Secure Data Storage In Cloud Computing

Download Full Text
Author(s):
B. Shwetha Bindu, B. Yadaiah
Published Date:
September 29, 2011
Issue:
Volume 1, Issue 1
Page(s):
63 - 73
DOI:
10.7815/ijorcs.11.2011.006
Views:
5182
Downloads:
1358

Keywords:
cloud computing, enterprise, servers, antagonist model, storage
Citation:
B. Shwetha Bindu, B. Yadaiah, "Secure Data Storage In Cloud Computing". International Journal of Research in Computer Science, 1 (1): pp. 63-73, September 2011. doi:10.7815/ijorcs.11.2011.006 Other Formats

Abstract

Cloud computing has gained a lot of hype in the current world of I.T. Cloud computing is said to be the next big thing in the computer world after the internet. Cloud computing is the use of the Internet for the tasks performed on the computer and it is visualized as the next- generation architecture of IT Enterprise. The ‘Cloud’ represents the internet. Cloud computing is related to several technologies and the convergence of various technologies has emerged to be called cloud computing. In comparison to conventional ways Cloud Computing moves application software and databases to the large data centers, where the data and services will not be fully trustworthy. In this article, I focus on secure data storage in cloud; it is an important aspect of Quality of Service. To ensure the correctness of users’ data in the cloud, I propose an effectual and adaptable scheme with salient qualities. This scheme achieves the data storage correctness, allow the authenticated user to access the data and data error localization, i.e., the identification of misbehaving servers.

  1. Robert Gellman and World Privacy Forum , “Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing”, February 23, 2009.
  2. Amazon.com, “Amazon Web Services (AWS),” Online at http://aws. amazon.com, Version 2010-01.
  3. Weiss, Aaron. Computing in the clouds. netWorker 11, 4 (Dec. 2007), .
  4. Eric A. Marks, Bob Lozano “Executive’s Guide to Cloud computing”, John Wiley & Sons, Inc.
  5. Theart of Service, “A Complete Guide to Cloud Computing”, http://theartofservice.com.
  6. Tim Mather, Subra Kumaraswamy, and Shahed Latif, “Cloud Security and Privacy”, Published by O’Reilly Media, Inc.,- 2009
  7. Brian J.S. Chee and Curtis Franklin, Jr., “Cloud Computing, Technologies and Strategies of the Ubiquitous Data Center”, CRC Press 2010 by Taylor and Francis Group, LLC.
  8. N.Gohring, “Amazon’s S3 down for several hours,” Online at http://www.pcworld.com/businesscenter/article/142549/amazons s3 down for several hours.html, 2008.
  9. Juels and J. Burton S. Kaliski, “PORs: Proofs of Retrievability for Large Files,” Proc. of CCS ’07, 2007.
  10. G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” Proc. of SecureComm ’2008.
  11. John W. Rittinghouse, James F. Ransome, ” Cloud Computing Implementation, Management, and Security”, CRC Press 2010 by Taylor and Francis Group, LLC.
  12. Journal of Theoretical and Applied Information Technology, “CLOUD COMPUTING”, www.jatit.org, 2005 – 2009.
  13. Hand, Eric. “Head in the Clouds.”Nature. 25;(2007 Oct).
  14. “Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing”, Prepared by Robert Gellman for the World Privacy Forum February 23, 2009.
  15. “Advancing cloud computing: What to do now?, Priorities for Industry and Governments”, World Economic Forum in partnership with Accenture – 2011.
  16. Security of Cloud Computing Providers Study Sponsored by CA Technologies Independently conducted by Ponemon Institute LLC Publication Date: April 2011
  17. National Institute of Standards and Technology, “The NIST Definition of Cloud Computing,” document posted October 2009, http://csrc.nist.gov/groups/SNS/cloud-computing/.
  18. James Walden, Northern Kentucky University, The OWASP Foundation, http://www.owasp.org, “Cloud Computing Security”, February 22nd, 2011.
  19. Cloud Security Alliance(CSA), “Top Threats to Cloud Computing V1.0”, March 2010, http://www.cloudsecurityalliance.org/topthreats.

  • Singh, Sukhpal, and Inderveer Chana. "Cloud based development issues: a methodical analysis." International Journal of Cloud Computing and Services Science (IJ-CLOSER) 2.1 (2012): 73-84.
  • Kapadia, Jahnvi S. "Survey on various techniques for data storage security in cloud computing." Int. J. Sci. Eng. Res 4.5 (2013): 842-848.
  • Titare, Ruchira H., and Pravin Kulurkar, "REMOTE DATA BACK-UP AND PRIVACY PRESERVING DATA DISTRIBUTION IN THE CLOUD", INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY.
  • Hashemi, Sajjad. "DATA STORAGESECURITY CHALLENGESIN CLOUD COMPUTING."
  • Banirostam, Hamid, Alireza Hedayati, and Ahmad Khadem Zadeh. "USING VIRTUALIZATION TECHNIQUE TO INCREASE SECURITY AND REDUCE ENERGY CONSUMPTION IN CLOUD COMPUTING." International Journal of Research in Computer Science 4.2 (2014): 25.
  • Mehta, Anmol, et al. "MINING AND SECURING THE CORPORATE DATA IN THE CLOUD."
  • Duan, Qi, et al. "Private and Anonymous Data Storage and Distribution in Cloud." Services Computing (SCC), 2013 IEEE International Conference on. IEEE, 2013.
  • Upadhyay, Akansha, and Manu Shrivastava. "Data Storage Security In Cloud Computing."