SlideShare a Scribd company logo
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-5, May- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 340
Enhancement of the Cloud Data Storage
Architectural Framework in Private Cloud
Dr. K. Subramanian1
, M.Mohamed Sirajudeen2
1
Department of Computer Science, V.S.S Government Arts College, Pulankuruchi, Pudukottai,
Tamil Nadu, India.
2
Corresponding Author, Department of Computer Science, J.J College of Arts and Science, Pudukottai, Tamil Nadu, India.
Abstract— The data storage in the cloud typically resides
in a service providing environment collocated with data
from different clients. The institutions or organizations
moving the sensitive and regulated data into the cloud in
order to maintain the account for the means by which the
access data is controlled and the data is kept secure.
Data can take many forms. The cloud based application
development; it includes the application programs,
scripts, and configuration settings, along with the
development tools. For deployed applications, it includes
records and other content created or used by the
applications, as well as account information about the
users of the applications. Access controls are one means
to keep data away from unauthorized users; encryption is
another. Access controls are typically identity-based,
which makes authentication of the user’s identity an
important issue in cloud computing. In this research
paper focus the cloud data storage architectural frame
work of encrypted data.
Keywords— Data, Secure, Cloud storage and access
control.
I. INTRODUCTION
In general, the procedures for protecting data at rest are
not as well standardized, however, making the
interoperability an issue due to the predominance of
proprietary systems. The lack of interoperability affects
the availability of data and complicates the portability of
applications and data between cloud providers.
Currently, the responsibility for cryptographic key
management falls mainly on the cloud service subscriber.
Key generation and storage is usually performed outside
the cloud using hardware security modules, which do not
scale well to the cloud paradigm. NIST’s Cryptographic
Key Management Project is identifying scalable and
usable cryptographic key management and exchange
strategies for use by government, which could help to
alleviate the problem eventually. Protecting data in use is
an emerging area of cryptography with little practical
results to offer, leaving trust mechanisms as the main
safeguard [1].The data sanitization practices that a cloud
provider implements have obvious implications for
security. Sanitization is the removal of sensitive data
from a storage device in various situations, such as when
a storage device is removed from service or moved
elsewhere to be stored. Data refinement also applies to
backup copies made for recovery and restoration of
service, and also residual data remaining upon termination
of service. In a cloud computing environment, data from
one subscriber is physically commingled with the data of
other subscribers, which can complicate matters. For
instance, many examples exist of researchers obtaining
used drives from online auctions and other sources and
recovering large amounts of sensitive information from
them [3].
First of all, there are currently no standards for cloud-
based storage or computing. This can make porting an
infrastructure from one vendor to another dicey at best,
and may mean you're subject to the whims of an
infrastructure provider. This is a key issue that emerging
cloud-based storage solutions will address, but
nonetheless is a major challenge today. Once solutions are
available from major vendors, more services with
common APIs will become available, and developers will
come up with mappings between other popular APIs
(such as Amazon S3, and potentially even XAM).
The cloud-based storage solutions still fall short of
meeting all IT storage needs. The biggest gap is where
databases are concerned. While Amazon S3 started life
looking very much like a widely distributed, extremely
flat database, it has never been capable of meeting
traditional enterprise database needs: It is not relational in
the traditional sense, it lacks DBMS tools, and because it
is designed to support loosely coupled applications, it
does not support high loads of guaranteed, consistent
transactions expected in traditional database
environments. More importantly, without a distributable
database, the cloud looks like a poor place for databases
applications that depend on access to single instances of
databases in the cloud will never be able to benefit from
load balancing, scalability, and improved availability; all
of which may imply the use of multiple copies of data or
stateless redirection of data connections.
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-5, May- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 341
This is an area of critical importance in which next-
generation cloud-based storage vendors must begin to
innovate.
In this paper, to give the attention of segmentation of
encrypted cloud data into two major components such as
the encryption key (EK) and the cloud data(CD),
thereafter the EK and CD will store in different cloud
servers situated perpendicular (orthogonal) with each
other.
Fig.1.1: General Cloud Data Storage Frameworks
The above figure 1.1 illustrates the general storage
mechanism of the data transfer between the clients and
