A novel cloud storage system with support of sensitive data application

ijmnct

Most users are willing to store their data in the c loud storage system and use many facilities of clou d. But their sensitive data applications faces with potent ial serious security threats. In this paper, securi ty requirements of sensitive data application in the c loud are analyzed and improved structure for the ty pical cloud storage system architecture is proposed. The hardware USB-Key is used in the proposed architectu re for purpose of enhancing security of user identity and interaction security between the users and the cloud storage system. Moreover, drawn from the idea of da ta active protection, a data security container is introduced in the system to enhance the security of the data transmission process; by encapsulating th e encrypted data, increasing appropriate access contr ol and data management functions. The static data blocks are replaced with a dynamic executable data security container. Then, an enhanced security architecture for software of cloud storage terminal is proposed for more adaptation with the user's sp ecific requirements, and its functions and components can be customizable. Moreover, the proposed architectur e have capability of detecting whether the execution environment is according with the pre-defined environment requirements.

International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013

A NOVEL CLOUD STORAGE SYSTEM WITH SUPPORT
OF SENSITIVE DATA APPLICATION
Alireza Souri1, Arash Salehpour2, Saeid Pashazadeh3
1, 2

Department of Computer Engineering, East Azarbaijan Science and Research Branch,
Islamic Azad University, Tabriz, Iran
3
Faculty of Electrical and Computer Engineering, University of Tabriz, Tabriz, Iran

ABSTRACT
Most users are willing to store their data in the cloud storage system and use many facilities of cloud. But
their sensitive data applications faces with potential serious security threats. In this paper, security
requirements of sensitive data application in the cloud are analyzed and improved structure for the typical
cloud storage system architecture is proposed. The hardware USB-Key is used in the proposed architecture
for purpose of enhancing security of user identity and interaction security between the users and the cloud
storage system. Moreover, drawn from the idea of data active protection, a data security container is
introduced in the system to enhance the security of the data transmission process; by encapsulating the
encrypted data, increasing appropriate access control and data management functions. The static data
blocks are replaced with a dynamic executable data security container. Then, an enhanced security
architecture for software of cloud storage terminal is proposed for more adaptation with the user's specific
requirements, and its functions and components can be customizable. Moreover, the proposed architecture
have capability of detecting whether the execution environment is according with the pre-defined
environment requirements.

KEYWORDS
Sensitive data application, Hardware USB-Key; Data security, Active protection; terminal software
customizable.

1. INTRODUCTION
The cloud era is coming with increasing network bandwidth and reliable and flexible network
connections that allow users to access software and data resources that are distributed in the
remote data centers. The Cloud Service Provider (CSP) provides us with an almost unlimited
infrastructures, software services and storage space. As customers, we do not need maintain the
complicated infrastructure and software services, and we just use hardware resources, software
resources and application services. Moreover, we can access and process the shared or exclusive
data resources.
While the users get many benefits from the cloud storage, they are also worried about the security
of their data, especially for security of sensitive data storage and process applications. Although
the cryptographic technologies provides some security for sensitive data storages and process
applications, however, there are still many security threats and challenges in the face of cloud
storage security environment, which is very different with the traditional security environment for
the terminal node data. Specifically, these security challenges [1, 2, 3] mainly, include:

DOI : 10.5121/ijmnct.2013.3503

19
International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013

1.1. Security threats arose from un-trusted cloud storage service provider
Existing cloud storage architecture and security mechanism cannot guarantee that the service
provider cannot access and change user's data illegally.

1.2. Users lose control over data
In the existing cloud storage architecture, once the users outsource their data into the cloud, they
lose control of the data. Consequently, anyone that who can access the data can spread and
modify the data illegally.

1.3. Risk of data interception
Although there are related cryptographic communication mechanisms to guarantee the security of
the data transmission process, while the encrypted data is decrypted for using, the plaintext may
be intercepted by attackers.

1.4. The cloud terminals lack necessary requirements for ensure the data security
during the data processing procedure
Although there are considerable traditional terminal security technologies, however, these
technologies tend to focus on preventing malicious attacks to the entire terminal's system. As a
result, they scarcely consider the security of the data usage process.
Our goal in this paper is to study a case for the cloud storage system that supports the sensitive
data application. Our approaches mainly include ensuring the user identity and behavior is
trustworthy by enhanced trusted mechanism guaranteeing the sensitive data transmission security
by data security container and ensuring the security of data accessing process through security
enhanced cloud storage terminal software.
The key contributions of this paper are:
•

•

•

Improved cloud storage system architecture: compared to the typical cloud storage
systems, the improved structure increases hardware USB-Key to enhance the security of
user identity and interaction between the users and the cloud storage system.
Data security container for Transmission Process: we improve the traditional process
of transmitting the encrypted data by encapsulating the encrypted data, increasing
appropriate access control and data management functions, by this way, we turn the static
data blocks into a dynamic executable data security container.
Security Enhanced Cloud Storage Terminal Software: we distinguish the cloud
storage terminal software into several security levels according to the different security
requirements of users, in other words, the terminal software functions and components
are customizable.

The rest of this paper is organized as follows. Section 2 presents related works. Section 3 presents
system requirements and architectural design. Section 4 presents the key technologies for the
system and finally section 5 presents our conclusion.

20
International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013

2. RELATED WORKS
•

Cloud storage model: wang et al [2] describes typical cloud storage architecture. And in
the architecture, there are mainly three types of cloud storage entities: Users, who store
their data in the cloud and operate the data depending on service provided by the cloud
storage service provider, while the users include businesses, institutions and individuals;
cloud storage service provider (CSP), who is responsible for building the cloud storage
infrastructure, maintaining the running of services and ensuring the availability, integrity
and security of the data stored on its data centers; third-party auditor (TFA), which is an
optional entity, and the TPA can assess security threats of the cloud storage services.
Kamara et al [4] presents a user data storage and sharing model on the public cloud
infrastructure, in the model, the data requester and the data owner communicate with the
token in the cryptographic manner.

