The document proposes a solution to data availability and error correction in cloud computing using a RAID 51 architecture. RAID 51 combines RAID 1 and RAID 5 architectures. RAID 1 creates a mirror copy of data across disks for high availability. RAID 5 uses block-level striping with parity data distributed across disks for error correction. The proposed RAID 51 model uses a RAID 5 configuration under each RAID 1 mirror, allowing the system to sustain failure of disks in either RAID 5 array as well as one additional disk, avoiding data loss. This provides both data availability through mirroring and error correction capabilities.
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
Cloud computing is a heavily evolving topic in information technology (IT). Rather than creating, deploying and managing a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. Due to this large scale, in case an attack over the network of cloud, it’s a great challenge to investigate to cloud. There is a very low research done to develop the theory and practice of cloud forensic. The investigator has huge challenge of getting the IP address of the culprit as there is dynamic IP in cloud computing. Also one among many problems is that the customer is only concerned of security and threat of unknown. The cloud service provider never lets customer see what is behind "virtual curtain" which leads customer more doubting for the security and threat issue. In cloud forensics, the lack of physical access leads to big challenge for investigator. In this paper we are presenting few common challenges which arise in cloud forensic and proposed solution to it. We will also discuss the in brief about cloud computing and cloud forensic.
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
Cloud Storage is a branch of Cloud Computing, which plays an important role in IT world. Cloud providers are providing a huge volume of storage space as per the user needs. Due to wide usage of this, it also increases data security issues and threats. Hence efforts are being made to encrypt the data stored in the cloud. In this paper, we are going to look at different encryption and auditing techniques that are used to avoid data breaching in cloud storage. Nikhil Sreenivasan ""Data Storage Issues in Cloud Computing"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30194.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30194/data-storage-issues-in-cloud-computing/nikhil-sreenivasan
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Unit 3 -Data storage and cloud computingMonishaNehkal
Data storage
Cloud storage
Cloud storage from LANs to WANs
Cloud computing services
Cloud computing at work
File system
Data management
Management services
Nowadays,Data is rising over internet in terabytes and Exabyte. So,there is a need of storing these data which has been fulfilled by cloud computing. Though the s ervice of cloud appear to be efficient and cost eff ective. Yet there are some challenges which are faced in cloud computing such as Data security and Authentication. In cloud Storage the data of Owner is stored in cloud where the cloud servers are remotely located the owner of the data does not have any direct control over the data. If the data over cloud is modified by the cloud,Third Party Auditor (TPA) or any other person there is no preci sion such that the owner of the data gets the infor mation about the modification of the data. TPA is a Third Party Auditor who has Experience in checking the integrity of data. TPA v erifies the files stored over the cloud if they are modified or not. Our scheme provides the solution to this probl em such that if there is any modification in the da ta the owner will get information about the change in the data. Our scheme only provides the information about the change in data it does not keep data intact or secure from mo dification over cloud.
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
Cloud computing is a heavily evolving topic in information technology (IT). Rather than creating, deploying and managing a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. Due to this large scale, in case an attack over the network of cloud, it’s a great challenge to investigate to cloud. There is a very low research done to develop the theory and practice of cloud forensic. The investigator has huge challenge of getting the IP address of the culprit as there is dynamic IP in cloud computing. Also one among many problems is that the customer is only concerned of security and threat of unknown. The cloud service provider never lets customer see what is behind "virtual curtain" which leads customer more doubting for the security and threat issue. In cloud forensics, the lack of physical access leads to big challenge for investigator. In this paper we are presenting few common challenges which arise in cloud forensic and proposed solution to it. We will also discuss the in brief about cloud computing and cloud forensic.