server. The standard data storage mechanism is focus on
the data either it will encrypt neither form nor original
form, it occupies in the same server or single server. It
causes more security risks for highly sensitive data. In
order to avoid such kind of risk as well as to improve the
authenticated access by using this proposed cloud storage
management.
II. RELATED WORK
Moving data and applications to a cloud computing
environment operated by a cloud provider expands the
insider security risk not only to the cloud provider’s staff,
but also potentially among other customers using the
service.
For example, a denial of service attack launched by a
malicious insider was demonstrated against a well-known
IaaS cloud [2]. The architecture of the software systems
used to deliver cloud services comprises hardware and
software residing in the cloud. The physical location of
the infrastructure is determined by the cloud provider as is
the implementation of the reliability and scalability logic
of the underlying support framework.
Virtual machines often serve as the abstract unit of
deployment and are loosely coupled with the cloud
storage architecture. Applications are built on the
programming interfaces of Internet-accessible services,
which typically involve multiple cloud components
communicating with each other over application
programming interfaces.
Many of the simplified interfaces and service abstractions
belie the inherent complexity that affects security. Data
must be secured while at rest, in transit, and in use, and
access to the data must be controlled. Standards for
communications protocols and public key certificates
allow data transfers to be protected using cryptography.
Procedures for protecting data at rest are not as well
standardized, however, making interoperability an issue
due to the predominance of proprietary systems. The lack
of interoperability affects the availability of data and
complicates the portability of applications and data
between cloud providers.
While outsourcing relieves operational commitment on
the part of the organization, the act of engaging a cloud
provider’s offerings for public cloud services poses risks
against which an organization needs to safeguard itself.
The analysis must include factors such as the service
model involved, the purpose and scope of the service, the
types and level of access needed by the provider and
proposed for use between the organizational computing
environment and provider services.
The service duration and dependencies, and the strength
of protection offered via the security controls available
from the cloud provider [4]. The Cloud data storage of
encrypted key along with data store architectural
framework is depicted in the following figure 1.2.
Fig.1.2: Encrypted Key and Data Storage architectural
frame work
III. PROPOSED WORK
The basic principle of the proposed architectural
framework mainly focuses on the storage of encrypted
message in private cloud. There are different mechanism
of secure data transmission is proposed by different
cryptographic algorithms for example. RSA (Rivest,
Shamir and Aldemin), AES (Advanced Encryption
Standard), DES (Data Encryption Standard).
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-5, May- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 341
This is an area of critical importance in which next-
generation cloud-based storage vendors must begin to
innovate.
In this paper, to give the attention of segmentation of
encrypted cloud data into two major components such as
the encryption key (EK) and the cloud data(CD),
thereafter the EK and CD will store in different cloud
servers situated perpendicular (orthogonal) with each
other.
Fig.1.1: General Cloud Data Storage Frameworks
The above figure 1.1 illustrates the general storage
mechanism of the data transfer between the clients and
server. The standard data storage mechanism is focus on
the data either it will encrypt neither form nor original
form, it occupies in the same server or single server. It
causes more security risks for highly sensitive data. In
order to avoid such kind of risk as well as to improve the
authenticated access by using this proposed cloud storage
management.
II. RELATED WORK
Moving data and applications to a cloud computing
environment operated by a cloud provider expands the
insider security risk not only to the cloud provider’s staff,
but also potentially among other customers using the
service.
For example, a denial of service attack launched by a
malicious insider was demonstrated against a well-known
IaaS cloud [2]. The architecture of the software systems
used to deliver cloud services comprises hardware and
software residing in the cloud. The physical location of
the infrastructure is determined by the cloud provider as is
the implementation of the reliability and scalability logic
of the underlying support framework.
Virtual machines often serve as the abstract unit of
deployment and are loosely coupled with the cloud
storage architecture. Applications are built on the
programming interfaces of Internet-accessible services,
which typically involve multiple cloud components
communicating with each other over application
programming interfaces.
Many of the simplified interfaces and service abstractions
belie the inherent complexity that affects security. Data
must be secured while at rest, in transit, and in use, and
access to the data must be controlled. Standards for
communications protocols and public key certificates