•

Cloud storage data integrity: juels et al [5] describes a proof of retrieve ability (POR)
model to ensure the integrity of remote data. This model incorporates spot-checking error
correction codes to ensure the property and recoverability of the files in the service
system.
Shacham et al [6] enhance the POR model, based on the POR model. They construct a
random linear function on account of the homomorphism authentication code to provide
unlimited queries and lower communication overhead. Bowers et al [7] summarizes the
work of Juels and shacham and presents an improved framework for POR protocol,
moreover, Bowers et al also extends the POR model into the distributed systems [8].
These technologies are all needed to be preprocessed before distributed deployment, and
once any changes has been made to the file, the system must broadcast the changes by the
error correction code, which brings significant computation and communication
complexity for the system. Schwarz et al [9] uses erasure-coding and block-level file
integrity detecting methods to ensure the integrity of files across multiple distributed
servers, while this method only consider the integrity of static file.
Lillibridge et al [10] proposes a backup mechanism for the P2P system, and the
mechanism partition the files into several blocks and store them in m+k nodes through
(m+k, m) erasure-coding; meanwhile, each node randomly request data blocks toward its
backup nodes set, the integrity of data block is ensured by the separate keyed
cryptographic hashes attached on the data block, however the mechanism does not
guarantee that none of the data has not been tampered.
Filho et al [11] proposes a data integrity checking method using the RSA hash function
for ens1rtirrg data property in the P2P file-sharing networks, and this method needs doing
exponentiation operation on the entire data file, consequently, it is hard to put the method
into practice when the file is large enough.

•

Data property assurance in cloud storage: Ateniese et al [12] builds a Provable Data
Property model (PDP) to ensure the rights of data owners in incredible environment,
while the model audits the data files by the public-key mechanism based on the
homomorphous tags. In a subsequent study, Ateniese et al [13] improve the PDP model
using the symmetric-key mechanism to reduce computational overhead and support
dynamic operations on data files. In a distributed storage system, Curtmola et al [14]
extends the PDP mechanism for data property with multiple data duplicates, and this
method does not require a separate coding for each copy.
21
International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013

3. REQUIREMENT ANALYSES AND ARCHITECTURE DESIGN
3.1. The Specific Requirements for sensitive Data Applications
There are some specific requirements for the sensitive data applications in the cloud storage
system as follows:
3.1.1. The user identity is not trusted
Although this is common issue in the cloud storage system, however, for sensitive data
applications, it brings even more serious security threat. Therefore, it is necessary to design a
more reliable mechanism to ensure the user identity is credible.
3.1.2. The security of data transmission process
Sensitive data applications require more reliable measures to ensure data transmission security.
3.1.3. The security of data usage process
Most of the traditional methods are mainly used to ensure security while the data is encrypted,
however, once the data is been decrypted and used, it will face even more serious security threat.
Meanwhile, the traditional cloud storage terminal software often lacks consideration on the user's
individual needs and appropriate detecting their execution environment.

3.2. Basic ideas
The main idea of the proposed architecture is:
3.2.1. A trusted hardware module
Such module is introduced to the system; by introducing a hardware trusted. Module, the system
can enhance the interaction security between users and the cloud storage system. The main
functions of trusted hardware module include: enhancing the security of user identity; enhancing
the interaction security between users and the cloud storage system.
3.2.2. A data security container
It is introduced to the system; drawing on the idea of data active protection, we improve the
traditional process of transmitting the encrypted data by encapsulating the encrypted data,
increasing appropriate access control and data management functions by this way, we turn the
static data blocks into a dynamic executable data security container.
3.2.3. Security enhanced cloud storage terminal software
In this paper, we design security enhanced cloud storage terminal software architecture. The
software can be customized according to the user's requirements, and its functions and
components can be changeable. Moreover, the architecture can check the execution environment;
compared to the pre-defined environment requirements, ' it can determine the legitimacy of the
current running environment to meet the specific security requirements for sensitive data
applications.

22
International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013

3.3. Architecture Design
We improve the typical cloud storage architecture [2] to support the sensitive data applications.
The improved cloud storage architecture supporting sensitive data applications is shown in Figure
1.

Figure 1. Improved cloud storage architecture supporting sensitive data application

In this architecture, the user interacts with the cloud storage terminal through security .enhanced
software USB-Key. Furthermore, the hardware USB-Key also enhances the interaction security
between cloud storage terminal and the Cloud Storage Provider.

4. KEY TECHNOLOGIES
4.1. Data Security Container for Transmission process
Through analyzing the data security threats in the sharing and transmission process, we have
found some principles to guarantee the security of data transmission:
•
•

The visitors of the data (data owners, or the users) must be legally authorized;
The communication between the data transmitter and the data receiver is secure.

In this paper, we get some inspiration from the delivery procedure of the postman delivered the
letters, while we design a trusted data transmission process. Firstly, considering a simple scenario
of postman delivers the letters between the post office and the users, the basic process is shown in
Figure 2.

23
International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013

Figure 2. A simple scenario of postman delivers the letters

Drawing an inspiration from this scenario, we analogize the elements of the data transmission
process and the elements of the delivery process as follows:
The data is corresponding to the letters, the post office is corresponding to the data center and the
users are corresponding to the data requesters. Thus, we design a data security container to
guarantee the data security during the data transmission procedure.
The security container is similar to postman. The data security container structure and interfaces
are shown in Figure 3.

