scholarly journals Data security and integrity in cloud computing : Threats and Solutions

Author(s):  
Rajesh Keshavrao Sadavarte ◽  
G. D. Kurundkar

Cloud computing changed the world of Internet. With the help of cloud computing user can easily share, store and retrieve their data from anywhere. Cloud computing is scalable, fast, flexible, and cost-effective technology platform for IT enabled services over the internet. Cloud computing provides hardware, software and infrastructural storage to many users at a time Most of the times cloud users don’t know the exact location of their data or the sources of data stored with their data. In spite of various benefits that are provided by the cloud computing services, its users are very much afraid about the security of their data once it is over the cloud under the control of third-party vendors. Therefore, many data security and integrity concerns like access control, searchable encryption techniques, key management, ownership proofs and remote integrity check arise. This paper discusses the security and integrity of data in cloud computing. It is a study of aspects related to data security. The paper will go in to details of few data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats. Going ahead the paper also discuss different techniques used for secured data storage on cloud.

In recent years, with the widespread application of cloud computing, more and more enterprises, institutions, and individuals have started to use cloud services to place their data in the cloud. With the rise of cloud services, the accompanying data security issues have received increasing attention. Because data stores are in the cloud, there are many outstanding security issues. This paper proposes a public cloud data security solution based on a trusted third-party platform. The solution is based on an independent and trusted third-party platform, and has certain advantages in data encryption, key management, data awareness, data sharing, and accident responsibility.


Author(s):  
Sangeet Mishra ◽  
Asis Kumar Tripathy ◽  
Pallavi Joshi

<p>Cloud data security is one of the major and crucial concern in everyday life. Now a days cloud computing is emerging as vast and fastest growing technology depending on the usage. Cloud computing does not allow to keep data at user site and thus a data security is concerned to be a major challenging task regarding data storage. This paper overall describes the monitoring of the cloud data concerning data storage. In this paper we proposed a new methodology that can efficiently managed the security to the data and provide privacy to the consumer using the services of the cloud. Our proposed technique provides data security by using the third party monitoring system which acts as an interface between the cloud consumer and cloud owner. Basically third party monitors the each and every activity of the cloud consumer and based upon his performance he respond to the cloud owner for taking decision. Our proposed concept provides the security from consumer point of view and owner side of view making the flexibility to the cloud infrastructure. Existing work focus mainly on security from owner side of view that not well fitted into the lifecycle of data security.</p>


2020 ◽  
Vol 9 (1) ◽  
pp. 27-39
Author(s):  
Akella Subhadra

Cloud Computing is the important buzzword in the today’s world of computer. Cloud is global platform that allows digital information to be stored and distributed at very less cost and very fast to use. In these days since the data is very big in size many users are interested to store their valuable data in the cloud .The application software and databases in cloud computing are moved to the centralized large data centers, where the management of the data and services may not be fully trustworthy. Cloud Computing is scalable, fast, flexible, and cost-effective technology platform for IT enabled services over the internet. There are various advantages of cloud computing but ultimately cloud service users have to put their data over the cloud i.e., third party servers which are not directly controlled by the data owner Data security has consistently been a major issue in information technology In cloud computing in users perspective mainly in government ,industry and business Data security and ivacy protection issues are relevant to both hardware and software in the cloud architecture. Cloud security is becoming a key differentiator and competitive edge between cloud providers. In spite of various benefits that are provided by the cloud computing services, cloud computing service users are very much afraid about the security of their data .So this paper focuses on various issues regarding cloud computing, data security and how cloud provides data integrity, confidentiality, availability over user’s data? How data stored over cloud storage servers will be protected from attackers? Risk management of data present on the Cloud is another challenge. There is a requirement to identify the risks an organization would be taking while hosting data and services on the Cloud. In this paper, we present those issues that are preventing people from adopting the cloud and to minimize risks of these issues.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


Author(s):  
Georgia Dede ◽  
George Hatzithanasis ◽  
Thomas Kamalakis ◽  
Christos Michalakelis

Cloud computing is a rapidly evolving computational model, which has succeeded in transforming the ICT industry and the economy's production techniques by making corresponding services even more accessible to businesses, offering cost-effective solutions. The cloud broker is a new business model, derived from the necessity of finding the best provider, or the best bundle for the end user. It is a third-party business that assists clients in making the best decision in choosing the most suitable cloud provider and the most effective service bundle for their needs, in terms of performance and price. This chapter analyzes the cloud broker business model and highlights the broker's vital role and the benefits that arise from the use of its services. In that context, it describes cloud brokering and a market analysis, together with the most popular pricing models, together with a comparison among them, concluding with future directions for the expansion of the brokerage model.


Author(s):  
Szilvia Varadi

Cloud Computing is a diverse research area that encompasses many aspects of sharing software and hardware solutions, including computing and storage resources, application runtimes or complex application functionalities. In the supply of any goods and services, the law gives certain rights that protect the consumer and provider, which also applies for Cloud Computing. This new technology also moves functions and responsibilities away from local ownership and management to a third-party provided service, and raises several legal issues, such as data protection, which require this service to comply with necessary regulation. In this chapter the author investigates the revised legislation of the European Union resulting in the General Data Protection Regulation, which will be used to set up the new European Data Protection Framework. The author gathers and summarizes the most relevant changes this regulation brings to the field of Clouds, and draws relations to the previous legislation called the Data Protection Directive currently in force.


2016 ◽  
pp. 2076-2095
Author(s):  
Abhishek Majumder ◽  
Sudipta Roy ◽  
Satarupa Biswas

Cloud is considered as future of Information Technology. User can utilized the cloud on pay-as-you use basis. But many organizations are stringent about the adoption of cloud computing due to their concern regarding the security of the stored data. Therefore, issues related to security of data in the cloud have become very vital. Data security involves encrypting the data and ensuring that suitable policies are imposed for sharing those data. There are several data security issues which need to be addressed. These issues are: data integrity, data intrusion, service availability, confidentiality and non-repudiation. Many schemes have been proposed for ensuring data security in cloud environment. But the existing schemes lag in fulfilling all these data security issues. In this chapter, a new Third Party Auditor based scheme has been proposed for secured storage and retrieval of client's data to and from the cloud service provider. The scheme has been analysed and compared with some of the existing schemes with respect to the security issues. From the analysis and comparison it can be observed that the proposed scheme performs better than the existing schemes.


2014 ◽  
Vol 701-702 ◽  
pp. 1106-1111 ◽  
Author(s):  
Xin Zheng Zhang ◽  
Ya Juan Zhang

As information and processes are migrating to the cloud, Cloud Computing is drastically changing IT professionals’ working environment. Cloud Computing solves many problems of conventional computing. However, the new technology has also created new challenges such as data security, data ownership and trans-code data storage. We discussed about Cloud computing security issues, mechanism, challenges that Cloud service providers and consumers face during Cloud engineering. Based on concerning of security issues and challenges, we proposed several encryption algorithms to make cloud data secure and invulnerable. We made comparisons among DES, AES, RSA and ECC algorithms to find combinatorial optimization solutions, which fit Cloud environment well for making cloud data secure and not to be hacked by attackers.


Sign in / Sign up

Export Citation Format

Share Document