this paper they implemented Airavat on mapreduce
environment and gave the result with the help of
graphs .Airavat provides security on data storage
stage.
F. Integrated conceptual digital forensic
framework
This paper is written by Ben Martenie (An
integrated conceptual digital forensic framework for
cloud computing - r_6_130217100243.pdf, 2013) . In
this paper he integrates two framework of digital
forensics. These two frameworks are McKemmish
(1999) and NIST (Kent et al., 2006) . This
framework is analyzed
with help of survey and
questioner. These frameworks are work for data
security in data transfer stage.
G. Insider Threat remedies:
William R.ClayComb discussed a series of
security threats which are associated to cloud

Fig 4: Overview of POR process (ProvingRetrievability-and-Possession-within-the-CloudStorage-Model.pdf, 2013)
2) PDP (Proving data possession)
www.ijera.com

www.ijera.com

computing in general and data security in specific. A
general
data
security
threat
is
insider
threat.(Claycomb e Nicoll, 2012) Insider threat is
commonly known as “Rouge Administrator” threat.
According to definition of CERT insider threat is
“current or former employee, contractor, or other
business partner who has or had authorized access to
an organizations network, system or data and
intentionally exceeded or misused that access in a
manner that negatively affected the confidentiality,
integrity, or availability of the organizations
information or information systems.”
They gave the following suggestions to prevent our
data from insider threat:
 Enforce strict supply chain management and
conduct
a
comprehensive
supplier
assessment.
 Specify human resource requirements as
part of legal contracts.
 Require
transparency
into
overall
information security and management
practices, as well as compliance reporting.
 Determine security breach notification
processes.
Insider threat or “rogue administrator” threat can be
categorized on data storage stage of cloud
computing.
H. POR and PDP:
Jeff WhiteWorth discussed two issue of SaaS storage
model
(Proving-Retrievability-and-Possessionwithin-the-Cloud-Storage-Model.pdf, 2013).
1) POR (Prove of Retrievability )
First issue is Prove of Retrievability. This means that
user should have any proof that data stored on Cloud
storage device can be retrieved without any error or
loss, when needed. Solution provided for POR is to
use hash function on data. So data is sent in
encrypted state. When original data owner or prover
wants to retrieve data from cloud service provider or
verifier he can ensure that data which are retrieved
are same as sent for storing .

Provable data possession (PDP) refers to the ability
of a client to verify that data stored with a server still
possesses the data without retrieving it. The building
block of the proposed PDP scheme utilizes
415 | P a g e
Noman Mazher et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417
Homomorphic Verifiable Tags (HVTs) that are, in
the most basic concept, metadata stored with the file
that provides unforgeable data tags used for
verification. These building blocks are utilized in the
four main polynomial-time algorithms used in the
PDP scheme: KeyGen, TagBlock, GenProof and

www.ijera.com

CheckProof. The first two algorithms are used in the
scheme setup to produce public and secret keys as
well as HVTs. GenProof is used by the server to
generate a proof in response to the challenge sent by
the client and CheckProof is used by the client to
verify the proof generated by the server.

Fig 5: PDP overview (Proving-Retrievability-andPossession-within-the-Cloud-Storage-Model.pdf,
2013)
Both of these approaches address data security at
storage stage.
I.

Transparent
Table
encryption
Technique:
Ms. Ankita Parkash et al purposed an oracle storage
based technique for ensuring data security in cloud
computing (Baheti e Patil, 2013). This technique
ensures the reliability of data that is stored in cloud
environment.

Fig 6: Working diagram of proposed system (Baheti
e Patil, 2013)
In this approach they purposed a novel approach of
storing data. As user data is stored on any particular
cloud so we divide that particular cloud into four
groups or region R0, R1, R3 and R3. When user
stores his file on cloud his file is partitioned in four
parts. A segment file is maintained for each file.