Figure 3. Architecture of the security data container

The encrypted data, essential user information and data accessing authorities are encapsulated in
the data security container.
Meanwhile, a security detector is designed to identify the user's identification, access control for
the data and manage the data yet the user information.

4.2. Security Enhanced cloud storage Terminal software
In this paper, we distinguish the cloud storage terminal software into several security levels
according to the different security requirements of users, in other words, the terminal software
functions and components are customizable.
According to the user types and the different execution environment, the cloud storage terminal
software can distinguish that whether the user's identification is legal and whether the execution
environment is accord with the predefined requirements. Specifically, there are two kinds of users
who can use the terminal software:
24
International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013

•
•

Anyone can use this terminal software;
Only specific users or group of users with common features can use the terminal
software.

Similarly, in order to adapt the specific requirements for sensitive data application, it is also need
to distinguish the software execution environment as follows:
•
•

The terminal software can run on any computer terminal;
The terminal software can only run on a specific computer terminal;

The components and cooperating progress between the users and the terminal software are shown
in Figure 4. The user holds his proprietary hardware USB-Key, and only a legitimate user to
holding his legal USB-Key can use the cloud storage terminal software. The communication
process between users and terminal software is shown as follows:
•
•
•
•
•

Identification authentication between users and the terminal software;
Customizing the terminal software depending on the identity of the user and configure the
corresponding components.
The terminal software detects its execution environment to determine whether the current
environment is accord with the Pre-configured requirements;
Security communication between users and the terminal software;
Data requesting and data Processing operations between users and the terminal software.

Figure. 4 The components of cloud Storage Terminal Software

5. CONCLUSIONS
In this paper, improved architecture for the typical cloud storage architecture to support sensitive
data application is proposed. We have argued that multiple security enhanced metrics must be
introduced to the system to accommodate the specific security requirements and user's personal
demands. Therefore, related trust enhancement technologies are designed to meet the system
requirements. Clearly, much work remains to be done to realize the entire system. We believe
that, sensitive data application is important fields in the future cloud storage systems. Meanwhile,
the users are willing to regard their personal privacy information as sensitive data.
25
International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013

REFERENCES
[1] J. Heiser, M. Nicolett, "Assessing the Security Risks of Cloud Computing," Gartner Inc, 2008.
[2] C. Wang, Q. Wang, K. Ren, et al., "Ensuring Data Storage Security in Cloud Computing," Charleston,
SC, United states, 2009.
[3] R. Geambasu S. D. Gribble, H. M. Levy, "Cloud Views: Communal Data Sharing in Public Clouds,"
in HotCloud'09 Workshop on Hot Topics in Cloud Computing, 2009.
[4] S. Kamara, k. Lauter, "Cryptographic Cloud Storage," in Proceedings of Financial Cryptographic:
Workshop on Real-Life Cryptographic Protocols and Standardization 2010, pp. 1-14.
[5] Juels, B. S. Kaliski Jr, "Pors: Proofs of Retrievability for Large Files," Alexandria, VA, United states,
pp. 584-597, 2007.
[6] H. Shacham, B. Waters, "Compact Proofs of Petrievability," in Advances in Cryptology - Asiacrypt
2008. vol. 5350, 2008, pp. 90-107.
[7] K. D. Bowers, A. Juels, A. Oprea, "Proofs of Retrievabilify: Theory and Implementation," 2008.
[8] K. D. Bowers, A. Juels, A. Oprea, "HAIL: A High-Availability and Integrity Layer for Cloud
Storage," Chicago, IL, United states, pp. 187-198, 2009.
[9] S. J. Thomas Schwarz, E.L. Miller, "Store, Forget, and Check: Using Algebraic Signatures to Check
Remotely Administered Storage," Lisboa, Portugal, 2006.
[10] M. Lillibridge, S, Elnikety, A.Birrell, et al., "A Cooperative Internet Backup Scheme," in Usenix
Association Proceedings of the General Track, ed, 2003, PP. 29-41.
[11] D. L. G. Filho, P. S. L. M. Barreto, "Demonstrating Data Possession and Un-Cheatable Data
Transfer," 2006.
[12] G. Ateniese, R. Bums, R. curtmola, et al., "Provable Data Possession at Untrusted Stores," in Ccs'07:
Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 598609.
[13] G. Ateniese, R. D. Pietro, L. V Maacini, et Bl., "Scalable and Efficient Provable Data Possession,"
Istanbul; Turkey, 2008.
[14] R. Curtmola, O. Khan, R. Burns, et al., "MR-PDP: Multiple-Replica Provable Data Possession,"
Beijing, China, pp. 411-420, 2008.

Authors
Alireza Souri received his B.Sc. in Computer Engineering University College of Nabi
Akram, Ira n in 2011. Currently, he is receiving M.Sc. in Software Engineering from East
Azarbaijan Science and Research Branch, Islamic Azad University in Iran. His main interest is
in the formal verification, modeling and analyzing Network systems, Multilayer systems,
Antivirus systems, Grid computing, and Real-time systems. He is member of The Society of
Digital Information and Wireless Communications.
Arash Salehpour, He is M.Sc. (computer engineering -software - He has worked as Progra m
Committees, reviewer at numerous international conferences such as : The International
Conference on Informatics Engineering & Information Science (ICIEIS2011), University
Technology Malaysia, Malaysia, The World Congress on E-Commerce and Business on the
Web (WCEBW2012), United Kingdom and …,The areas of his Research and Interests
include: Examines both automatic systems and collaborative systems as well as computational
models of human software Engineering activities, Presents knowledge representations and artificial
intelligence techniques as well as, he is already acts as member in numerous international organizations
such as: The Society of Digital Information and Wireless Communications (SDIWC).