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
Cloud Storage is a branch of Cloud Computing, which plays an important role in IT world. Cloud providers are providing a huge volume of storage space as per the user needs. Due to wide usage of this, it also increases data security issues and threats. Hence efforts are being made to encrypt the data stored in the cloud. In this paper, we are going to look at different encryption and auditing techniques that are used to avoid data breaching in cloud storage. Nikhil Sreenivasan ""Data Storage Issues in Cloud Computing"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30194.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30194/data-storage-issues-in-cloud-computing/nikhil-sreenivasan
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Unit 3 -Data storage and cloud computingMonishaNehkal
Data storage
Cloud storage
Cloud storage from LANs to WANs
Cloud computing services
Cloud computing at work
File system
Data management
Management services
Nowadays,Data is rising over internet in terabytes and Exabyte. So,there is a need of storing these data which has been fulfilled by cloud computing. Though the s ervice of cloud appear to be efficient and cost eff ective. Yet there are some challenges which are faced in cloud computing such as Data security and Authentication. In cloud Storage the data of Owner is stored in cloud where the cloud servers are remotely located the owner of the data does not have any direct control over the data. If the data over cloud is modified by the cloud,Third Party Auditor (TPA) or any other person there is no preci sion such that the owner of the data gets the infor mation about the modification of the data. TPA is a Third Party Auditor who has Experience in checking the integrity of data. TPA v erifies the files stored over the cloud if they are modified or not. Our scheme provides the solution to this probl em such that if there is any modification in the da ta the owner will get information about the change in the data. Our scheme only provides the information about the change in data it does not keep data intact or secure from mo dification over cloud.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
Cloud computing is a model for enabling for on demand network access to shared
configurable computing resources (e.g. networks, servers, storage, applications, and services).It is
based on virtualization and distributed computing technologies. Cloud Data storage systems enable
user to store data efficiently on server without any trouble of data resources. User can easily store
and retrieve their data remotely. The two biggest concerns about cloud data storage are reliability and
security. Clients aren’t like to entrust their data to another third party or companies without a
guarantee that they will be able to access therein formations whenever they want. In the existing
system, the data are stored in the cloud using dynamic data operation with computation which makes
the user need to make a copy for further updating and verification of the data loss. Different
distributed storing auditing techniques are used for overcoming the problem of data loss. Recent
work of this paper has show that data partitioning technique used for data storage by providing
Digital signature to every partitioning data and user .this technique allow user to upload or retrieve
the data with matching the digital signatures provided to them. This method ensures high cloud
storage integrity, enhanced error localization and easy identification of misbehaving server and
unauthorized access to the cloud server. Hence this work aims to store the data securely in reduced
space with less time and computational cost.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
ABSTRACT : Currently, cloud-based application is so very famous, but preserving the confidentiality of the user’s data is a huge task to accomplish. Keeping this need in mind, here a solution is proposed which will preserve the data confidentiality & integrity in cloud environment. For providing data confidentiality we will use AES algorithms, by virtue of which the secret data will be converted to cipher text and it becomes very difficult for the user to get the meaningful plain text. Here the basic emphasis is also on the data integrity so that the user’s data can’t be duplicated or copied.Keywords:Data Confidentiality, Data Integrity, AES algorithm
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security .Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is no exception. According to studies one of the major challenges of this technology is the security and safety required for providing services and build trust in consumers to transfer their data into the cloud. In this paper we attempt to review and highlight security challenges, particularly the security of data storage in a cloud environment. Also, provides some offers to enhance the security of data storage in the cloud
computing systems that by using these opinions can be overcome somewhat on the problems.
A time efficient approach for detecting errors in big sensor data on cloudNexgen Technology
TO GET THIS PROJECT COMPLETE SOURCE CODE PLEASE CALL BEOLOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM ,EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
A Model for Reducing Security Risks due to Human Error - iSafe 2010, DubaiAnup Narayanan
This talk provides a model for reducing security risks due to poor information security awareness and poor attitude. Based on my methodology HIMIS (Human Impact Management for Information Security). To know more about HIMIS, visit http://www.isqworld.com/himis
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
Cloud computing is a model for enabling for on demand network access to shared
configurable computing resources (e.g. networks, servers, storage, applications, and services).It is
based on virtualization and distributed computing technologies. Cloud Data storage systems enable
user to store data efficiently on server without any trouble of data resources. User can easily store
and retrieve their data remotely. The two biggest concerns about cloud data storage are reliability and
security. Clients aren’t like to entrust their data to another third party or companies without a
guarantee that they will be able to access therein formations whenever they want. In the existing
system, the data are stored in the cloud using dynamic data operation with computation which makes
the user need to make a copy for further updating and verification of the data loss. Different
distributed storing auditing techniques are used for overcoming the problem of data loss. Recent
work of this paper has show that data partitioning technique used for data storage by providing
Digital signature to every partitioning data and user .this technique allow user to upload or retrieve
the data with matching the digital signatures provided to them. This method ensures high cloud
storage integrity, enhanced error localization and easy identification of misbehaving server and
unauthorized access to the cloud server. Hence this work aims to store the data securely in reduced
space with less time and computational cost.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
ABSTRACT : Currently, cloud-based application is so very famous, but preserving the confidentiality of the user’s data is a huge task to accomplish. Keeping this need in mind, here a solution is proposed which will preserve the data confidentiality & integrity in cloud environment. For providing data confidentiality we will use AES algorithms, by virtue of which the secret data will be converted to cipher text and it becomes very difficult for the user to get the meaningful plain text. Here the basic emphasis is also on the data integrity so that the user’s data can’t be duplicated or copied.Keywords:Data Confidentiality, Data Integrity, AES algorithm
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security .Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is no exception. According to studies one of the major challenges of this technology is the security and safety required for providing services and build trust in consumers to transfer their data into the cloud. In this paper we attempt to review and highlight security challenges, particularly the security of data storage in a cloud environment. Also, provides some offers to enhance the security of data storage in the cloud
computing systems that by using these opinions can be overcome somewhat on the problems.