www.ijera.com

Fig 7: segment table (Baheti e Patil, 2013)
Here Base represents the starting address of segment
in memory. The bound represents end address of the
segment. Rw field represents read and write access of
that segment. This all work will be done on cloud
administrator side. Cloud administrator encrypts
entries of segment table. When user wants to retrieve
their data cloud administrator will decrypt that
segment table entries and with the help of base and
bound address gets user data and sends it to the user.
So in this way user data can be secured in cloud
environment. This technique also addresses security
threats at data storage stage.
III.
CONCLUSION
In this research we analyzed different
security models that were purposed for different
stages of data in cloud computing. It presents a
comprehensive report on different security models
which has been purposed so far.
For securing data on different stages of data
lifecycle different security models can be
implemented
within
different
perspectives.
Confidentiality is an immense concern of data
security. To ensure users confidentiality Hypbrex
model can be implemented as it is developed by
taking confidentiality in mind specifically. While in
the environment where information leakage is more
important Airavat is the best suit. If data will have to
store for long time their Proof of reliability and proof
of data possession is very important. So model of OR
416 | P a g e
Noman Mazher et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417
and PDP scheme presented is best suited in scenario
where data will have to store for a long time.
Reliability of stored data is very important for user.
Transport Table Encryption Scheme is best suited for
ensuring reliability of data. Cloud computing security
scheme can be used where integration and
correctness of data is important. Transfer of data
during client to server can be secured using PVI
model.

[12]

[13]

www.ijera.com

WANG, C. et al. Privacy-preserving public
auditing for data storage security in cloud
computing. INFOCOM, 2010 Proceedings
IEEE, 2010, IEEE. p.1-9.
ZHANG, S.
et al. Cloud computing
research and development trend. Future
Networks,
2010.
ICFN'10.
Second
International Conference on, 2010, IEEE.
p.93-97.

References:
[1]
[2]

[3]
[4]

[5]

[6]

[7]

[8]

[9]
[10]

[11]

http://www.ccbc.ir/files_site/files/r_6_13021
7100243.pdf >.
Author Guidelines for 8 - krautheim.pdf.
2013.
Disponível
em:
<
http://static.usenix.org/event/hotcloud09/tec
h/full_papers/krautheim.pdf >.
AZHAD, S.; RAO, M. S. Ensuring Data
Storage Security in Cloud Computing.
BAHETI, A. P.; PATIL, S. V. Cloud
Security Based On Oracle Storage Using
Transparent Table Encryption Technique.
IJCER, v. 2, n. 2, p. 132-136, 2013. ISSN
2278-5795.
CHEN, D.; ZHAO, H. Data security and
privacy protection issues in cloud
computing.
Computer
Science
and
Electronics Engineering (ICCSEE), 2012
International Conference on, 2012, IEEE.
p.647-651.
CLAYCOMB, W. R.; NICOLL, A. Insider
Threats to Cloud Computing: Directions for
New Research Challenges. Computer
Software and Applications Conference
(COMPSAC), 2012 IEEE 36th Annual,
2012, IEEE. p.387-394.
KO, S. Y.; JEON, K.; MORALES, R. The
hybrex model for confidentiality and privacy
in cloud computing. Proceedings of the 2011
conference on Hot topics in Cloud
Computing. USENIX Association, Portland,
OR, 2011.
Proving-Retrievability-and-Possessionwithin-the-Cloud-Storage-Model.pdf. 2013.
Disponível
em:
<
http://www.whitworthtech.com/sysadmin/w
p-content/uploads/2012/07/ProvingRetrievability-and-Possession-within-theCloud-Storage-Model.pdf >.
ROY, I. et al. Airavat: Security and Privacy
for MapReduce. NSDI, 2010. p.297-312.
SABAHI, F. Cloud computing security
threats and responses. Communication
Software and Networks (ICCSN), 2011
IEEE 3rd International Conference on, 2011,
IEEE. p.245-249.
Untitled - roy.pdf. 2013. Disponível em: <
https://www.usenix.org/legacy/event/nsdi10/
tech/full_papers/roy.pdf >.

www.ijera.com

417 | P a g e

Weitere ähnliche Inhalte

Was ist angesagt?

Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformSamuel Borthwick
 
Cloud computing and security issues in the
Cloud computing and security issues in theCloud computing and security issues in the
Cloud computing and security issues in theIJNSA Journal
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudEditor IJCATR
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storageijtsrd
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageIRJET Journal
 
Cloud computing technology security and trust challenges
Cloud computing technology security and trust challengesCloud computing technology security and trust challenges
Cloud computing technology security and trust challengesijsptm
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...ElavarasaN GanesaN
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services   a proposal  by shibwabo anyembeSecure third party cloud computing services   a proposal  by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembeShibwabo Christopher Anyembe
 

Was ist angesagt? (18)

Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
C017421624
C017421624C017421624
C017421624
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud Platform
 
Cloud computing and security issues in the
Cloud computing and security issues in theCloud computing and security issues in the
Cloud computing and security issues in the
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the Cloud
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
Cloud computing technology security and trust challenges
Cloud computing technology security and trust challengesCloud computing technology security and trust challenges
Cloud computing technology security and trust challenges
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services   a proposal  by shibwabo anyembeSecure third party cloud computing services   a proposal  by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembe
 

Andere mochten auch (20)

Bs36418429
Bs36418429Bs36418429
Bs36418429
 
Bj36363371
Bj36363371Bj36363371
Bj36363371
 
Bc36330333
Bc36330333Bc36330333
Bc36330333
 
Ax36300303
Ax36300303Ax36300303
Ax36300303
 
B360614
B360614B360614
B360614
 
Z36149154
Z36149154Z36149154
Z36149154
 
Ab36161166
Ab36161166Ab36161166
Ab36161166
 
At36276280
At36276280At36276280
At36276280
 
Ak36215227
Ak36215227Ak36215227
Ak36215227
 
Bl36378381
Bl36378381Bl36378381
Bl36378381
 
Bw36444448
Bw36444448Bw36444448
Bw36444448
 
Cp36547553
Cp36547553Cp36547553
Cp36547553
 
Ci36507510
Ci36507510Ci36507510
Ci36507510
 
Bz36459463
Bz36459463Bz36459463
Bz36459463
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Ck36515520
Ck36515520Ck36515520
Ck36515520
 
Bu36433437
Bu36433437Bu36433437
Bu36433437
 
Bk36372377
Bk36372377Bk36372377
Bk36372377
 
Cq36554559
Cq36554559Cq36554559
Cq36554559
 
Bt36430432
Bt36430432Bt36430432
Bt36430432
 

Ähnlich wie Br36413417

Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingYolanda Ivey
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET Journal
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docxsleeperharwell
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYSECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYijsrd.com
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architectureijsrd.com
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
Data Security Model Enhancement in Cloud Environment
Data Security Model Enhancement in Cloud EnvironmentData Security Model Enhancement in Cloud Environment
Data Security Model Enhancement in Cloud Environmentijsrd.com
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxmichael591
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...IJERA Editor
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 

Ähnlich wie Br36413417 (20)

Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYSECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architecture
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Data Security Model Enhancement in Cloud Environment
Data Security Model Enhancement in Cloud EnvironmentData Security Model Enhancement in Cloud Environment
Data Security Model Enhancement in Cloud Environment
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docx
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 

Kürzlich hochgeladen

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Kürzlich hochgeladen (20)

