MCDB: Using Multi-clouds to Ensure Security in Cloud Computing (original) (raw)

A new model to ensure security in cloud computing services

Journal of Service Science Research, 2012

In the commercial world, various computing needs are provided as a service. Service providers meet these computing needs in different ways, for example, by maintaining software or purchasing expensive hardware. Security is one of the most critical aspects in a cloud computing environment due to the sensitivity and importance of information stored in the cloud. The risk of malicious insiders in the cloud and the failure of cloud services have received a great deal of attention by companies. This paper focuses on issues related to data security and privacy in cloud computing and proposes a new model, called Multi-Cloud Databases (MCDB). The purpose of the proposed new model is to address security and privacy risks in the cloud computing environment. Three security issues will be examined in our proposed model: data integrity, data intrusion, and service availability. . He has wide range of teaching and research experience including in the area of databases, software engineering, information systems, entrepreneurship, and professional communication.

TMR-MCDB: Enhancing Security in a Multi-cloud Model through Improvement of Service Dependability

In IT enterprises, different computing needs are provided as a service. The service providers take care of the customers" needs by, for example, maintaining software or purchasing expensive hardware. In addition, there are many benefits of using the technology available from cloud service providers, such as access to large-scale, on-demand, flexible computing infrastructures. However, increasing the dependability of cloud computing is important in order for its potential to be realized. Data security is one of the most critical aspects in a cloud computing environment due to the sensitivity and importance of the information stored in the cloud, as is the trustworthiness of the cloud service provider. The risk of malicious insiders in the cloud and the failure of cloud services have received intense attention by cloud users.This paper focuses on issues related to service dependability in order to enhance the data security of multi-cloud computing. Service dependability, which encompasses data output trustworthiness, is one of the important factors in enhancing data security in a multi-cloud computing environment. We apply triple modular redundancy (TMR) techniques with the sequential method into our previously proposed Multi-Cloud Database (MCDB) model to improve the data output trustworthiness of our newly proposed TMR-MCDB model. In addition, the improvement in data trustworthiness enhances data security in our TMR-MCDB model. This paper analyzes the impact of data trustworthiness implementation using the voting technique to evaluate the model performance.

Data security in cloud computing

This article discusses cloud computing data security issues, including tile security of data transmission, storage, security and management of security. Focus on universal data management affect cloud security analysis, and pointed out that a breakthrough in the development of this cloud computing, try to enumerate the corresponding strategies and long-term development direction.

An Overview on Data Security in Cloud Computing

Advances in Intelligent Systems and Computing

Cloud Computing refers to the use of computer resources as a service on-demand via internet. It is mainly based on data and applications outsourcing, traditionally stored on users' computers, to remote servers (datacenters) owned, administered and managed by third parts. This paper is an overview of data security issues in the cloud computing. Its objective is to highlight the principal issues related to data security that raised by cloud environment. To do this, these issues was classified into three categories: 1-data security issues raised by single cloud characteristics compared to traditional infrastructure, 2-data security issues raised by data life cycle in cloud computing (stored, used and transferred data), 3-data security issues associated to data security attributes (confidentiality, integrity and availability). For each category, the common solutions used to secure data in the cloud were emphasized.

Data security model in cloud computing

2020

In the last decade, cloud computing has become an extremely important business assistant that offers significantly lower costs than traditional computer-aided resource provision and greater adaptability to business changes. Thus, it helps them to achieve their business goals. The development of cloud computing poses significant risks, which serve as a partial barrier to their use by the businesses. Security and protection of information are considered to be one of the most critical points in the use of cloud computing. Compared to traditional solutions, cloud computing moves application software and databases to large data centers where information and service management are not always secure and reliable. As a result of this, the community and businesses have many concerns and questions about the security of data and applications in cloud infrastructures. In addition, concerns about data security and applications also arise due to the fact that both user data and applications are m...

Cloud Database Infrastructure: Database System Transference in Cloud Computing Management and Security

Relational database management systems endure the technology of choice for most applications. RDBMS vendors have new tricks up their sleeves to boost implementation. Relational databases have enjoyed a long run as the database backbone across a wide variety of productions, and for good intentions. NoSQL database technologies are challenging the domination of the relational database management systems. There are a number of NoSQL database preferences, all developed to accomplish particular purposes that RDBMSs aren't intended to handle. Many establishments are finding new liberty in having so many choices when it comes to database constructions. However, despite their recent enterprises and competence in managing large data sets, NoSQL databases aren't the right fit for all schemes-and they aren't likely to expel relational software from the top database roost any time soon. Contingent on your business objectives, traditional databases, NoSQL databases or a hybrid of the two may be best to dispense the most assessment. A database is manageable to clients from the cloud and conveyed to users on request via the Internet from a cloud database provider's servers. Cloud databases can use cloud computing to attain optimized scaling, high accessibility, and multi-tenancy and actual resource provision. Databases advocating such applications require ACID (Atomicity, Consistency, Isolation and Durability) exclusive but these databases are hard to organize in the cloud computing system. The persistence of this paper is to review the necessities of the art in the cloud databases and multiple frameworks. It establishes how cloud database usually runs on a cloud-computing proposal, to approach the services specified by cloud computing system.

