Data storage security in cloud computing

of 17

Please download to get full document.

View again

All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
PDF
17 pages
0 downs
20 views
Share
Description
1. Sonali Jain 14CSP051 2.  Cloud computing is Internet-based computing, whereby shared resource, software, and information are provided to computers and other devices…
Transcript
  • 1. Sonali Jain 14CSP051
  • 2.  Cloud computing is Internet-based computing, whereby shared resource, software, and information are provided to computers and other devices on demand, like the electricity grid .  Cloud Computing has been envisioned as the next generation architecture of IT Enterprise.
  • 3. ADVANTAGES  Improved performance.  Lower computer costs.  Reduced software costs.  Instant software updates.  Improved document format  compatibility.  Unlimited storage capacity.  Increased data reliability.  Universal document access.  Latest version availability.  Device independence. DISADVANTAGES  Requires a constant Internet connection.  Does not work well with low-speed connections.  Features might be limited.  Can be slow.  Stored data might not be secure.  Stored data can be lost.
  • 4.  Cloud storage is: ◦ Made up of many distributed resources, but still acts as one - often referred to as federated storage clouds ◦ Highly fault tolerant through redundancy and distribution of data ◦ Highly durable through the creation of versioned copies ◦ Eventually consistent with regard to data replicas
  • 5.  A representative network architecture for cloud data storage comprises of three entities, identified as : 1. Users : who have the data to be stored in the cloud and rely on cloud for data computation 2. Cloud Service Provider (CSP) : who has significant resources & expertise in building & managing distributed cloud servers , owns and operates cloud computing system 3. Third Party Auditor (TPA) : who has expertise and capabilities that users may not have
  • 6.  Users store their data in the cloud and no longer possess the data locally, hence the availability and correctness data must be guaranteed.  Cloud computing moves the application software and databases to the large data centers where the data security is not trustworthy.  Data security of such cloud service includes : Secure channels Access controls Encryption  For the security of data , we must consider the Confidentiality , Integrity and Availability of data
  • 7.  Security threats faced by cloud data storage can come from two different sources. 1. CSP can be self-interested, untrusted and possibly malicious. 2. Secondly , there may also exist an economically motivated adversary, who has the capability to compromise a number of cloud data storage servers in different time intervals and subsequently is able to modify or delete users 'data while remaining undetected by CSPs for a certain period.
  • 8.  Weak Adversary: • The adversary is interested in corrupting the user’s data files stored on individual servers. • Once a server is compromised, an adversary can pollute the original data files by modifying or introducing its own fraudulent data to prevent the original data from being retrieved by the user.  Strong Adversary: • This is the worst case scenario, in which we assume that the adversary can compromise all the storage servers so that he can intentionally modify the data files as long as they are internally consistent. • This is equivalent to the case where all servers are colluding together to hide a data loss or corruption incident.
  • 9.  From the perspective of data security Cloud Computing inevitably poses new challenging security threats for number of reasons. o Firstly, traditional cryptographic primitives for the purpose of data security protection can not be directly adopted due to the users’ loss control of data under Cloud Computing. o Secondly, Cloud Computing is not just a third party data warehouse. The data stored in the cloud may be frequently updated by the users, including insertion, deletion, modification, appending, reordering, etc.
  • 10.  To ensure the security and dependability for cloud data storage under the aforementioned adversary model, this paper aim to design efficient mechanisms for dynamic data verification and operation and achieve the following goals: 1. Storage correctness 2. Fast localization 3. Dynamic data support 4. Dependability 5. Light weight
  • 11.  By utilizing distributed verification protocol using Sobol Sequence  By utilizing the Homomorphic token with distributed verification of erasure-coded data, the scheme achieves : ◦ the integration of storage correctness insurance and ; ◦ data error localization, i.e., the identification of misbehaving server.
  • 12.  Cloud computing provides a supercomputing power. i.e. it extends beyond a single company or enterprise.  To ensure the correctness of users’ data in cloud data storage, we proposed an effective and flexible distributed scheme with explicit dynamic data support, including block update, delete, and append.  We believe that data storage security in Cloud Computing, an area full of challenges.
  • 13.  Cong Wang Ian Wang , Wenjing Lou, “Ensuring Data Storage Security in Cloud Computing”  P.Shyam Kumar ,R.Subramaniam ,D.Thamizh Selvam, “Ensuring Data Storage Security in Cloud Computing using Sobol Sequence”.  D.Kanchana , Dr. S.Dhandapani “A novel method for storage security in cloud computing”
  • Related Search
    We Need Your Support
    Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

    Thanks to everyone for your continued support.

    No, Thanks