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Br36413417

  • 1. Noman Mazher et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417 RESEARCH ARTICLE www.ijera.com OPEN ACCESS A Survey on data security models in cloud computing Noman Mazher1 Imran Ashraf2 1 2 Department of Information Technology University of Gujrat, Gujrat Pakistan Lecturer Faculty of CS & IT, University of Gujrat, Gujrat Pakistan Abstract: The world of data computing is becoming larger and complex day by day. Could computing is the most popular model for supporting large and complex data. Organizations are moving toward cloud computing for getting benefit of its cost reduction and elasticity features. However cloud computing has potential riks and vulnerabilities. One of major hurdle in moving to cloud computing is its security and privacy concerns. As in cloud computing environment data is out of user possession this leads to great risk of data integrity, data confidentiality and data vulnerability etc. A number of security models have been developed to cope with these security threats. Our research aims at investigating security models that were developed for securing data during whole lifecycle of cloud computing. Keywords—Cloud computing , data security , security model I. INTRODUCTION The world of computation has becoming larger and complex day by day. Could computing is most popular model for supporting large and complex data. Organizations are moving toward cloud computing for getting benefit of its cost reduction and elasticity features. Yet cloud computing have potential disadvantages and threats. One of the major hurdles in moving to cloud computing is its security and privacy concerns. As in cloud computing environment data is out of user possession this increases the risk of data integrity, data confidentiality etc. To reduce these risks researchers have purposed many security models. In our research we will investigate security models that were developed for securing data during whole lifecycle of cloud computing. The data life cycle is divided into seven stages that are Data generation , data transfer , use , share , storage , archival and destruction (Chen e Zhao, 2012) . In proceeding section we will introduce different security models purposed for different security threats. II. RELATED WORKS Cloud computing collects all the computing resources and manages them automatically through software. The historical data and present data are integrated to make the collected information more accurate. In this way cloud computing provides more intelligent service to the users. The users are not bothered about how to buy a server or solution. Instead they can buy the computing resources on the internet according to their need. However cloud computing emerge as promising technology in order www.ijera.com to provide the services remotely. But there are many security issues in cloud computing. For example in February, 2010, the Amazon network host service, S3 (Simple Storage Service) was broken down for 4 hours. This made people think about the security of cloud computing again. Since Amazon provides S3, it has attracted a lot of entrepreneur on Web 2.0 put their website on the data center of Amazon to save a large hardware investment (Zhang et al., 2010). So the service of cloud computing is not stable and believable. Security is still a major concern in cloud computing and one of the reason that’s why cloud computing is still not admitted by the users. To improve security of cloud many models have been purposed. User would like to know which security scheme they should implement for securing our data. Comparison of these security schemes have also been done by many researchers such as Farzad Sabahi discuss many security problems to cloud computing against these problems. (Sabahi, 2011) . In this section we will introduce different security models which were purposed by different researchers. We will also tell about each security model that in which layer it works. A. Private Virtual Infrastructure (PVI): This model is proposed by F.John Krothein .(Author Guidelines for 8 - krautheim.pdf, 2013) In this model he addresses risks associated with data. As in cloud computing data is out of control of organization so privacy and security of data is the major concern of the organizations. PVI ensures security of data while transferring data from client to service provider and vice versa. Main purpose of PVI is to secure data during its transfer stage. In this 413 | P a g e
  • 2. Noman Mazher et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417 www.ijera.com purposed architecture data security is ensured with the help of two layers: PVI layer and cloud fabric layer. PVI layer: Datacenter of PVI is controlled by information owner. Each client is responsible of security of data through firewall, intrusion detection system and other monitoring and logging system to ensure that data is confidential. Cloud fabric layer: Cloud datacenter or fabrics are controlled by cloud service provider. This layer is responsible of maintaining physical and logical security of data. They ensure the security through security tools. Another tool Locator Botprovider is also used. Locator Botprovider provides details of all activities by monitoring the cloud security. He claims that locator Botprovider will also ensure security during destruction stage of data. This architecture is general and does not restrict itself to any specific XaaS (IaaS, PaaS, and SaaS) service. It is a