26
International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013

Saeid Pashazadeh is Assistant Professor of Software Engineering and chair of Info rmation
Technology Department at Faculty of Electrical and Computer Engineering in University of
Tabriz in Iran. He received his B.Sc. in Computer Engineering from Sharif Technical
University of Iran in 1995. He obtained M.Sc. and Ph.D. in Computer Engineering from Iran
University of Science and Technology in 1998 and 2010 respectively. He was Lecturer in
Faculty of Electrical Engineering in Sahand University of Technology in Iran from 1999 until
2004. His main interests are modelling and formal verification of distributed systems, computer security,
and wireless sensor/actor networks. He is member of IEEE and senior member of IACSIT and member of
editorial board of journal of electrical engineering at University of Tabriz in Iran.

27

Recomendados

Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing von
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingSecurely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Securely Data Forwarding and Maintaining Reliability of Data in Cloud ComputingIJERA Editor
359 views7 Folien
Ijarcet vol-2-issue-3-951-956 von
Ijarcet vol-2-issue-3-951-956Ijarcet vol-2-issue-3-951-956
Ijarcet vol-2-issue-3-951-956Editor IJARCET
327 views6 Folien
Iaetsd secured and efficient data scheduling of intermediate data sets von
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd Iaetsd
166 views5 Folien
126689454 jv6 von
126689454 jv6126689454 jv6
126689454 jv6homeworkping8
58 views18 Folien
International Journal of Computational Engineering Research(IJCER) von
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
327 views6 Folien
Efficient technique for privacy preserving publishing of set valued data on c... von
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...ElavarasaN GanesaN
37 views9 Folien

Más contenido relacionado

Was ist angesagt?

Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona... von
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...1crore projects
112 views14 Folien
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke... von
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...IJERA Editor
44 views6 Folien
Paper id 712019116 von
Paper id 712019116Paper id 712019116
Paper id 712019116IJRAT
26 views4 Folien
Ijariie1196 von
Ijariie1196Ijariie1196
Ijariie1196IJARIIE JOURNAL
254 views4 Folien
S.A.kalaiselvan toward secure and dependable storage services von
S.A.kalaiselvan toward secure and dependable storage servicesS.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage serviceskalaiselvanresearch
339 views16 Folien
Accessing secured data in cloud computing environment von
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
348 views10 Folien

Was ist angesagt?(20)

Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona... von 1crore projects
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictiona...
1crore projects112 views
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke... von IJERA Editor
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
IJERA Editor44 views
Paper id 712019116 von IJRAT
Paper id 712019116Paper id 712019116
Paper id 712019116
IJRAT26 views
S.A.kalaiselvan toward secure and dependable storage services von kalaiselvanresearch
S.A.kalaiselvan toward secure and dependable storage servicesS.A.kalaiselvan toward secure and dependable storage services
S.A.kalaiselvan toward secure and dependable storage services
Accessing secured data in cloud computing environment von IJNSA Journal
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
IJNSA Journal348 views
Secure distributed deduplication systems with improved reliability von Pvrtechnologies Nellore
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
International Journal of Computational Engineering Research(IJCER) von ijceronline
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline275 views
Secure sensitive data sharing on a big data platform von redpel dot com
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
redpel dot com1.2K views
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC) von ElavarasaN GanesaN
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud von paperpublications3
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using CloudSecure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
Secure Data Sharing For Dynamic Groups in Multi-Attorney Manner Using Cloud
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr... von IRJET Journal
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET Journal11 views
Secure Distributed Deduplication Systems with Improved Reliability von 1crore projects
Secure Distributed Deduplication Systems with Improved ReliabilitySecure Distributed Deduplication Systems with Improved Reliability
Secure Distributed Deduplication Systems with Improved Reliability
1crore projects84 views
Iaetsd storage privacy protection against data von Iaetsd Iaetsd
Iaetsd storage privacy protection against dataIaetsd storage privacy protection against data
Iaetsd storage privacy protection against data
Iaetsd Iaetsd168 views
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage von IRJET Journal
IRJET-  	  Secure Data Deduplication and Auditing for Cloud Data StorageIRJET-  	  Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET- Secure Data Deduplication and Auditing for Cloud Data Storage
IRJET Journal21 views

Destacado

Comparative study of various voip applications in 802.11 a wireless network s... von
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
306 views11 Folien
Development of a mobile learning application to support e learning and analys... von
Development of a mobile learning application to support e learning and analys...Development of a mobile learning application to support e learning and analys...
Development of a mobile learning application to support e learning and analys...ijmnct
1.1K views11 Folien
Chaotic ANT System Optimization for Path Planning of the Mobile Robots von
Chaotic ANT System Optimization for Path Planning of the Mobile RobotsChaotic ANT System Optimization for Path Planning of the Mobile Robots
Chaotic ANT System Optimization for Path Planning of the Mobile Robotscseij
95 views8 Folien
Performance of spatial multiplexing, von
Performance of spatial multiplexing,Performance of spatial multiplexing,
Performance of spatial multiplexing,ijmnct
344 views8 Folien
Network simulators for next generation networks an overview von
Network simulators for next generation networks an overviewNetwork simulators for next generation networks an overview
Network simulators for next generation networks an overviewijmnct
734 views13 Folien
An alarming signal in mobile telecommunication industry a study in malaysia von
An alarming signal in mobile telecommunication industry a study in malaysiaAn alarming signal in mobile telecommunication industry a study in malaysia
An alarming signal in mobile telecommunication industry a study in malaysiaijmnct
769 views10 Folien