allow data transfers to be protected using cryptography.
Procedures for protecting data at rest are not as well
standardized, however, making interoperability an issue
due to the predominance of proprietary systems. The lack
of interoperability affects the availability of data and
complicates the portability of applications and data
between cloud providers.
While outsourcing relieves operational commitment on
the part of the organization, the act of engaging a cloud
provider’s offerings for public cloud services poses risks
against which an organization needs to safeguard itself.
The analysis must include factors such as the service
model involved, the purpose and scope of the service, the
types and level of access needed by the provider and
proposed for use between the organizational computing
environment and provider services.
The service duration and dependencies, and the strength
of protection offered via the security controls available
from the cloud provider [4]. The Cloud data storage of
encrypted key along with data store architectural
framework is depicted in the following figure 1.2.
Fig.1.2: Encrypted Key and Data Storage architectural
frame work
III. PROPOSED WORK
The basic principle of the proposed architectural
framework mainly focuses on the storage of encrypted
message in private cloud. There are different mechanism
of secure data transmission is proposed by different
cryptographic algorithms for example. RSA (Rivest,
Shamir and Aldemin), AES (Advanced Encryption
Standard), DES (Data Encryption Standard).
International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-5, May- 2016]
Infogain Publication (Infogainpublication.com) ISSN : 2454-1311
www.ijaems.com Page | 341
This is an area of critical importance in which next-
generation cloud-based storage vendors must begin to
innovate.
In this paper, to give the attention of segmentation of
encrypted cloud data into two major components such as
the encryption key (EK) and the cloud data(CD),
thereafter the EK and CD will store in different cloud
servers situated perpendicular (orthogonal) with each
other.
Fig.1.1: General Cloud Data Storage Frameworks
The above figure 1.1 illustrates the general storage
mechanism of the data transfer between the clients and
server. The standard data storage mechanism is focus on
the data either it will encrypt neither form nor original
form, it occupies in the same server or single server. It
causes more security risks for highly sensitive data. In
order to avoid such kind of risk as well as to improve the
authenticated access by using this proposed cloud storage
management.
II. RELATED WORK
Moving data and applications to a cloud computing
environment operated by a cloud provider expands the
insider security risk not only to the cloud provider’s staff,
but also potentially among other customers using the
service.
For example, a denial of service attack launched by a
malicious insider was demonstrated against a well-known
IaaS cloud [2]. The architecture of the software systems
used to deliver cloud services comprises hardware and
software residing in the cloud. The physical location of
the infrastructure is determined by the cloud provider as is
the implementation of the reliability and scalability logic
of the underlying support framework.
Virtual machines often serve as the abstract unit of
deployment and are loosely coupled with the cloud
storage architecture. Applications are built on the
programming interfaces of Internet-accessible services,
which typically involve multiple cloud components
communicating with each other over application
programming interfaces.
Many of the simplified interfaces and service abstractions
belie the inherent complexity that affects security. Data
must be secured while at rest, in transit, and in use, and
access to the data must be controlled. Standards for
communications protocols and public key certificates
allow data transfers to be protected using cryptography.
Procedures for protecting data at rest are not as well
standardized, however, making interoperability an issue
due to the predominance of proprietary systems. The lack
of interoperability affects the availability of data and
complicates the portability of applications and data
between cloud providers.
While outsourcing relieves operational commitment on
the part of the organization, the act of engaging a cloud
provider’s offerings for public cloud services poses risks
against which an organization needs to safeguard itself.
The analysis must include factors such as the service
model involved, the purpose and scope of the service, the
types and level of access needed by the provider and
proposed for use between the organizational computing
environment and provider services.
The service duration and dependencies, and the strength
of protection offered via the security controls available
from the cloud provider [4]. The Cloud data storage of
encrypted key along with data store architectural
framework is depicted in the following figure 1.2.
Fig.1.2: Encrypted Key and Data Storage architectural
frame work
III. PROPOSED WORK
The basic principle of the proposed architectural
framework mainly focuses on the storage of encrypted
message in private cloud. There are different mechanism
of secure data transmission is proposed by different
cryptographic algorithms for example. RSA (Rivest,
Shamir and Aldemin), AES (Advanced Encryption
Standard), DES (Data Encryption Standard).