suggested architecture and there is no implementation detail provided. Fig 1: cloud data storage service (Wang et al., 2010) Third Party Auditor (TPA) is pivotal point in this architecture as he has expertise and experience of auditing data. TPA can send regular audit reports of data. From those report user can evaluate that either his data is going securely on cloud or not. To show the performance of the proposed model a mathematical notational proof is provided as well. However no implementation detail in any domain is provided. This architecture can be used for all XaaS (IaaS, PaaS, and SaaS) services. infrastructure for sensitive, private data and computation, while integrating public clouds for no sensitive, public data and computation. In this paper the purposed model Hybprex is also implemented in a specific environment called Mapreduce. Mapreduce is a programming model used to execute large dataset with parallel algorithm. C. Cloud data storage security scheme: This scheme is developed by Syed Azahad and Mr.Srinivas Rao(Azhad e Rao). In this scheme their main focus is on data storage security. This scheme is developed with SaaS in mind. This scheme addresses the correctness of data in the cloud environment. In this scheme they use homomorphic token with distributed verification. They claim to achieve integration of correctness of storage data and error localization of data. They also give security analysis and the results of their analysis with the help of graphs. D. Hypbrex (Hybrid Execution) model: Steven.Y.Ko et.al purposed that model (Ko, Jeon e Morales, 2011). The HybrEx model provides a seamless way for an organization to utilize their own www.ijera.com B. Privacy-preservation public Auditing: This model is purposed by Cong-wang et...al. (Wang et al., 2010)This architecture is suggested typically for securing data of cloud during during storage stage. In prototype of this model he takes three entities 1) cloud user 2) cloud server 3) cloud service provider. Fig 2: Architecture of Hypbrex model (Azhad e Rao) Hypbrex model typically worsk on storage stage of data. For ensuring integrity of data on public cloud he purposed to maintain hashes of public data in private cloud. With the help of these hashing algorithms hybprex can validate integrity of both public and private data 414 | P a g e
  • 3. Noman Mazher et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417 E. . Airavat : Indraji roy et al purposed that model for security and privacy for Mapreduce .(Untitled - roy.pdf, 2013) Mapreduce is a programming model used to execute large dataset with parallel algorithm. Airavat guarantees to bound information leakage from any individual data that is computed over mapreduce.. Fig 3 : Architecture of mapreduce (Roy et al., 2010) In this paper they implemented Airavat on mapreduce environment and gave the result with the help of graphs .Airavat provides security on data storage stage. F. Integrated conceptual digital forensic framework This paper is written by Ben Martenie (An integrated conceptual digital forensic framework for cloud computing - r_6_130217100243.pdf, 2013) . In this paper he integrates two framework of digital forensics. These two frameworks are McKemmish (1999) and NIST (Kent et al., 2006) . This framework is analyzed with help of survey and questioner. These frameworks are work for data security in data transfer stage. G. Insider Threat remedies: William R.ClayComb discussed a series of security threats which are associated to cloud Fig 4: Overview of POR process (ProvingRetrievability-and-Possession-within-the-CloudStorage-Model.pdf, 2013) 2) PDP (Proving data possession) www.ijera.com www.ijera.com computing in general and data security in specific. A general data security threat is insider threat.(Claycomb e Nicoll, 2012) Insider threat is commonly known as “Rouge Administrator” threat. According to definition of CERT insider threat is “current or former employee, contractor, or other business partner who has or had authorized access to an organizations network, system or data and intentionally exceeded or misused that access in a manner that negatively affected the confidentiality, integrity, or availability of the organizations information or information systems.” They gave the following suggestions to prevent our data from insider threat:  Enforce strict supply chain management and conduct a comprehensive supplier assessment.  Specify human resource requirements as part of legal contracts.  Require transparency into overall information security and management practices, as well as compliance reporting.  Determine security breach notification processes. Insider threat or “rogue administrator” threat can be categorized on data storage stage of cloud computing. H. POR and PDP: Jeff WhiteWorth discussed two issue of SaaS storage model (Proving-Retrievability-and-Possessionwithin-the-Cloud-Storage-Model.pdf, 2013). 1) POR (Prove of Retrievability ) First issue is Prove of Retrievability. This means that user should have any proof that data stored on Cloud storage device can be retrieved without any error or loss, when needed. Solution provided for POR is to use hash function on data. So data is sent in encrypted state. When original data owner or prover wants to retrieve data from cloud service provider or verifier he can ensure that data which are retrieved are same as sent for storing . Provable data possession (PDP) refers to the ability of a client to verify that data stored with a server still possesses the data without retrieving it. The building block of the proposed PDP scheme utilizes 415 | P a g e