Destacado(20)

Comparative study of various voip applications in 802.11 a wireless network s... von ijmnct
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
ijmnct306 views
Development of a mobile learning application to support e learning and analys... von ijmnct
Development of a mobile learning application to support e learning and analys...Development of a mobile learning application to support e learning and analys...
Development of a mobile learning application to support e learning and analys...
ijmnct1.1K views
Chaotic ANT System Optimization for Path Planning of the Mobile Robots von cseij
Chaotic ANT System Optimization for Path Planning of the Mobile RobotsChaotic ANT System Optimization for Path Planning of the Mobile Robots
Chaotic ANT System Optimization for Path Planning of the Mobile Robots
cseij95 views
Performance of spatial multiplexing, von ijmnct
Performance of spatial multiplexing,Performance of spatial multiplexing,
Performance of spatial multiplexing,
ijmnct344 views
Network simulators for next generation networks an overview von ijmnct
Network simulators for next generation networks an overviewNetwork simulators for next generation networks an overview
Network simulators for next generation networks an overview
ijmnct734 views
An alarming signal in mobile telecommunication industry a study in malaysia von ijmnct
An alarming signal in mobile telecommunication industry a study in malaysiaAn alarming signal in mobile telecommunication industry a study in malaysia
An alarming signal in mobile telecommunication industry a study in malaysia
ijmnct769 views
Comparative evaluation of bit error rate for different ofdm subcarriers in ra... von ijmnct
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
ijmnct405 views
Ergodic capacity analysis for underlay cognitive radio system von ijmnct
Ergodic capacity analysis for underlay cognitive radio systemErgodic capacity analysis for underlay cognitive radio system
Ergodic capacity analysis for underlay cognitive radio system
ijmnct356 views
Effective load balancing method in ad hoc von ijmnct
Effective load balancing method in ad hocEffective load balancing method in ad hoc
Effective load balancing method in ad hoc
ijmnct293 views
Performance comparison of two clipping based filtering methods for papr reduc... von ijmnct
Performance comparison of two clipping based filtering methods for papr reduc...Performance comparison of two clipping based filtering methods for papr reduc...
Performance comparison of two clipping based filtering methods for papr reduc...
ijmnct479 views
Performance analysis on the basis of a comparative study between multipath ra... von ijmnct
Performance analysis on the basis of a comparative study between multipath ra...Performance analysis on the basis of a comparative study between multipath ra...
Performance analysis on the basis of a comparative study between multipath ra...
ijmnct429 views
VEHICLE RECOGNITION USING VIBE AND SVM von cseij
VEHICLE RECOGNITION USING VIBE AND SVM VEHICLE RECOGNITION USING VIBE AND SVM
VEHICLE RECOGNITION USING VIBE AND SVM
cseij50 views
Familia von jhonyatu
FamiliaFamilia
Familia
jhonyatu196 views
Idea de constructivismo.doc - amorales von Javier SaaDapart
  Idea de constructivismo.doc - amorales  Idea de constructivismo.doc - amorales
Idea de constructivismo.doc - amorales
Javier SaaDapart710 views

Similar a A novel cloud storage system with support of sensitive data application

Dynamic Resource Allocation and Data Security for Cloud von
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
272 views5 Folien
Preserving Privacy Policy- Preserving public auditing for data in the cloud von
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
266 views4 Folien
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING von
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
42 views8 Folien
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing von
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
28 views8 Folien
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING von
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
42 views8 Folien
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur... von
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
162 views2 Folien

Similar a A novel cloud storage system with support of sensitive data application(20)

Dynamic Resource Allocation and Data Security for Cloud von AM Publications
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
AM Publications272 views
Preserving Privacy Policy- Preserving public auditing for data in the cloud von inventionjournals
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
inventionjournals266 views
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING von ijcsit
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit42 views
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur... von ijsrd.com
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com162 views
Fragmentation of Data in Large-Scale System For Ideal Performance and Security von Editor IJCATR
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Editor IJCATR257 views
Data Security Model Enhancement in Cloud Environment von ijsrd.com
Data Security Model Enhancement in Cloud EnvironmentData Security Model Enhancement in Cloud Environment
Data Security Model Enhancement in Cloud Environment
ijsrd.com154 views
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT von IJNSA Journal
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
IJNSA Journal3 views
Evaluation Of The Data Security Methods In Cloud Computing Environments von ijfcstjournal
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal3.2K views
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms von IRJET Journal
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal15 views
Paper id 212014106 von IJRAT
Paper id 212014106Paper id 212014106
Paper id 212014106
IJRAT269 views
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag... von IRJET Journal
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal9 views
thilaganga journal 1 von thilaganga
thilaganga journal 1thilaganga journal 1
thilaganga journal 1
thilaganga160 views
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf von HimaBinduKrovvidi
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfSecure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Paper id 27201448 von IJRAT
Paper id 27201448Paper id 27201448
Paper id 27201448
IJRAT251 views
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co... von IRJET Journal
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal28 views
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING von IJNSA Journal
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
IJNSA Journal33 views
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING von IJNSA Journal
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGSECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTING
IJNSA Journal13 views

Último

Future of AR - Facebook Presentation von
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook PresentationRob McCarty
62 views27 Folien
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... von
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...ShapeBlue
85 views10 Folien
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... von
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...ShapeBlue
120 views13 Folien
Business Analyst Series 2023 - Week 4 Session 7 von
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7DianaGray10
126 views31 Folien
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue von
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueShapeBlue
222 views23 Folien
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue von
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueShapeBlue
93 views15 Folien