More Related Content

What's hot

A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd Iaetsd
 
50620130101004
5062013010100450620130101004
50620130101004
IAEME Publication
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
IRJET Journal
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
ijtsrd
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
IJERA Editor
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
IOSR Journals
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
ijsptm
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
 
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
Enhancing Availability of Data in Mixed Homomorphic Encryption in CloudEnhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
ijtsrd
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
 
Fog doc
Fog doc Fog doc
Fog doc
priyanka reddy
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
IOSR Journals
 
Paper id 21201458
Paper id 21201458Paper id 21201458
Paper id 21201458
IJRAT
 

What's hot (18)

A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Iaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data setsIaetsd secured and efficient data scheduling of intermediate data sets
Iaetsd secured and efficient data scheduling of intermediate data sets
 
50620130101004
5062013010100450620130101004
50620130101004
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage DevicesPrivacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
Enhancing Availability of Data in Mixed Homomorphic Encryption in CloudEnhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Fog doc
Fog doc Fog doc
Fog doc
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
 
Paper id 21201458
Paper id 21201458Paper id 21201458
Paper id 21201458
 

Similar to Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud

Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
IJERA Editor
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET Journal
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
IRJET Journal
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
Editor Jacotech
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
Editor Jacotech
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
Editor Jacotech
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Editor IJCATR
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
 
A Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsA Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated Clouds
IJORCS
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
IJARIIT
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
IRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET Journal
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
Editor IJCATR
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 

Similar to Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud (20)

Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
1376843836 94879193
1376843836  948791931376843836  94879193
1376843836 94879193
 
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEYSECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
SECURITY CONCERN ON CLOUD BASED ON ATTRIBUTES: AN SURVEY
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
A Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsA Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated Clouds
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Guaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient CostGuaranteed Availability of Cloud Data with Efficient Cost
Guaranteed Availability of Cloud Data with Efficient Cost
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 

Recently uploaded

Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
MiscAnnoy1
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
Roger Rozario
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
architagupta876
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 

Recently uploaded (20)

Introduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptxIntroduction to AI Safety (public presentation).pptx
Introduction to AI Safety (public presentation).pptx
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Transformers design and coooling methods
Transformers design and coooling methodsTransformers design and coooling methods
Transformers design and coooling methods
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 

Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud

  • 1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-5, May- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 340 Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud Dr. K. Subramanian1 , M.Mohamed Sirajudeen2 1 Department of Computer Science, V.S.S Government Arts College, Pulankuruchi, Pudukottai, Tamil Nadu, India. 2 Corresponding Author, Department of Computer Science, J.J College of Arts and Science, Pudukottai, Tamil Nadu, India. Abstract— The data storage in the cloud typically resides in a service providing environment collocated with data from different clients. The institutions or organizations moving the sensitive and regulated data into the cloud in order to maintain the account for the means by which the access data is controlled and the data is kept secure. Data can take many forms. The cloud based application development; it includes the application programs, scripts, and configuration settings, along with the development tools. For deployed applications, it includes records and other content created or used by the applications, as well as account information about the users of the applications. Access controls are one means to keep data away from unauthorized users; encryption is another. Access controls are typically identity-based, which makes authentication of the user’s identity an important issue in cloud computing. In this research paper focus the cloud data storage architectural frame work of encrypted data. Keywords— Data, Secure, Cloud storage and access control. I. INTRODUCTION In general, the procedures for protecting data at rest are not as well standardized, however, making the interoperability an issue due to the predominance of proprietary systems. The lack of interoperability affects the availability of data and complicates the portability of applications and data between cloud providers. Currently, the responsibility for cryptographic key management falls mainly on the cloud service subscriber. Key generation and storage is usually performed outside the cloud using hardware security modules, which do not scale well to the cloud paradigm. NIST’s Cryptographic Key Management Project is identifying scalable and usable cryptographic key management and exchange strategies for use by government, which could help to alleviate the problem eventually. Protecting data in use is an emerging area of cryptography with little practical results to offer, leaving trust mechanisms as the main safeguard [1].The data sanitization practices that a cloud provider implements have obvious implications for security. Sanitization is the removal of sensitive data from a storage device in various situations, such as when a storage device is removed from service or moved elsewhere to be stored. Data refinement also applies to backup copies made for recovery and restoration of service, and also residual data remaining upon termination of service. In a cloud computing environment, data from one subscriber is physically commingled with the data of other subscribers, which can complicate matters. For instance, many examples exist of researchers obtaining used drives from online auctions and other sources and recovering large amounts of sensitive information from them [3]. First of all, there are currently no standards for cloud- based storage or computing. This can make porting an infrastructure from one vendor to another dicey at best, and may mean you're subject to the whims of an infrastructure provider. This is a key issue that emerging cloud-based storage solutions will address, but nonetheless is a major challenge today. Once solutions are available from major vendors, more services with common APIs will become available, and developers will come up with mappings between other popular APIs (such as Amazon S3, and potentially even XAM). The cloud-based storage solutions still fall short of meeting all IT storage needs. The biggest gap is where databases are concerned. While Amazon S3 started life looking very much like a widely distributed, extremely flat database, it has never been capable of meeting traditional enterprise database needs: It is not relational in the traditional sense, it lacks DBMS tools, and because it is designed to support loosely coupled applications, it does not support high loads of guaranteed, consistent transactions expected in traditional database environments. More importantly, without a distributable database, the cloud looks like a poor place for databases applications that depend on access to single instances of databases in the cloud will never be able to benefit from load balancing, scalability, and improved availability; all of which may imply the use of multiple copies of data or stateless redirection of data connections.
  • 2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-5, May- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 341 This is an area of critical importance in which next- generation cloud-based storage vendors must begin to innovate. In this paper, to give the attention of segmentation of encrypted cloud data into two major components such as the encryption key (EK) and the cloud data(CD), thereafter the EK and CD will store in different cloud servers situated perpendicular (orthogonal) with each other. Fig.1.1: General Cloud Data Storage Frameworks The above figure 1.1 illustrates the general storage mechanism of the data transfer between the clients and server. The standard data storage mechanism is focus on the data either it will encrypt neither form nor original form, it occupies in the same server or single server. It causes more security risks for highly sensitive data. In order to avoid such kind of risk as well as to improve the authenticated access by using this proposed cloud storage management. II. RELATED WORK Moving data and applications to a cloud computing environment operated by a cloud provider expands the insider security risk not only to the cloud provider’s staff, but also potentially among other customers using the service. For example, a denial of service attack launched by a malicious insider was demonstrated against a well-known IaaS cloud [2]. The architecture of the software systems used to deliver cloud services comprises hardware and software residing in the cloud. The physical location of the infrastructure is determined by the cloud provider as is the implementation of the reliability and scalability logic of the underlying support framework. Virtual machines often serve as the abstract unit of deployment and are loosely coupled with the cloud storage architecture. Applications are built on the programming interfaces of Internet-accessible services, which typically involve multiple cloud components communicating with each other over application programming interfaces. Many of the simplified interfaces and service abstractions belie the inherent complexity that affects security. Data must be secured while at rest, in transit, and in use, and access to the data must be controlled. Standards for communications protocols and public key certificates allow data transfers to be protected using cryptography. Procedures for protecting data at rest are not as well standardized, however, making interoperability an issue due to the predominance of proprietary systems. The lack of interoperability affects the availability of data and complicates the portability of applications and data between cloud providers. While outsourcing relieves operational commitment on the part of the organization, the act of engaging a cloud provider’s offerings for public cloud services poses risks against which an organization needs to safeguard itself. The analysis must include factors such as the service model involved, the purpose and scope of the service, the types and level of access needed by the provider and proposed for use between the organizational computing environment and provider services. The service duration and dependencies, and the strength of protection offered via the security controls available from the cloud provider [4]. The Cloud data storage of encrypted key along with data store architectural framework is depicted in the following figure 1.2. Fig.1.2: Encrypted Key and Data Storage architectural frame work III. PROPOSED WORK The basic principle of the proposed architectural framework mainly focuses on the storage of encrypted message in private cloud. There are different mechanism of secure data transmission is proposed by different cryptographic algorithms for example. RSA (Rivest, Shamir and Aldemin), AES (Advanced Encryption Standard), DES (Data Encryption Standard).
