A New Secure Model for Data Protection over Cloud Computing (original) (raw)
Related papers
Data Security Model for Cloud Computing
From the perspective of data security, which has always been an important aspect of quality of service, cloud computing focuses a new challenging security threats. Therefore, a data security model must solve the most challenges of cloud computing security. The proposed data security model provides a single default gateway as a platform. It used to secure sensitive user data across multiple public and private cloud applications, including Salesforce, Chatter, Gmail, and Amazon Web Services, without influencing functionality or performance. Default gateway platform encrypts sensitive data automatically in a real time before sending to the cloud storage without breaking cloud application. It did not effect on user functionality and visibility. If an unauthorized person gets data from cloud storage, he only sees encrypted data. If authorized person accesses successfully in his cloud, the data is decrypted in real time for your use. The default gateway platform must contain strong and fast encryption algorithm, file integrity, malware detection, firewall, tokenization and more. This paper interested about authentication, stronger and faster encryption algorithm, and file integrity.
Data security model in cloud computing
2020
In the last decade, cloud computing has become an extremely important business assistant that offers significantly lower costs than traditional computer-aided resource provision and greater adaptability to business changes. Thus, it helps them to achieve their business goals. The development of cloud computing poses significant risks, which serve as a partial barrier to their use by the businesses. Security and protection of information are considered to be one of the most critical points in the use of cloud computing. Compared to traditional solutions, cloud computing moves application software and databases to large data centers where information and service management are not always secure and reliable. As a result of this, the community and businesses have many concerns and questions about the security of data and applications in cloud infrastructures. In addition, concerns about data security and applications also arise due to the fact that both user data and applications are m...
Cloud Computing: Ensuring Data Storage Security in Cloud
International Journal of Engineering Development and Research, 2016
Cloud computing is a rising computing standard in which the computing framework is given as a service over the Internet. The Cloud computing tool gives facility of data storage and access for cloud users, but when outsourcing the data to a third party causes safety issue of cloud data so data are protected by restricting the data. We propose a new decentralized access control scheme for secure data storage in the clouds that supports anonymous authentication where identity of the user is protected from the cloud during authentication. The architecture is decentralized, meaning that there can be several KDCs for key management. Revoked users cannot access data after they have been revoked. The proposed scheme is resilient to replay attacks. In addition to this a new symmetric key cryptographic method called Modern encryption Standard (MES)-II presents method which can be effective to encrypt various types of plain text files and the method is free from standard cryptography attacks n...
DATA SECURITY TECHNIQUE IN CLOUD COMPUTING
Cloud computing is the delivery of computing services over the Internet. The platform of cloud computing gives peoples the opportunity of sharing and storing resources and information among the people across the globe. Most of organizations, individual and end users are making use of such online storage services to store their important information for the backup purpose. This new paradigm brings about many new security challenges. At present ensuring security in cloud computing platform has become one of the most significant concerns for the researchers. Many any new frameworks and technologies are used to preserve data that are stored in clouds. In this paper, a new data security scheme is developed for cloud computing platform. This scheme ensures data security in both the ways i.e., data storage security and data retrieval security. For data retrieval security, multi-level authorization technique is applied. Authenticity of user is done in 3 levels which includes registered key, one-time password (OTP) and image-based security mechanism. For data storage security, data partitioning is done along with the application of serialization concept. Both data retrieval security and data storage security provide a strong foundation that not only restricts the unauthorized user to access the data stored in cloud but also ensures the confidentiality and integrity of data. In the recent years, cloud computing has grown from a business concept to one of the fastest emerging sector in It industry to a basic need for people across the world. Cloud computing is everywhere. More and more people are, now days, depending on it. Cloud is the biggest buzz in the world of computers these days. The concept " cloud computing " is one of the most developing and evolving concept in the history of technological advancement. It provides resources, services and utilities to the user and stores their crucial data and information to make their life easier in this busy and hectic world. Due to cloud computing, we can utilize deployable and scalable resources within the confines of Internet. It uses system's hardware and software as computing requirement and provides services through the internet. Despite all these capabilities and potential advantages achieved from cloud computing, many organizations are still reluctant in adopting it due to the security and privacy issues associated with it. These issues hamper the growth of cloud computing. At present scenario, important data and documents are the only thing without which your life comes to a standstill and loosing such important data is no more than a horror experience! So, here the need of security and privacy of