Último(20)

Future of AR - Facebook Presentation von Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty62 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... von ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue85 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... von ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue120 views
Business Analyst Series 2023 - Week 4 Session 7 von DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10126 views
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue von ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue222 views
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue von ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue93 views
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ von ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue88 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... von Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... von ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue158 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... von James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson156 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates von ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue210 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue von ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue179 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT von ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue166 views
"Surviving highload with Node.js", Andrii Shumada von Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays53 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... von ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue79 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... von TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc160 views
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... von ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue117 views

A novel cloud storage system with support of sensitive data application

  • 1. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013 A NOVEL CLOUD STORAGE SYSTEM WITH SUPPORT OF SENSITIVE DATA APPLICATION Alireza Souri1, Arash Salehpour2, Saeid Pashazadeh3 1, 2 Department of Computer Engineering, East Azarbaijan Science and Research Branch, Islamic Azad University, Tabriz, Iran 3 Faculty of Electrical and Computer Engineering, University of Tabriz, Tabriz, Iran ABSTRACT Most users are willing to store their data in the cloud storage system and use many facilities of cloud. But their sensitive data applications faces with potential serious security threats. In this paper, security requirements of sensitive data application in the cloud are analyzed and improved structure for the typical cloud storage system architecture is proposed. The hardware USB-Key is used in the proposed architecture for purpose of enhancing security of user identity and interaction security between the users and the cloud storage system. Moreover, drawn from the idea of data active protection, a data security container is introduced in the system to enhance the security of the data transmission process; by encapsulating the encrypted data, increasing appropriate access control and data management functions. The static data blocks are replaced with a dynamic executable data security container. Then, an enhanced security architecture for software of cloud storage terminal is proposed for more adaptation with the user's specific requirements, and its functions and components can be customizable. Moreover, the proposed architecture have capability of detecting whether the execution environment is according with the pre-defined environment requirements. KEYWORDS Sensitive data application, Hardware USB-Key; Data security, Active protection; terminal software customizable. 1. INTRODUCTION The cloud era is coming with increasing network bandwidth and reliable and flexible network connections that allow users to access software and data resources that are distributed in the remote data centers. The Cloud Service Provider (CSP) provides us with an almost unlimited infrastructures, software services and storage space. As customers, we do not need maintain the complicated infrastructure and software services, and we just use hardware resources, software resources and application services. Moreover, we can access and process the shared or exclusive data resources. While the users get many benefits from the cloud storage, they are also worried about the security of their data, especially for security of sensitive data storage and process applications. Although the cryptographic technologies provides some security for sensitive data storages and process applications, however, there are still many security threats and challenges in the face of cloud storage security environment, which is very different with the traditional security environment for the terminal node data. Specifically, these security challenges [1, 2, 3] mainly, include: DOI : 10.5121/ijmnct.2013.3503 19
  • 2. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013 1.1. Security threats arose from un-trusted cloud storage service provider Existing cloud storage architecture and security mechanism cannot guarantee that the service provider cannot access and change user's data illegally. 1.2. Users lose control over data In the existing cloud storage architecture, once the users outsource their data into the cloud, they lose control of the data. Consequently, anyone that who can access the data can spread and modify the data illegally. 1.3. Risk of data interception Although there are related cryptographic communication mechanisms to guarantee the security of the data transmission process, while the encrypted data is decrypted for using, the plaintext may be intercepted by attackers. 1.4. The cloud terminals lack necessary requirements for ensure the data security during the data processing procedure Although there are considerable traditional terminal security technologies, however, these technologies tend to focus on preventing malicious attacks to the entire terminal's system. As a result, they scarcely consider the security of the data usage process. Our goal in this paper is to study a case for the cloud storage system that supports the sensitive data application. Our approaches mainly include ensuring the user identity and behavior is trustworthy by enhanced trusted mechanism guaranteeing the sensitive data transmission security by data security container and ensuring the security of data accessing process through security enhanced cloud storage terminal software. The key contributions of this paper are: • • • Improved cloud storage system architecture: compared to the typical cloud storage systems, the improved structure increases hardware USB-Key to enhance the security of user identity and interaction between the users and the cloud storage system. Data security container for Transmission Process: we improve the traditional process of transmitting the encrypted data by encapsulating the encrypted data, increasing appropriate access control and data management functions, by this way, we turn the static data blocks into a dynamic executable data security container. Security Enhanced Cloud Storage Terminal Software: we distinguish the cloud storage terminal software into several security levels according to the different security requirements of users, in other words, the terminal software functions and components are customizable. The rest of this paper is organized as follows. Section 2 presents related works. Section 3 presents system requirements and architectural design. Section 4 presents the key technologies for the system and finally section 5 presents our conclusion. 20