Review Article Data Security and Privacy in Cloud Computing

Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user's concerns about the cloud technology. Though many techniques on the topics in cloud computing have been investigated in both academics and industries, data security and privacy protection are becoming more important for the future development of cloud computing technology in government, industry, and business. Data security and privacy protection issues are relevant to both hardware and software in the cloud architecture. This study is to review different security techniques and challenges from both software and hardware aspects for protecting data in the cloud and aims at enhancing the data security and privacy protection for the trustworthy cloud environment. In this paper, we make a comparative research analysis of the existing research work regarding the data security and privacy protection techniques used in the cloud computing.

A Research Paper on Data Storage and Security in Cloud Computing

International Journal for Research in Applied Science and Engineering Technology

cloud computing has been envisioned as the next generation architecture of IT enterprise. Cloud computing moves the application software and data bases to the large data centers, where the management of the data and services may not be fully trustworthy. This poses many new security challenges which have not been fully implemented. In this paper, we mainly focus on aspects for providing security for data storage in cloud, also architecture for data storage that are implemented by other service providers vendors in cloud, key points for proving security for data storage.

DATA SECURITY TECHNIQUE IN CLOUD COMPUTING

Cloud computing is the delivery of computing services over the Internet. The platform of cloud computing gives peoples the opportunity of sharing and storing resources and information among the people across the globe. Most of organizations, individual and end users are making use of such online storage services to store their important information for the backup purpose. This new paradigm brings about many new security challenges. At present ensuring security in cloud computing platform has become one of the most significant concerns for the researchers. Many any new frameworks and technologies are used to preserve data that are stored in clouds. In this paper, a new data security scheme is developed for cloud computing platform. This scheme ensures data security in both the ways i.e., data storage security and data retrieval security. For data retrieval security, multi-level authorization technique is applied. Authenticity of user is done in 3 levels which includes registered key, one-time password (OTP) and image-based security mechanism. For data storage security, data partitioning is done along with the application of serialization concept. Both data retrieval security and data storage security provide a strong foundation that not only restricts the unauthorized user to access the data stored in cloud but also ensures the confidentiality and integrity of data. In the recent years, cloud computing has grown from a business concept to one of the fastest emerging sector in It industry to a basic need for people across the world. Cloud computing is everywhere. More and more people are, now days, depending on it. Cloud is the biggest buzz in the world of computers these days. The concept " cloud computing " is one of the most developing and evolving concept in the history of technological advancement. It provides resources, services and utilities to the user and stores their crucial data and information to make their life easier in this busy and hectic world. Due to cloud computing, we can utilize deployable and scalable resources within the confines of Internet. It uses system's hardware and software as computing requirement and provides services through the internet. Despite all these capabilities and potential advantages achieved from cloud computing, many organizations are still reluctant in adopting it due to the security and privacy issues associated with it. These issues hamper the growth of cloud computing. At present scenario, important data and documents are the only thing without which your life comes to a standstill and loosing such important data is no more than a horror experience! So, here the need of security and privacy of user's data rises. In cloud computing environment, all data or files of an individual stored in cloud are open to all. Thus, these data or file becomes more prone to attack. As a result, an intruder can easily access, misuse and destroy the data. The need of security becomes so vulnerable that now people and even though organizations look for security that cloud provider provides before they look for cloud services. There should be a strong security mechanism used by cloud service provider. The security mechanism should be strong enough to handle the basic concept of security i.e., integrity, confidentiality and authenticity. Any security mechanism covers these concept guarantees the security and privacy of user's data. Integrity ensures that the content of the data is not disturbed or changed by any intruder at all and originality of data is confirmed. Confidentiality ensures that the file or data is confidential and cannot be accessed by any unauthorized person. Only the authorized user can access or use it. Authenticity ensures that the person requesting for access is the one whom he claims to be and does not have any false identity. The users with false identity might act as an intruder. In this research paper, new security technique for cloud computing platform is proposed. Here, security is applied on both the sections i.e., while retrieving or accessing data from cloud called as data retrieval security and while storing data in cloud called as data storage security. It makes this security architecture stronger than ever. This proposed technique strictly follows the integrity and confidentiality of stored data as well as authenticity of users accessing cloud. Multi