  • 4. Noman Mazher et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417 Homomorphic Verifiable Tags (HVTs) that are, in the most basic concept, metadata stored with the file that provides unforgeable data tags used for verification. These building blocks are utilized in the four main polynomial-time algorithms used in the PDP scheme: KeyGen, TagBlock, GenProof and www.ijera.com CheckProof. The first two algorithms are used in the scheme setup to produce public and secret keys as well as HVTs. GenProof is used by the server to generate a proof in response to the challenge sent by the client and CheckProof is used by the client to verify the proof generated by the server. Fig 5: PDP overview (Proving-Retrievability-andPossession-within-the-Cloud-Storage-Model.pdf, 2013) Both of these approaches address data security at storage stage. I. Transparent Table encryption Technique: Ms. Ankita Parkash et al purposed an oracle storage based technique for ensuring data security in cloud computing (Baheti e Patil, 2013). This technique ensures the reliability of data that is stored in cloud environment. Fig 6: Working diagram of proposed system (Baheti e Patil, 2013) In this approach they purposed a novel approach of storing data. As user data is stored on any particular cloud so we divide that particular cloud into four groups or region R0, R1, R3 and R3. When user stores his file on cloud his file is partitioned in four parts. A segment file is maintained for each file. www.ijera.com Fig 7: segment table (Baheti e Patil, 2013) Here Base represents the starting address of segment in memory. The bound represents end address of the segment. Rw field represents read and write access of that segment. This all work will be done on cloud administrator side. Cloud administrator encrypts entries of segment table. When user wants to retrieve their data cloud administrator will decrypt that segment table entries and with the help of base and bound address gets user data and sends it to the user. So in this way user data can be secured in cloud environment. This technique also addresses security threats at data storage stage. III. CONCLUSION In this research we analyzed different security models that were purposed for different stages of data in cloud computing. It presents a comprehensive report on different security models which has been purposed so far. For securing data on different stages of data lifecycle different security models can be implemented within different perspectives. Confidentiality is an immense concern of data security. To ensure users confidentiality Hypbrex model can be implemented as it is developed by taking confidentiality in mind specifically. While in the environment where information leakage is more important Airavat is the best suit. If data will have to store for long time their Proof of reliability and proof of data possession is very important. So model of OR 416 | P a g e
  • 5. Noman Mazher et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417 and PDP scheme presented is best suited in scenario where data will have to store for a long time. Reliability of stored data is very important for user. Transport Table Encryption Scheme is best suited for ensuring reliability of data. Cloud computing security scheme can be used where integration and correctness of data is important. Transfer of data during client to server can be secured using PVI model. [12] [13] www.ijera.com WANG, C. et al. Privacy-preserving public auditing for data storage security in cloud computing. INFOCOM, 2010 Proceedings IEEE, 2010, IEEE. p.1-9. ZHANG, S. et al. Cloud computing research and development trend. Future Networks, 2010. ICFN'10. Second International Conference on, 2010, IEEE. p.93-97. References: [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] http://www.ccbc.ir/files_site/files/r_6_13021 7100243.pdf >. Author Guidelines for 8 - krautheim.pdf. 2013. Disponível em: < http://static.usenix.org/event/hotcloud09/tec h/full_papers/krautheim.pdf >. AZHAD, S.; RAO, M. S. Ensuring Data Storage Security in Cloud Computing. BAHETI, A. P.; PATIL, S. V. Cloud Security Based On Oracle Storage Using Transparent Table Encryption Technique. IJCER, v. 2, n. 2, p. 132-136, 2013. ISSN 2278-5795. CHEN, D.; ZHAO, H. Data security and privacy protection issues in cloud computing. Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, 2012, IEEE. p.647-651. CLAYCOMB, W. R.; NICOLL, A. Insider Threats to Cloud Computing: Directions for New Research Challenges. Computer Software and Applications Conference (COMPSAC), 2012 IEEE 36th Annual, 2012, IEEE. p.387-394. KO, S. Y.; JEON, K.; MORALES, R. The hybrex model for confidentiality and privacy in cloud computing. Proceedings of the 2011 conference on Hot topics in Cloud Computing. USENIX Association, Portland, OR, 2011. Proving-Retrievability-and-Possessionwithin-the-Cloud-Storage-Model.pdf. 2013. Disponível em: < http://www.whitworthtech.com/sysadmin/w p-content/uploads/2012/07/ProvingRetrievability-and-Possession-within-theCloud-Storage-Model.pdf >. ROY, I. et al. Airavat: Security and Privacy for MapReduce. NSDI, 2010. p.297-312. SABAHI, F. Cloud computing security threats and responses. Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, 2011, IEEE. p.245-249. Untitled - roy.pdf. 2013. Disponível em: < https://www.usenix.org/legacy/event/nsdi10/ tech/full_papers/roy.pdf >. www.ijera.com 417 | P a g e