A Research Paper on Data Storage and Security in Cloud Computing (original) (raw)

Research on Cloud Data Storage Security

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022

Cloud computing is a revolutionary mechanism that changing way to enterprise hardware and software design and procurements. Because of cloud simplicity everyone is moving data and application software to cloud data centers there still exist significant issues that need to be considered before shifting into cloud. Security stands as major obstacle in cloud computing. This paper gives an overview of the security issues on data storage along with its possible solutions many companies are not ready to implement cloud computing technology due to lack of proper security control policy and weakness in protection which lead to many challenge in cloud computing. An independent mechanism is required to make sure that data is correctly hosted in to the cloud storage server. In this paper, we will discuss the different techniques that are used for secure data storage on cloud. This paper also provides a process to avoid Collusion attacks of server modification by unauthorized users.

Study of Cloud Computing and its Data Storage Security Issues

Cloud computing offers online on demand services to its clients. Data storage is among one of the primary services offered by cloud computing. Cloud service facilitator hosts the data of the client on their server and client can access their data from these servers. As data, owners and servers are different identities, the standard of data storage calls upon many security challenges. In this paper, we will study cloud computing and its storage security issues

Security of Data Storage in Cloud Computing

International Journal of Computer Applications, 2015

With the advent of Information Technology in day-today activities, the need for online services such as storage space, software, platforms etc. is increasing rapidly. This lead to the rise of a new concept, the Cloud Computing. The Internet users rely heavily on the Cloud Computing for various computing resources. The main motive of the Cloud Providers is to provide these services in a virtualized manner. One of the main concern of cloud computing is the security of the Cloud Storage. When it comes to security of the data stored in the Cloud Storage, it is entirely in the hands of the Cloud Providers. The Cloud Providers assures the consumer of the Cloud that the data stored on their servers is safe. The consumer plays no role in securing the data. The various cloud providers claim that they provide highly secure cloud storage. But there have been attacks on hot-shot cloud providing companies such as Google, Salesforce.com and Dropbox[1]. Many cloud providers employee third party companies which has led to consumer losing their trust with these companies. Thus, the encryption techniques and the various security measures employed by the cloud providers should be equally strong. The privacy and security of cloud computing depend primarily on whether the provider has implement adequate and robust security controls as desired by the customer or not. In this paper we analyze the different security issues related to the cloud and different cryptographic algorithms to secure the cloud.

A Study of Data Storage Security Issues in Cloud Computing

Cloud computing provides on demand services to its clients. Data storage is among one of the primary services provided by cloud computing. Cloud service provider hosts the data of data owner on their server and user can access their data from these servers. As data, owners and servers are different identities, the paradigm of data storage brings up many security challenges. An independent mechanism is required to make sure that data is correctly hosted in to the cloud storage server. In this paper, we will discuss the different techniques that are used for secure data storage on cloud.

Storage Data Security of Data in Cloud Computing

Cloud Computing refers to the many different types of services and applications being delivered in the internet cloud, and the fact that, in many cases, the devices used to access these services and applications do not require any special applications. Cloud Computing has been moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This brings the problem of ensuring the integrity of data storage in Cloud. Cloud computing share distributed resources via network in the open environment thus it makes security problem. we consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of the client through the auditing of whether his data stored in the cloud are indeed intact, which can be important in achieving economies of scale for Cloud Computing. The support for data dynamics via the most general forms of data operation, such as block modification, insertion, and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public auditability or dynamic data operations, this paper achieves both. We first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for the seamless integration of these two salient features in our protocol design. In particular, to achieve efficient data dynamics, we improve the existing proof of storage models by manipulating the classic Merkle Hash Tree construction for block tag authentication.