user's data rises. In cloud computing environment, all data or files of an individual stored in cloud are open to all. Thus, these data or file becomes more prone to attack. As a result, an intruder can easily access, misuse and destroy the data. The need of security becomes so vulnerable that now people and even though organizations look for security that cloud provider provides before they look for cloud services. There should be a strong security mechanism used by cloud service provider. The security mechanism should be strong enough to handle the basic concept of security i.e., integrity, confidentiality and authenticity. Any security mechanism covers these concept guarantees the security and privacy of user's data. Integrity ensures that the content of the data is not disturbed or changed by any intruder at all and originality of data is confirmed. Confidentiality ensures that the file or data is confidential and cannot be accessed by any unauthorized person. Only the authorized user can access or use it. Authenticity ensures that the person requesting for access is the one whom he claims to be and does not have any false identity. The users with false identity might act as an intruder. In this research paper, new security technique for cloud computing platform is proposed. Here, security is applied on both the sections i.e., while retrieving or accessing data from cloud called as data retrieval security and while storing data in cloud called as data storage security. It makes this security architecture stronger than ever. This proposed technique strictly follows the integrity and confidentiality of stored data as well as authenticity of users accessing cloud. Multi
Securing Shared Data in Cloud Computing by using Cryptographic Schemes
International Journal of Computer Applications, 2016
Sharing data using cloud computing can be a good solution to profit from reduced costs, scalability, flexibility and more advantages that user can get from the cloud infrastructure. But when the object shared consists of sensitive or personnel data, the security concerns increase. Problems related to the lack of data confidentiality and integrity represent the number one problem encountered in cloud infrastructure and that restrains users and a number of organizations to benefit from the cloud"s services. In this paper we discuss the requirements needed to secure data in cloud environment and we propose a new approach to enhance the security of the data shared in cloud storage. Our method is based on cryptographic models. It is confidential, flexible and it reduces time of computation by adopting simple and efficient key management process and encryption schemes.
A Novel Data Security Model for Cloud Computing
International Journal of Engineering and Technology, 2012
Since the mid 1990's, the computational systems have changed from centralized to distributed model. Emergence of virtualization changes the system architecture to virtual centralization. On the other hand, in centralized computing, there is full control on data and processes where in virtual centralization the clients don't know where the data is stored and where the processes are running.
A Research Paper on Data Storage and Security in Cloud Computing
International Journal for Research in Applied Science and Engineering Technology
cloud computing has been envisioned as the next generation architecture of IT enterprise. Cloud computing moves the application software and data bases to the large data centers, where the management of the data and services may not be fully trustworthy. This poses many new security challenges which have not been fully implemented. In this paper, we mainly focus on aspects for providing security for data storage in cloud, also architecture for data storage that are implemented by other service providers vendors in cloud, key points for proving security for data storage.
Cloud Computing: Secure and Scalable Data Access Security Models
Cloud computing has built up itself as a standout amongst the most famous advancements accessible presently. It has increased much veneration, yet with fast usage of cloud computing, the security factor has come to forefront. Organizations are pushing toward cloud computing for getting advantage of its cost lessening and versatility highlights. However cloud computing has potential risks and vulnerabilities. One of real obstacle in moving to cloud computing is its security and protection concerns. As in cloud computing environment data is out of client ownership this prompts extraordinary danger of information trustworthiness, information secrecy and information weakness and so on. Various security models have been produced to adapt to these security dangers. Our study aims at the various security models that were produced for securing information. The different well known security models of distributed computing like "The Cloud Multiple Tenancy Model of NIST", "The Cloud Risk Accumulation Model of CSA", "Jerico Forum's Cloud Cube Model" and "Multi-Clouds Database Model" have been reviewed in this paper.
Strong and Secure Mechanism for Data Storage in Cloud Environment
World Academy of Research in Science and Engineering, 2019
This present research paper proposes the security is frequently referred to as a standout among the most unlimited issues in the cloud processing as distributed computing gives a helpful and huge measure of capacity information at extremely low and effective expense so searching for a legitimate wellbeing measures is basic. It is contended that the Cloud is proposed to deal with a lot of information, along these lines aggressors can be search for taking out the information as it includes different data's being put away. A many customers are surfing cloud for diverse purposes hence they need profoundly protected & persevering administrations. The developing of cloud is growing day by day which utilizes the additional level of protection and validation. We propose a basic information assurance model where information is encoded utilizing MD5 with RSA and Authenticated by Diffie-Hellman calculation prior to it is propelled in the cloud, therefore guaranteeing data privacy and security.