A time efficient approach for detecting errors in big sensor data on cloudNexgen Technology
TO GET THIS PROJECT COMPLETE SOURCE CODE PLEASE CALL BEOLOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM ,EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
A Model for Reducing Security Risks due to Human Error - iSafe 2010, DubaiAnup Narayanan
This talk provides a model for reducing security risks due to poor information security awareness and poor attitude. Based on my methodology HIMIS (Human Impact Management for Information Security). To know more about HIMIS, visit http://www.isqworld.com/himis
Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...BayCHI
The human eye, with the assistance of an eye tracking apparatus, may serve as an input controller to a computer system. Much like point-select operations with a mouse, the eye can "look-select", and thereby activate items such as buttons, icons, links, or text. Evaluating the eye working in concert with an eye tracking system requires a methodology that uniquely addresses the characteristics of both the eye and the eye tracking apparatus. Among the interactions considered are eye typing and mouse emulation. Eye typing involves using the eye to interact with an on-screen keyboard to generate text messages. Mouse emulation involves using the eye for conventional point-select operations in a graphical user interface. In this case, the methodologies for evaluating pointing devices (e.g., Fitts' law and ISO 9241-9) are applicable but must be tailored to the unique characteristics of the eye, such as saccadic movement. This presentation surveys and reviews these and other issues in evaluating eye-tracking systems for computer input.
Scott MacKenzie is associate professor of Computer Science and Engineering at York University, Toronto, Canada. His research is in human-computer interaction with an emphasis on human performance measurement and modeling, experimental methods and evaluation, interaction devices and techniques, alphanumeric entry, language modeling, and mobile computing. He has more than 100 peer-reviewed publications in the field of Human-Computer Interaction, including more than 30 from the ACM's annual SIGCHI conference. He has given numerous invited talks over the past 20 years.
Human Error & Risk Factor Affecting Reliability & SafetyDushyant Kalchuri
Many system reliability predictive methods are based solely on equipment failures, neglecting the human component of man–machine systems (MMS). These methods do not consider the identification of the root causes of human errors.
Accelerating technological development leads to an increased importance of safety aspects for organizations as well as for their environment. Therefore, especially in the case of high hazard organizations an expanded view of safety – system safety including human factors is needed. These organizations need appropriate structures as well as rules for the treatment of safety relevant actions or tasks. The system safety approach is reflected in the recent developmental stage in safety research, which started with a focus on technology and its extension to human errors, socio-technical systems and recently to the inter-organizational perspective. Accident causation theories as well as approaches to organizational learning are the theoretical background. Nevertheless, the majority of measurements (methods) and interventions remain in the former stages, i.e. technical or human error orientation. This problem will be discussed by the means of examples. The contribution will end with an outlook to possible future ways of integrating the new developments in safety research.
How can we prevent accidents caused by human error? This presentation deals with typical examples of severe accidents related to human errors, and shows methods to prevent them.
This presentation gives a detailed overview about Cloud Computing, its features and challenges faced by it in the market. It gives an insight into cloud security and privacy issues and its measures.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Now, recession-hit companies are increasingly realizing that simply by tapping into the cloud they can gain fast access to best-of-breed business applications or drastically boost their infrastructure resources, all at negligible cost. But as more and more information on individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. This paper discusses security issues, requirements and challenges that cloud service providers (CSP) face during cloud engineering. Recommended security standards and management models to address these are suggested for technical and business community.
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less
secure because data remain under a single data mart. This can lead to data loss due to different causes like
hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud
provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and
outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious
employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat
concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on
biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption,
replication and storage of data
https://jst.org.in/index.html
Our Journals has a act as vehicles for the dissemination of knowledge, making research findings accessible to a wide audience. This accessibility is vital for the progress of education, as it allows students, educators, and professionals to stay informed about the latest developments in their respective fields.
Security of Data in Cloud Environment Using DPaaSIJMER
The rapid development of cloud computing is giving way to more cloud services, due to
which security of services of cloud especially data confidentiality protection, becomes more critical.