Data Security for Cloud computing Storage System

Cloud computing is a forthcoming revolution in information technology industry because of its performance, accessibility, low cost and many other luxuries. It provides storage for data and faster computing to customers over the internet. That is why companies are reluctant to deploy their business in the cloud even cloud computing offers a wide range of luxuries. Security of data in the cloud is one of the major issues which acts as an obstacle in the implementation of cloud computing. Considering to the high storage capacity and also qualified personnel it becomes difficult pertaining the management of such huge amount of data. Some of the facilities like Storage-as-a-Service offered by cloud service providers help organizations to outsource their data to get saved on Remote servers. Thus, such services like Storage as a service helps in reducing the cost of maintenance and also helps to reduce the SaaS burden of large local data storage at the organization's perspective. A sto...

Strong and Secure Mechanism for Data Storage in Cloud Environment

World Academy of Research in Science and Engineering, 2019

This present research paper proposes the security is frequently referred to as a standout among the most unlimited issues in the cloud processing as distributed computing gives a helpful and huge measure of capacity information at extremely low and effective expense so searching for a legitimate wellbeing measures is basic. It is contended that the Cloud is proposed to deal with a lot of information, along these lines aggressors can be search for taking out the information as it includes different data's being put away. A many customers are surfing cloud for diverse purposes hence they need profoundly protected & persevering administrations. The developing of cloud is growing day by day which utilizes the additional level of protection and validation. We propose a basic information assurance model where information is encoded utilizing MD5 with RSA and Authenticated by Diffie-Hellman calculation prior to it is propelled in the cloud, therefore guaranteeing data privacy and security.

Cloud Computing: Ensuring Data Storage Security in Cloud

International Journal of Engineering Development and Research, 2016

Cloud computing is a rising computing standard in which the computing framework is given as a service over the Internet. The Cloud computing tool gives facility of data storage and access for cloud users, but when outsourcing the data to a third party causes safety issue of cloud data so data are protected by restricting the data. We propose a new decentralized access control scheme for secure data storage in the clouds that supports anonymous authentication where identity of the user is protected from the cloud during authentication. The architecture is decentralized, meaning that there can be several KDCs for key management. Revoked users cannot access data after they have been revoked. The proposed scheme is resilient to replay attacks. In addition to this a new symmetric key cryptographic method called Modern encryption Standard (MES)-II presents method which can be effective to encrypt various types of plain text files and the method is free from standard cryptography attacks n...

Cloud Computing: Data Storage Security Analysis and its Challenges

International Journal of Computer Applications, 2013

Cloud computing is emerging as a new technology in the field of computing which effects many aspects of computing. The users are enabled to move their data and application software to the network and access the services on-demand. Moving data outside the organizational boundaries and access them through internet makes complete loss of control from the owner's side. The data over the cloud servers is easily accessed by both the computing providers and law enforcement agencies easier in comparison to data stored on your local disk. Cloud brings many different security issues and among them data security acts as one of the major challenge in cloud computing. Data security becomes an important issue for securing outsourced data and to maintain a level of trust among data owners. In this paper we will analyze the security requirements and the various approaches for data security. We also highlight the new emerging research challenges in data security and privacy.

A Review Paper on "Data security issues in cloud computing"

Cloud computing offers a prominent provider for facts garage called cloud storage. The go with the flow and garage of facts on the cloud environment in simple textual content format can be main protection threat. So, it is the duty of cloud provider vendors to make certain private and protection of facts on storage in addition to network level. The following three parameters confidentiality, integrity and availability determine whether protection and private of statistics saved on cloud environment is maintained or not. The proposed work is to outline cloud structure with configured samba storage and cryptographic encryption techniques. The cloud architecture deployed with samba storage makes use of operating gadget feature specifying permission values for 3 attributes (User/Owner, Group and Global) and maps it to cryptographic utility which plays cryptographic operations. Cryptography software supports symmetric and uneven encryption algorithm to encrypt/decrypt data for uploading/downloading within cloud storage. A username and password based totally authentication mechanism for users and virtual signature scheme for information authenticity are defined inside cloud architecture.