  • 3. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013 2. RELATED WORKS • Cloud storage model: wang et al [2] describes typical cloud storage architecture. And in the architecture, there are mainly three types of cloud storage entities: Users, who store their data in the cloud and operate the data depending on service provided by the cloud storage service provider, while the users include businesses, institutions and individuals; cloud storage service provider (CSP), who is responsible for building the cloud storage infrastructure, maintaining the running of services and ensuring the availability, integrity and security of the data stored on its data centers; third-party auditor (TFA), which is an optional entity, and the TPA can assess security threats of the cloud storage services. Kamara et al [4] presents a user data storage and sharing model on the public cloud infrastructure, in the model, the data requester and the data owner communicate with the token in the cryptographic manner. • Cloud storage data integrity: juels et al [5] describes a proof of retrieve ability (POR) model to ensure the integrity of remote data. This model incorporates spot-checking error correction codes to ensure the property and recoverability of the files in the service system. Shacham et al [6] enhance the POR model, based on the POR model. They construct a random linear function on account of the homomorphism authentication code to provide unlimited queries and lower communication overhead. Bowers et al [7] summarizes the work of Juels and shacham and presents an improved framework for POR protocol, moreover, Bowers et al also extends the POR model into the distributed systems [8]. These technologies are all needed to be preprocessed before distributed deployment, and once any changes has been made to the file, the system must broadcast the changes by the error correction code, which brings significant computation and communication complexity for the system. Schwarz et al [9] uses erasure-coding and block-level file integrity detecting methods to ensure the integrity of files across multiple distributed servers, while this method only consider the integrity of static file. Lillibridge et al [10] proposes a backup mechanism for the P2P system, and the mechanism partition the files into several blocks and store them in m+k nodes through (m+k, m) erasure-coding; meanwhile, each node randomly request data blocks toward its backup nodes set, the integrity of data block is ensured by the separate keyed cryptographic hashes attached on the data block, however the mechanism does not guarantee that none of the data has not been tampered. Filho et al [11] proposes a data integrity checking method using the RSA hash function for ens1rtirrg data property in the P2P file-sharing networks, and this method needs doing exponentiation operation on the entire data file, consequently, it is hard to put the method into practice when the file is large enough. • Data property assurance in cloud storage: Ateniese et al [12] builds a Provable Data Property model (PDP) to ensure the rights of data owners in incredible environment, while the model audits the data files by the public-key mechanism based on the homomorphous tags. In a subsequent study, Ateniese et al [13] improve the PDP model using the symmetric-key mechanism to reduce computational overhead and support dynamic operations on data files. In a distributed storage system, Curtmola et al [14] extends the PDP mechanism for data property with multiple data duplicates, and this method does not require a separate coding for each copy. 21
  • 4. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013 3. REQUIREMENT ANALYSES AND ARCHITECTURE DESIGN 3.1. The Specific Requirements for sensitive Data Applications There are some specific requirements for the sensitive data applications in the cloud storage system as follows: 3.1.1. The user identity is not trusted Although this is common issue in the cloud storage system, however, for sensitive data applications, it brings even more serious security threat. Therefore, it is necessary to design a more reliable mechanism to ensure the user identity is credible. 3.1.2. The security of data transmission process Sensitive data applications require more reliable measures to ensure data transmission security. 3.1.3. The security of data usage process Most of the traditional methods are mainly used to ensure security while the data is encrypted, however, once the data is been decrypted and used, it will face even more serious security threat. Meanwhile, the traditional cloud storage terminal software often lacks consideration on the user's individual needs and appropriate detecting their execution environment. 3.2. Basic ideas The main idea of the proposed architecture is: 3.2.1. A trusted hardware module Such module is introduced to the system; by introducing a hardware trusted. Module, the system can enhance the interaction security between users and the cloud storage system. The main functions of trusted hardware module include: enhancing the security of user identity; enhancing the interaction security between users and the cloud storage system. 3.2.2. A data security container It is introduced to the system; drawing on the idea of data active protection, we improve the traditional process of transmitting the encrypted data by encapsulating the encrypted data, increasing appropriate access control and data management functions by this way, we turn the static data blocks into a dynamic executable data security container. 3.2.3. Security enhanced cloud storage terminal software In this paper, we design security enhanced cloud storage terminal software architecture. The software can be customized according to the user's requirements, and its functions and components can be changeable. Moreover, the architecture can check the execution environment; compared to the pre-defined environment requirements, ' it can determine the legitimacy of the current running environment to meet the specific security requirements for sensitive data applications. 22
  • 5. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013 3.3. Architecture Design We improve the typical cloud storage architecture [2] to support the sensitive data applications. The improved cloud storage architecture supporting sensitive data applications is shown in Figure 1. Figure 1. Improved cloud storage architecture supporting sensitive data application In this architecture, the user interacts with the cloud storage terminal through security .enhanced software USB-Key. Furthermore, the hardware USB-Key also enhances the interaction security between cloud storage terminal and the Cloud Storage Provider. 4. KEY TECHNOLOGIES 4.1. Data Security Container for Transmission process Through analyzing the data security threats in the sharing and transmission process, we have found some principles to guarantee the security of data transmission: • • The visitors of the data (data owners, or the users) must be legally authorized; The communication between the data transmitter and the data receiver is secure. In this paper, we get some inspiration from the delivery procedure of the postman delivered the letters, while we design a trusted data transmission process. Firstly, considering a simple scenario of postman delivers the letters between the post office and the users, the basic process is shown in Figure 2. 23