Cloud computing is an emerging computing style which provides dynamic services, scalable and payper-use.
Although cloud computing provides numerous advantages, a key challenge is how to ensure
and build confidence that the cloud can handle user data securely. This paper highlights some major
security issues that exist in current cloud computing environments. The status of the development of
cloud computing security, the data privacy analysis, security audit, information check and another
challenges that the cloud computing security faces have been explored. The recent researches on data
protection regarding security and privacy issues in cloud computing have partially addressed some
issues. The best option is to build data-protection solutions at the platform layer. The growing appeal
of data protection as a service is that it enables to access just the resources you need at minimal
upfront expense while providing the benefits of enterprise-class data protection capabilities. The
paper proposes a solution to make existing developed applications for simple cloud Systems
compatible with DPaaS. The various security challenges have been highlighted and the various
necessary metrics required for designing DPaaS have been investigated.
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
Abstract Data security and Access control is a challenging research work in Cloud Computing. Cloud service users upload there private and confidential data over the cloud. As the data is transferred among the server and client, the data is to be protected from unauthorized entries into the server, by authenticating the user’s and provide high secure priority to the data. So the Experts always recommend using different passwords for different logins. Any normal person cannot possibly follow that advice and memorize all their usernames and passwords. That is where password managers come in. The purpose of this paper is to secure data from unauthorized person using Security blanket algorithm.
Similar to A proposed Solution: Data Availability and Error Correction in Cloud Computing (20)
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
A proposed Solution: Data Availability and Error Correction in Cloud Computing
1. Anil Gupta, Parag Pande, Aaftab Qureshi & Vaibhav Sharma
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (4) : 2011 405
A proposed Solution: Data Availability and Error Correction in Cloud
Computing
Anil Gupta anil_sg@yahoo.com
Maharaja Ranjit Singh College,
Hemkunt Campus, Khandwa Road,
Indore-452001, MP, India
Parag Pande parag.pande@yahoo.com
Shri Satya Sai Institiute of Science and Technology,
Sehore M.P, India
Aaftab Qureshi aaftab_toc@yahoo.com
Shri Satya Sai Institiute of Science and Technology,
Sehore, M.P, India
Vaibhav Sharma vaibhav.sharma_09@yahoo.com
Maharaja Ranjit Singh College,
Hemkunt Campus, Khandwa Road,
Indore-452001, MP, India
Abstract
Cloud Computing is the hottest technology in the market these days, used to make storage of huge
amounts of data and information easier for organizations. Maintaining servers to store all the information
is quite expensive for individual and organizations. Cloud computing allows to store and maintain data on
remote servers that are managed by Cloud Service Providers (CSP) like Yahoo and Google. This data
can then be accessed through out the globe. But as more and more information of individuals and
companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it
is. In this paper we discussed security issues and requirements in the Cloud and possible solutions of
some the problems. We develop an architecture model for cloud computing to solve the data availability
and error correction problem.
Keywords: Cloud Computing, Security Issues, Cloud Security, Cloud Architecture.
1. INTRODUCTION
One of the identifying characters of cloud computing is that computing is delivered via the Internet as
services. Computing and IT resources are encapsulated as services, hiding all the details of
implementation, deployment, maintenance and administration [1]. Computing will be shifted from on-
premise systems to remote systems and users are connected to their data via the Internet. Individual
organizations will lose their control of their data to some extent, as the data is stored over the Internet and
is likely leased from cloud operators. With cloud computing, deployment of IT systems and data storage is
changed from on-premises user-owned IT infrastructures to off-premises third-party IT infrastructures.
Having the whole IT systems and data on infrastructures with limited controls creates an obstacle for
migrating traditional IT systems and data into clouds, as users have the following security concerns:
Limited control over the data may incur security issues.
As the data is on the single cloud, data availability becomes a great challenge.
Having the whole IT system and data on a single cloud may give the cloud operator excessive power for
controlling and modifying users’ data.
2. Anil Gupta, Parag Pande, Aaftab Qureshi & Vaibhav Sharma
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (4) : 2011 406
In this paper we try to specify security issues and requirements in the Cloud and possible solutions of some the
problems. We develop an architecture model for cloud computing to solve the data availability and error
correction problem.
Our paper is organized is as follows: Section 2 identifies the security issues and requirement that users
must be aware when adopting cloud computing. Section 3 surveys the related work. Section 4 summaries
the RAID models to address the security concerns. Section 5 explains our proposed architecture for cloud
computing with features provided by the models. Section 6 concludes the paper.