  • 3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-5, May- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 341 This is an area of critical importance in which next- generation cloud-based storage vendors must begin to innovate. In this paper, to give the attention of segmentation of encrypted cloud data into two major components such as the encryption key (EK) and the cloud data(CD), thereafter the EK and CD will store in different cloud servers situated perpendicular (orthogonal) with each other. Fig.1.1: General Cloud Data Storage Frameworks The above figure 1.1 illustrates the general storage mechanism of the data transfer between the clients and server. The standard data storage mechanism is focus on the data either it will encrypt neither form nor original form, it occupies in the same server or single server. It causes more security risks for highly sensitive data. In order to avoid such kind of risk as well as to improve the authenticated access by using this proposed cloud storage management. II. RELATED WORK Moving data and applications to a cloud computing environment operated by a cloud provider expands the insider security risk not only to the cloud provider’s staff, but also potentially among other customers using the service. For example, a denial of service attack launched by a malicious insider was demonstrated against a well-known IaaS cloud [2]. The architecture of the software systems used to deliver cloud services comprises hardware and software residing in the cloud. The physical location of the infrastructure is determined by the cloud provider as is the implementation of the reliability and scalability logic of the underlying support framework. Virtual machines often serve as the abstract unit of deployment and are loosely coupled with the cloud storage architecture. Applications are built on the programming interfaces of Internet-accessible services, which typically involve multiple cloud components communicating with each other over application programming interfaces. Many of the simplified interfaces and service abstractions belie the inherent complexity that affects security. Data must be secured while at rest, in transit, and in use, and access to the data must be controlled. Standards for communications protocols and public key certificates allow data transfers to be protected using cryptography. Procedures for protecting data at rest are not as well standardized, however, making interoperability an issue due to the predominance of proprietary systems. The lack of interoperability affects the availability of data and complicates the portability of applications and data between cloud providers. While outsourcing relieves operational commitment on the part of the organization, the act of engaging a cloud provider’s offerings for public cloud services poses risks against which an organization needs to safeguard itself. The analysis must include factors such as the service model involved, the purpose and scope of the service, the types and level of access needed by the provider and proposed for use between the organizational computing environment and provider services. The service duration and dependencies, and the strength of protection offered via the security controls available from the cloud provider [4]. The Cloud data storage of encrypted key along with data store architectural framework is depicted in the following figure 1.2. Fig.1.2: Encrypted Key and Data Storage architectural frame work III. PROPOSED WORK The basic principle of the proposed architectural framework mainly focuses on the storage of encrypted message in private cloud. There are different mechanism of secure data transmission is proposed by different cryptographic algorithms for example. RSA (Rivest, Shamir and Aldemin), AES (Advanced Encryption Standard), DES (Data Encryption Standard).
  • 4. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-2, Issue-5, May- 2016] Infogain Publication (Infogainpublication.com) ISSN : 2454-1311 www.ijaems.com Page | 341 This is an area of critical importance in which next- generation cloud-based storage vendors must begin to innovate. In this paper, to give the attention of segmentation of encrypted cloud data into two major components such as the encryption key (EK) and the cloud data(CD), thereafter the EK and CD will store in different cloud servers situated perpendicular (orthogonal) with each other. Fig.1.1: General Cloud Data Storage Frameworks The above figure 1.1 illustrates the general storage mechanism of the data transfer between the clients and server. The standard data storage mechanism is focus on the data either it will encrypt neither form nor original form, it occupies in the same server or single server. It causes more security risks for highly sensitive data. In order to avoid such kind of risk as well as to improve the authenticated access by using this proposed cloud storage management. II. RELATED WORK Moving data and applications to a cloud computing environment operated by a cloud provider expands the insider security risk not only to the cloud provider’s staff, but also potentially among other customers using the service. For example, a denial of service attack launched by a malicious insider was demonstrated against a well-known IaaS cloud [2]. The architecture of the software systems used to deliver cloud services comprises hardware and software residing in the cloud. The physical location of the infrastructure is determined by the cloud provider as is the implementation of the reliability and scalability logic of the underlying support framework. Virtual machines often serve as the abstract unit of deployment and are loosely coupled with the cloud storage architecture. Applications are built on the programming interfaces of Internet-accessible services, which typically involve multiple cloud components communicating with each other over application programming interfaces. Many of the simplified interfaces and service abstractions belie the inherent complexity that affects security. Data must be secured while at rest, in transit, and in use, and access to the data must be controlled. Standards for communications protocols and public key certificates allow data transfers to be protected using cryptography. Procedures for protecting data at rest are not as well standardized, however, making interoperability an issue due to the predominance of proprietary systems. The lack of interoperability affects the availability of data and complicates the portability of applications and data between cloud providers. While outsourcing relieves operational commitment on the part of the organization, the act of engaging a cloud provider’s offerings for public cloud services poses risks against which an organization needs to safeguard itself. The analysis must include factors such as the service model involved, the purpose and scope of the service, the types and level of access needed by the provider and proposed for use between the organizational computing environment and provider services. The service duration and dependencies, and the strength of protection offered via the security controls available from the cloud provider [4]. The Cloud data storage of encrypted key along with data store architectural framework is depicted in the following figure 1.2. Fig.1.2: Encrypted Key and Data Storage architectural frame work III. PROPOSED WORK The basic principle of the proposed architectural framework mainly focuses on the storage of encrypted message in private cloud. There are different mechanism of secure data transmission is proposed by different cryptographic algorithms for example. RSA (Rivest, Shamir and Aldemin), AES (Advanced Encryption Standard), DES (Data Encryption Standard).