  • 6. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013 Figure 2. A simple scenario of postman delivers the letters Drawing an inspiration from this scenario, we analogize the elements of the data transmission process and the elements of the delivery process as follows: The data is corresponding to the letters, the post office is corresponding to the data center and the users are corresponding to the data requesters. Thus, we design a data security container to guarantee the data security during the data transmission procedure. The security container is similar to postman. The data security container structure and interfaces are shown in Figure 3. Figure 3. Architecture of the security data container The encrypted data, essential user information and data accessing authorities are encapsulated in the data security container. Meanwhile, a security detector is designed to identify the user's identification, access control for the data and manage the data yet the user information. 4.2. Security Enhanced cloud storage Terminal software In this paper, we distinguish the cloud storage terminal software into several security levels according to the different security requirements of users, in other words, the terminal software functions and components are customizable. According to the user types and the different execution environment, the cloud storage terminal software can distinguish that whether the user's identification is legal and whether the execution environment is accord with the predefined requirements. Specifically, there are two kinds of users who can use the terminal software: 24
  • 7. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013 • • Anyone can use this terminal software; Only specific users or group of users with common features can use the terminal software. Similarly, in order to adapt the specific requirements for sensitive data application, it is also need to distinguish the software execution environment as follows: • • The terminal software can run on any computer terminal; The terminal software can only run on a specific computer terminal; The components and cooperating progress between the users and the terminal software are shown in Figure 4. The user holds his proprietary hardware USB-Key, and only a legitimate user to holding his legal USB-Key can use the cloud storage terminal software. The communication process between users and terminal software is shown as follows: • • • • • Identification authentication between users and the terminal software; Customizing the terminal software depending on the identity of the user and configure the corresponding components. The terminal software detects its execution environment to determine whether the current environment is accord with the Pre-configured requirements; Security communication between users and the terminal software; Data requesting and data Processing operations between users and the terminal software. Figure. 4 The components of cloud Storage Terminal Software 5. CONCLUSIONS In this paper, improved architecture for the typical cloud storage architecture to support sensitive data application is proposed. We have argued that multiple security enhanced metrics must be introduced to the system to accommodate the specific security requirements and user's personal demands. Therefore, related trust enhancement technologies are designed to meet the system requirements. Clearly, much work remains to be done to realize the entire system. We believe that, sensitive data application is important fields in the future cloud storage systems. Meanwhile, the users are willing to regard their personal privacy information as sensitive data. 25
  • 8. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013 REFERENCES [1] J. Heiser, M. Nicolett, "Assessing the Security Risks of Cloud Computing," Gartner Inc, 2008. [2] C. Wang, Q. Wang, K. Ren, et al., "Ensuring Data Storage Security in Cloud Computing," Charleston, SC, United states, 2009. [3] R. Geambasu S. D. Gribble, H. M. Levy, "Cloud Views: Communal Data Sharing in Public Clouds," in HotCloud'09 Workshop on Hot Topics in Cloud Computing, 2009. [4] S. Kamara, k. Lauter, "Cryptographic Cloud Storage," in Proceedings of Financial Cryptographic: Workshop on Real-Life Cryptographic Protocols and Standardization 2010, pp. 1-14. [5] Juels, B. S. Kaliski Jr, "Pors: Proofs of Retrievability for Large Files," Alexandria, VA, United states, pp. 584-597, 2007. [6] H. Shacham, B. Waters, "Compact Proofs of Petrievability," in Advances in Cryptology - Asiacrypt 2008. vol. 5350, 2008, pp. 90-107. [7] K. D. Bowers, A. Juels, A. Oprea, "Proofs of Retrievabilify: Theory and Implementation," 2008. [8] K. D. Bowers, A. Juels, A. Oprea, "HAIL: A High-Availability and Integrity Layer for Cloud Storage," Chicago, IL, United states, pp. 187-198, 2009. [9] S. J. Thomas Schwarz, E.L. Miller, "Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage," Lisboa, Portugal, 2006. [10] M. Lillibridge, S, Elnikety, A.Birrell, et al., "A Cooperative Internet Backup Scheme," in Usenix Association Proceedings of the General Track, ed, 2003, PP. 29-41. [11] D. L. G. Filho, P. S. L. M. Barreto, "Demonstrating Data Possession and Un-Cheatable Data Transfer," 2006. [12] G. Ateniese, R. Bums, R. curtmola, et al., "Provable Data Possession at Untrusted Stores," in Ccs'07: Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 598609. [13] G. Ateniese, R. D. Pietro, L. V Maacini, et Bl., "Scalable and Efficient Provable Data Possession," Istanbul; Turkey, 2008. [14] R. Curtmola, O. Khan, R. Burns, et al., "MR-PDP: Multiple-Replica Provable Data Possession," Beijing, China, pp. 411-420, 2008. Authors Alireza Souri received his B.Sc. in Computer Engineering University College of Nabi Akram, Ira n in 2011. Currently, he is receiving M.Sc. in Software Engineering from East Azarbaijan Science and Research Branch, Islamic Azad University in Iran. His main interest is in the formal verification, modeling and analyzing Network systems, Multilayer systems, Antivirus systems, Grid computing, and Real-time systems. He is member of The Society of Digital Information and Wireless Communications. Arash Salehpour, He is M.Sc. (computer engineering -software - He has worked as Progra m Committees, reviewer at numerous international conferences such as : The International Conference on Informatics Engineering & Information Science (ICIEIS2011), University Technology Malaysia, Malaysia, The World Congress on E-Commerce and Business on the Web (WCEBW2012), United Kingdom and …,The areas of his Research and Interests include: Examines both automatic systems and collaborative systems as well as computational models of human software Engineering activities, Presents knowledge representations and artificial intelligence techniques as well as, he is already acts as member in numerous international organizations such as: The Society of Digital Information and Wireless Communications (SDIWC). 26
  • 9. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.5, October 2013 Saeid Pashazadeh is Assistant Professor of Software Engineering and chair of Info rmation Technology Department at Faculty of Electrical and Computer Engineering in University of Tabriz in Iran. He received his B.Sc. in Computer Engineering from Sharif Technical University of Iran in 1995. He obtained M.Sc. and Ph.D. in Computer Engineering from Iran University of Science and Technology in 1998 and 2010 respectively. He was Lecturer in Faculty of Electrical Engineering in Sahand University of Technology in Iran from 1999 until 2004. His main interests are modelling and formal verification of distributed systems, computer security, and wireless sensor/actor networks. He is member of IEEE and senior member of IACSIT and member of editorial board of journal of electrical engineering at University of Tabriz in Iran. 27