2. SECURITY ISSUES AND REQUIREMENT
Security concerns [2,3] have been raised due to the new computing model introduced by cloud
computing, which is characterized by off-premises computing, lost control of IT infrastructure, service-
oriented computing, and virtualization, and so on. Security concerns from users can be briefly
summarized as follows:
• System failure and Data availability: When keeping data at remote systems owned by others,
data owners may suffer from system failures of the service provider,
Requirement: If the Cloud goes out of operation, data will become unavailable as the data
depends on a single service provider.
• Data error: Client data should be error free on the cloud. As the data is stored on the cloud
whereas the client is at other side. If the correct storage strategy is not used data might not be
stored correctly on the storage server of the Cloud.
Requirement: Very essential requirement for the client on the cloud.
• Data Migratibility: Users that adopt cloud computing may subject to the risk that their data
cannot be migrated to other clouds.
Requirement: Without the capability of migrating data to other clouds, users may be forced to
stay with a cloud if they have considerable dependence on the data.
• Data confidentiality and integrity: Data generated by cloud computing services are kept in the
clouds. Keeping data in the clouds means users may lose control of their data and rely on cloud
operators to enforce access control [25, 19].
Requirement: They may not be able to prevent unauthorized disclosure or malicious modification
of their data.
• Long-term viability: Ideally, cloud computing provider will never go broke or get acquired and swallowed
up by a larger company. But you must be sure your data will remain available even after such an event.
Requirement: How you would get your data back and if it would be in a format that you could import into a
replacement application in such an event.
• Data location: When you use the cloud, you probably won't know exactly where your data is
hosted. In fact, you might not even know what country it will be stored in.
Requirement: Ask providers if they will commit to storing and processing data in specific
jurisdictions, and whether they will make a contractual commitment to obey local privacy
requirements on behalf of their customers.
• Data segregation: Make sure that encryption is available at all stages, and that these encryption
schemes were designed and tested by experienced professionals.
Requirement: For data security and privacy.
• Data Recovery: Even if you don't know where your data is, a cloud provider should tell you what
will happen to your data and service in case of a disaster. Any offering that does not replicate the
data and application infrastructure across multiple sites is vulnerable to a total failure.
Requirement: otherwise clients will losses their all data. Provider has "the ability to do a
complete restoration, and how long it will take."
3. Anil Gupta, Parag Pande, Aaftab Qureshi & Vaibhav Sharma
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (4) : 2011 407
• Data security: Security will need to move to the data level so that enterprises can be sure their
data is protected wherever it goes. For example, with data-level security, the enterprise can
specify that this data is not allowed to go outside of the European Union. It can also force
encryption of certain types of data, and permit only specified users to access the data. It can
provide compliance with the Payment Card Industry Data Security Standard (PCI DSS).
Requirement: For data security and privacy.
• Data privacy: The data privacy is also one of the key concerns for Cloud computing. A privacy
steering committee should also be created to help make decisions related to data privacy.
Requirement: This will ensure that your organization is prepared to meet the data privacy
demands of its customers and regulators.
These concerns have been identified in several earlier works [12, 19]. Armbrust et al. [19] considered
these concerns as the top most obstacles to growth of cloud computing.
3. RELATED WORK
Extensive research efforts have been put into cloud computing and its related technologies, resulting in
several well acknowledged cloud computing theories and technologies, including MapReduce [4] and its
implementation Apache Hadoop [5], Microsoft Dryad [6], Condor DAGman [7], Eucalyptus [26], Nimbus
[8], Reservoir [27], and CARMEN [9].
Various security related issues and concerns in cloud computing have been identified and are studied,
including data privacy [10, 11, 12], data protection [13], access control [14, 15, 12], availability [16],
authentication [17], scalability [18].
Armbrust et al. [19] identified ten obstacles to growth of cloud computing. The top three obstacles are
actually very close to the concerns identified in Section 2.
Research in security patterns has established a structural way and a proven practice for secure system
designs and implementations. They provide guidelines as well as knowledge that are proven and
standardized [20, 21, 22, 23].
Domain security is a method developed by Qinetiq to develop architectural models for applications based
on security requirements [24]. The architectures generated by the Domain Security method focus on the
software engineering aspect of systems to implement, instead of security protocols, cryptographic
operations and so on.
4. RAID MODELS
RAID 1: RAID 1 creates an exact copy (or mirror) of a set of data on two or more disks. As shown in
figure 1. This is useful when performance read or data availability (reliability) is more important than data
storage capacity. Such an array can only be as big as the smallest member disk. A classic RAID 1
mirrored pair contains two disks, which increases availability (reliability) over a single disk. Since each
member contains a complete copy of the data, and can be addressed independently, ordinary wear-and-
tear reliability is raised by the power of the number of self-contained copies.
