Cloud Storage and Security Overview (original) (raw)
Related papers
Research on Cloud Data Storage Security
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
Cloud computing is a revolutionary mechanism that changing way to enterprise hardware and software design and procurements. Because of cloud simplicity everyone is moving data and application software to cloud data centers there still exist significant issues that need to be considered before shifting into cloud. Security stands as major obstacle in cloud computing. This paper gives an overview of the security issues on data storage along with its possible solutions many companies are not ready to implement cloud computing technology due to lack of proper security control policy and weakness in protection which lead to many challenge in cloud computing. An independent mechanism is required to make sure that data is correctly hosted in to the cloud storage server. In this paper, we will discuss the different techniques that are used for secure data storage on cloud. This paper also provides a process to avoid Collusion attacks of server modification by unauthorized users.
A Study of Data Storage Security Issues in Cloud Computing
Cloud computing provides on demand services to its clients. Data storage is among one of the primary services provided by cloud computing. Cloud service provider hosts the data of data owner on their server and user can access their data from these servers. As data, owners and servers are different identities, the paradigm of data storage brings up many security challenges. An independent mechanism is required to make sure that data is correctly hosted in to the cloud storage server. In this paper, we will discuss the different techniques that are used for secure data storage on cloud.
Study of Cloud Computing and its Data Storage Security Issues
Cloud computing offers online on demand services to its clients. Data storage is among one of the primary services offered by cloud computing. Cloud service facilitator hosts the data of the client on their server and client can access their data from these servers. As data, owners and servers are different identities, the standard of data storage calls upon many security challenges. In this paper, we will study cloud computing and its storage security issues
Security Based Issues in View of Cloud Based Storage System
Journal 4 Research - J4R Journal, 2017
With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code (MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA, Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored data is investigated, has been given more attention recently.
Survey Paper on Cloud Storagesecurity
International Journal of Innovative Research in Computer and Communication Engineering, 2013
Cloud computing is envisioned as the next-generation technology. It is an Internet based technology where quality services are provided to users including data and software, on remote servers. Advantages of cloud computing includes creating and storing data at remote servers, hence utilizing the client resource to the minimum level. But this advantage implicitly contains drawback of data security and privacy vulnerabilities. There are a number of algorithms and methodologies available for achieving data security in cloud computing. In this paper we look at the current researches related to data security issues like integrity and confidentiality. In particular, we will discuss how to secure client’s data on remote cloud servers.
Security of Cloud Storage System Using Various Cryptographic Techniques
IOSR Journals , 2019
Cloud computing platform is providing opportunity for sharing resources, information's and services among the users of entire world. Existence of huge secret data on the cloud. The security of cloud becomes a biggest concern for researcher's, malicious activities are growing with the growth of user in the cloud. Millions of peoples are using cloud for various purpose, that's why they need more secure and persistent services. In this paper we have purposed new security architecture for cloud computing platform. This ensures more secured communication system and protect your data from attackers. AES based file encryption system and asynchonous key system for exchanging data or information is incorporated into our model. Our proposed structure can be applied with main cloud computing features, e. g, SaaS, IaaS, PaaS. We include OTP (one-time password) system for user authentication ECC (Elliptic curve cryptography) has been proposed in this model for safe communication between client and cloud storage system. Our work primarily deals with the Security system of the whole cloud computing platform.
Design and Implementation of Secure File Storage using Distributed Cloud Mechanism
2019
Cloud computing and the cloud based services like storage and application are the most demanding resources over the internet from few years. With better network or internet connectivity these become very easy tools for remotely managing the information and the files. As the system introduced it comes along with multiple issues and threats also. Even after having better network security mechanism, data protection algorithm, information privacy system service provider can’t ensure full proof solution for information security. Let’s ignore the security about the network transfer and other part; finally file resides at particular storage with company ownership which may be called storage service provider and the company employee with higher authorities having always access to customer’s files. Here the proposed solution deals with the malicious user attack security and prevent file access by utilizing the multiple cloud environment for storing files.
Cloud Computing: Ensuring Data Storage Security in Cloud
International Journal of Engineering Development and Research, 2016
Cloud computing is a rising computing standard in which the computing framework is given as a service over the Internet. The Cloud computing tool gives facility of data storage and access for cloud users, but when outsourcing the data to a third party causes safety issue of cloud data so data are protected by restricting the data. We propose a new decentralized access control scheme for secure data storage in the clouds that supports anonymous authentication where identity of the user is protected from the cloud during authentication. The architecture is decentralized, meaning that there can be several KDCs for key management. Revoked users cannot access data after they have been revoked. The proposed scheme is resilient to replay attacks. In addition to this a new symmetric key cryptographic method called Modern encryption Standard (MES)-II presents method which can be effective to encrypt various types of plain text files and the method is free from standard cryptography attacks n...
Data Security And Its Techniques In Cloud Storage – A Review
2012
The purpose of this review paper is to provide information regarding techniques that could be beneficial for the platform cloud computing by providing security in cloud storage. The main issue of cloud storage is that data must be secured, by using various security tools; also the privacy of the data must be maintained. Various researchers researched in the field of security and privacy for data stored in cloud. By referring various researchers work done in the field of data privacy and security, in this paper we will study, analyse and review techniques for data security in cloud storage.
A Research Paper on Data Storage and Security in Cloud Computing
International Journal for Research in Applied Science and Engineering Technology
cloud computing has been envisioned as the next generation architecture of IT enterprise. Cloud computing moves the application software and data bases to the large data centers, where the management of the data and services may not be fully trustworthy. This poses many new security challenges which have not been fully implemented. In this paper, we mainly focus on aspects for providing security for data storage in cloud, also architecture for data storage that are implemented by other service providers vendors in cloud, key points for proving security for data storage.