4. Anil Gupta, Parag Pande, Aaftab Qureshi & Vaibhav Sharma
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (4) : 2011 408
FIGURE 1: RAID 1 Model
RAID 5: RAID 5 uses block-level striping with parity data distributed across all member disks. As shown
in figure 2. RAID 5 has achieved popularity because of its low cost of redundancy. This can be seen by
comparing the number of drives needed to achieve a given capacity. For an array of n drives, with Smin
being the size of the smallest disk in the array, In RAID 5 storage capacity is .
FIGURE 2: RAID 5 Model
Parity Calculation
A concurrent series of blocks (one on each of the disks in an array) is collectively called a stripe. If
another block or some portion of that block is written on that same stripe, the parity block or some portion
of that block is recalculated and rewritten. For any write operation it requires:
• Read the old data block
• Read the old parity block
• Compare the old data block with the write request. For each bit that has flipped (changed from 0 to 1, or
from 1 to 0) in the data block, flip the corresponding bit in the parity block
• Write the new data block
• Write the new parity block
The disk used for the parity block is staggered from one stripe to the next; hence the term distributed
parity blocks. RAID 5 write operations are expensive in terms of disk operations and traffic between the
disks and the controller.
The parity blocks are not read on data reads, since this would add unnecessary overhead and would
diminish performance. The parity blocks are read, however, when a read of blocks in the stripe fails due
5. Anil Gupta, Parag Pande, Aaftab Qureshi & Vaibhav Sharma
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (4) : 2011 409
to failure of any one of the disks, and the parity block in the stripe are used to reconstruct the errant
sector. The CRC error is thus hidden from the main computer. Likewise, should a disk fail in the array, the
parity blocks from the surviving disks are combined mathematically with the data blocks from the surviving
disks to reconstruct the data from the failed drive on-the-fly.
This is sometimes called Interim Data Recovery Mode. The computer knows only that a disk drive has
failed, so that the operating system can notify the administrator that a drive needs replacement;
applications running on the computer are unaware of the failure. Reading and writing to the drive array
continues seamlessly, though with some performance degradation.
5. PROPOSED MODEL
We are proposing a model for cloud, based on RAID architecture. In our proposed model we are using
RAID 1 and RAID 5 level.This configuration can sustain the failure of all disks in either of the arrays, plus
up to one additional disk from the other array before suffering data loss, i.e., by using this architecture at
the data storage servers in the Cloud, we can handle the problem of Fault tolerance, data availability and
Data recovery.
We combine both RAID 1 and RAID 5 for our proposed architecture. These combine architecture known
as RAID 51 architecture. A RAID 1 creates an exact copy (or mirror) of a set of data on two or more
disks. This is useful for data availability (reliability). A RAID 5 uses block level striping with parity data
distributed across all member disks. This is very important for data correction.
RAID 51: RAID 51 architecture is an array that consists of two RAID 5's that are mirrors of each other. In
this configuration reads and writes are balanced across both RAID 5s. In this architecture, there are two
set of RAID 5 model that are mirror of each other. As well as they don’t have any idea that their mirror
image is also exist. Mirroring provides guarantee of data availability and since they are not aware about
the mirroring, if any one try to change the data can easily be traceable. Similarly, the RAID 1 has no idea
that its underlying disks are RAID 5's. As we are using RAID 5 under the RAID 1 architecture, we get the
data correction facility also. Because A RAID 5 uses block level striping with parity data distributed across
all member disks. As shown in figure 3.
FIGURE 3: RAID 5+1 Model
Though RAID solves our problems but it suffer from poor performance when faced many write operations
which are smaller than the capacity of a single stripe. This is because parity must be updated on each
write, requiring read-modify-write sequences for both the data block and the parity block.
6. Anil Gupta, Parag Pande, Aaftab Qureshi & Vaibhav Sharma
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (4) : 2011 410
We can use RAID 6 in place of RAID 5 also. It extends RAID 5 by adding an additional parity block; thus it
uses block-level striping with two parity blocks distributed across all member disks. RAID 6 does not have
a performance penalty for read operations, but it does have a performance penalty on write operations
because of the overhead associated with parity calculations. Performance varies greatly depending on
how RAID 6 is implemented in the storage architecture.
Parity Calculation
Two different syndromes need to be computed in order to allow the loss of any two drives. One of them, P
can be the simple XOR of the data across the stripes, as with RAID 5. A second, independent syndrome
is more complicated and requires the assistance of field theory.
To deal with this, the Galois field GF (m) is introduced with m = 2k, where
for a suitable irreducible polynomial p(x) of degree k. A chunk of data can
be written as dk − 1dk − 2...d0 in base 2 where each di is either 0 or 1. This is chosen to correspond with
the element dk − 1xk − 1 + dk − 2xk − 2 + ... + d1x + d0 in the Galois field. Let
correspond to the stripes of data across hard drives encoded as field
elements in this manner (in practice they would probably be broken into byte-sized chunks). If g is some
generator of the field and denotes addition in the field while concatenation denotes multiplication, then
and may be computed as follows (n denotes the number of data disks):
where is a bitwise XOR operator and gi is the action of a linear feedback shift register on a chunk of
data. Thus, in the above formula, the calculation of P is just the XOR of each stripe. This is because
addition in any characteristic two finite fields reduces to the XOR operation. The computation of Q is the
XOR of a shifted version of each stripe.
Mathematically, the generator is an element of the field such that gi is different for each nonnegative i
satisfying i < n.
If one data drive is lost, the data can be recomputed from P just like with RAID 5. If two data drives are
lost or the drive containing P is lost the data can be recovered from P and Q using a more complex
process. Working out the details is not hard with field theory. Suppose that Di and Dj are the lost values
with . Using the other values of D, constants A and B may be found so that and
. Multiplying both sides of the latter equation by gn − i and adding to the former
equation yields and thus a solution for Dj which may be used to
compute Di.
The computation of Q is CPU intensive compared to the simplicity of P. Thus, a RAID 6 implemented in
software will have a more significant effect on system performance.
7. Anil Gupta, Parag Pande, Aaftab Qureshi & Vaibhav Sharma
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (4) : 2011 411
6. CONCLUSION
Cloud Computing is the cost, time and performance effective. Some basic Security issues are the key concern in the
Cloud Computing use and in the implementation for the Client as well as for Vendors.
Security concern of the Cloud infrastructure relies on trusted computing and cryptography. Organizational
data must be protected in a manner consistent with policies. No standard contract exists that the cover
the security related issues. Having a list of common outsourcing provisions, such as privacy and security
standards, regulatory and compliance issues, service level requirements and penalties, change
management processes, continuity of service provisions, and termination rights, provides a useful starting
point. The migration to a cloud computing environment is in many ways an exercise in risk management.
A RAID 1 model can be an effective protection against physical disk failure; it does not provide protection
against data corruption due to viruses, accidental file changes or deletions, or any other data-specific
changes. By design, any such changes will be instantly mirrored to every drive in the array segment. A
virus, for example, that damages data on one drive in a RAID 1 array will damage the same data on all
other drives in the array at the same time. For this reason system using RAID 1 to protect against
physical drive failure should also have a traditional data backup process in place to allow data restoration
to previous points in time. It would seem self-evident that any system critical enough to require disk
redundancy also needs the protection of reliable data backups.
The risks must be carefully balanced against the available safeguards and expected benefits, with the
understanding that accountability for security concern remains with the organization. Too many controls
can be inefficient and ineffective, if the benefits outweigh the costs and associated risks. An appropriate
balance between the strength of controls and the relative risk associated with particular programs and
operations must be ensured.
7. REFERENCES
[1] Anil Gupta, Aaftab Qureshi, Parag Pande,”Cloud Computing Characteristics and Service Models:
our own interpretation”.
[2] Kresimir Popovic, et al., “Cloud “Computing issues and challanges” MIPRO 2010 May 24-28 Opatija,
Croatia, pp 344-349.
[3] Gansen Zhao, et al., “Deployment Models: Towards Eliminating Security Concerns from Cloud
Computing” IEEE 2010, pp 189-195.
[4] J. Dean and S. Ghemawat. “Mapreduce: simplified data processing on large clusters”. Commun.
ACM, 51(1):107–113, 2008.
[5] Apache Hadoop, 2009. http://hadoop.apache.org/.
[6] M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly.“Dryad: distributed data-parallel programs from
sequential building blocks”. In EuroSys ’07: Proceedings of the 2nd ACM SIGOPS/EuroSys
European Conference on Computer Systems 2007, pages 59–72, New York, NY, USA, 2007. ACM.
[7] Condor DAGman, 2009. http://www.cs.wisc.edu/condor/dagman/. [18] D. Nurmi, R. Wolski, C.
Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov. “The eucalyptus open-source
cloud-computing system”. In Proceedings of Cloud Computing and Its Applications, October 2008.
[8] Nimbus. “Introduction to nimbus”, 2009. http://workspace.globus.org/clouds/nimbus.html. [3] S.
Beco, A. Maraschini, and F. Pacini. “Cloud computing and RESERVOIR project”. NUOVO
CIMENTO DELLA SOCIETA ITALIANA DI FISICA C-COLLOQUIA ON PHYSICS, 32(2), Mar-Apr
2009.
[9] CARMEN, 2009. http://www.carmen.org.uk/.
8. Anil Gupta, Parag Pande, Aaftab Qureshi & Vaibhav Sharma
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (4) : 2011 412
[10] Å. A. Nyre and M. G. Jaatun. “Privacy in a semantic cloud: What’s trust got to do with it?”. In The
First International Conference on Cloud Computing, pages 107–118, 2009.
[11] S. Pearson, Y. Shen, and M. Mowbray. “A privacy manager for cloud computing”. In The First
international Conference on Cloud Computing, pages 90–106, 2009.
[12] L. Kaufman. “Data security in the world of cloud computing”. IEEE SECURITY & PRIVACY, 7(4),
July- August 2009.
[13] S. Creese, P. Hopkins, S. Pearson, and Y. Shen. “Data protection-aware design for cloud services”.
In The First International Conference on Cloud Computing, pages 119–130, 2009.
[14] L. Hu, S. Ying, X. Jia, and K. Zhao. “Towards an approach of semantic access control for cloud
computing”. In The First International Conference on Cloud Computing, pages 145–156, 2009.
[15] D. Chen, X. Huang, and X. Ren. “Access control of cloud service based on ucon”. In The First
International Conference on Cloud Computing, pages 559–564, 2009.
[16] T. Uemura, T. Dohi, and N. Kaio. “Availability analysis of a scalable intrusion tolerant architecture
with two detection modes”. In The First International Conference on Cloud Computing, pages 178–
189, 2009.
[17] L. Yan, C. Rong, and G. Zhao. “Strengthen cloud computing security with federal identity
management using hierarchical identity-based cryptography”. In The First International Conference
on Cloud Computing, pages 167–177, 2009.
[18] G. Zhao, J. Liu, Y. Tang, W. Sun, F. Zhang, X. ping Ye, and N. Tang. “Cloud computing: A statistics
aspect of users”. In The First International Conference on Cloud Computing, pages 347–358.
Springer, 2009.
[19] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A.
Rabkin, I. Stoica, and M. Zaharia. “Above the clouds: A Berkeley view of cloud computing”.
Technical Report UCB/EECS- 2009-28, EECS Department, University of California, Berkeley, Feb
2009.
[20] M. Schumacher, E. Fernandez, D. Hybertson, and F. Buschmann. SECURITY PATTERNS:
INTEGRATING SECURITY AND SYSTEMS ENGINEERING. John Wiley & Sons, 2005.
[21] T. Heyman, K. Yskout, R. Scandariato, and W. Joosen. “An analysis of the security patterns
andscape”. In SESS ’07: Proceedings of the Third International Workshop on Software Engineering
for Secure Systems, page 3, Washington, DC, USA, 2007. IEEE Computer Society.
[22] E. B. Fernandez, J. Wu, M. M. Larrondo-Petrie, and Y. Shao. On building secure scada systems
using security patterns. In CSIIRW ’09: Proceedings of the 5th Annual Workshop on Cyber Security
and Information Intelligence Research, pages 1–4, New York, NY, USA, 2009. ACM.
[23] B. Blakley and C. Heath. SECURITY DESIGN PATTERNS, 2004. The Open Group Security
Forum.
[24] K. J. Hughes. “Domain Based Security: enabling security at the level of applications and business
processes”, 2002. www.qinetiq.com.
[25] A. Singh, M. Srivatsa, and L. Liu. “Search-as-a-Service: Outsourced Search over Outsourced
Storage”. ACM TRANSACTIONS ON THE WEB, 3(4), September 2009.
9. Anil Gupta, Parag Pande, Aaftab Qureshi & Vaibhav Sharma
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (4) : 2011 413
[26] D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov. “The
eucalyptus open-source cloud-computing system”. In Proceedings of Cloud Computing and Its
Applications, October 2008.
[27] S. Beco, A. Maraschini, and F. Pacini. “Cloud computing and RESERVOIR project”. NUOVO
CIMENTO DELLA SOCIETA ITALIANA DI FISICA C-COLLOQUIA ON PHYSICS, 32(2), Mar-Apr
2009.
[28] Wikipedia” www.wikipedia.org”.