SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 594
ENSURING SECURE TRANSFER, ACCESS AND STORAGE OVER THE
CLOUD STORAGE
Ramani S1
, Amol Bhatnagar2
, Anant Mehrotra3
1
Assistant Professor, Computer Science & Engineering, VIT University, Tamil Nadu, India
2
Student, Computer Science & Engineering, VIT University, Tamil Nadu, India
3
Student, Computer Science & Engineering, VIT University, Tamil Nadu, India
Abstract
The main concern in today’s growing IT sectors is the storage and maintenance of the data. As the data keep on updating according to
the needs of users, there is a huge overhead in the maintenance of the hardware by the company. One of the solutions to this problem
is the use of cloud storage for this enormous data. The cloud storage uses the huge data centers, which are remotely located, to store
the data. In addition to the easy storage of the data, this huge data center also reduces the cost of maintenance of the data .However
this distinct feature of cloud storage leads to many security issues which should be lucidly understood by the IT sectors.
One of the emerging security issue would be the integrity of the data stored in the data center i.e. to check whether the cloud provider
misuses the data or not .The cloud provider can misuses the data in many ways like they can copy or modify the file .Due to the
storage of data on the data center, user is not able to access the data physically thus there should be the way by which user can check
the reliability of the data on the cloud. In this paper we provide the scheme to check the reliability of the data and this scheme can be
agreed upon by both the user and the cloud provider.
Keywords: Cloud Security, Masking, Cloud Storage Security, Data Center
-----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Cloud computing has been one of the emerging technology in
providing the solutions for various IT industry problem.
Mostly, the cloud computing environment is used in providing
the data centers for storing the data thus the main concern in
cloud computing environment is the security of the data stored
in data centers which are remotely located and used to store
the data in the public storage.
Data center in the cloud environment is used by large number
of people and different IT industries. These people used the
data center to store their critical data (like a banker client will
store the important information in the cloud) and none of the
client knows where exactly the data is being stored. Most of
the client’s data is stored on the hybrid cloud which can be
accessed by different clients so the security issue becomes
very important in this type of environment.
There are different types of users depending on the level of
security they want on their data thus the cloud storage should
be able to provide different hierarchy of data security for
different users depending on both types of data and the money
they are paying [1].
There are different types of cloud storage depending on the
level of security they provide. Public cloud is a union of set of
computers and network resources based on cloud computing
model. In public cloud Application, storage and other
resources are provided to the every user over the internet by
the cloud service provider like Amazon AWS, Microsoft and
Google. As the cloud is accessed by all the general public thus
the security issues is one of the biggest overhead in the public
cloud.
Private cloud is a cloud infrastructure used solely for a single
client and the other clients have no access to this infrastructure
thus the security is not a big overhead here. Hybrid cloud is a
combination of two or more clouds (private or public) having
the benefits of both the environments. By having the hybrid
cloud infrastructure, IT industries and different users can
obtain the extended capacity or the capability of the cloud
services [4].
1.1 Cloud Services
SaaS (Software as a Service): Software Application is used as
an on demand service. Usually provided via the Internet
Eliminates the need to install and run the application on the
customer's own computer. Activities are managed from central
locations rather than at each customer's site, enabling
customers to access applications remotely via the Web.
Examples: Google Apps, Salesforce.com
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 595
PaaS (Platform as a Service): Delivers a computing platform
and/or solution stack as a service over the Internet, eliminating
the need to install and run the application on the customer's
own computers and simplifying maintenance and support
Facilitates deployment of applications without the cost and
complexity of buying and managing the underlying hardware
and software layers Examples: Google App Engine, Hadoop
(Map Reduce), Microsoft Azure
IaaS (Infrastructure as a Service): Delivery of computer
infrastructures such as Processors/CPUs, Memory, Storage,
Networking typically via virtualization.
Rather than purchasing servers, software, data center space or
network equipment, clients instead buy those resources as a
fully outsourced service. IaaS clouds often offer additional
resources such as a virtual-machine disk image library, raw
(block) and file-based storage, firewalls, load balancers, IP
addresses, virtual local area networks (VLANs), and software
bundles. IaaS-cloud providers supply these resources on-
demand from their large pools installed in data centers.
Examples: Amazon EC2, Google Compute Engine, HP Cloud
2. BASIC CONCEPT OF CLOUD STORAGE
Nowadays, the cloud is basically used for storing the data. In
cloud storage the data is stored on different data centers. While
transferring data to the data center the client can only see the
virtual server but in reality the cloud also uses the different data
centers to store the client data.
The architecture of the storage in the cloud consists of one
master data center which will store the information about the
client’s data and different data centers used for storing the
client data [2].
Basically the cloud storage consists of one data center and one
client computer connected over the internet and sending the
data to the data center.
Fig -1: Cloud Storage Architecture
3. PROBLEM STATEMENT
In storing the delicate data over the data center provides the
overhead of data security. To ensure the data security over the
cloud storage we have to make sure that the data is secured in
the three levels i.e. Client Authority, During Transfer and over
the Data center.
Fig -2: Secure Access, Transfer and Storage
3.1 Secure Storage Over Data Center
For the data to be secure over the data center, we have to make
sure the following basic requirements of data security
 The data must be secured from the natural disaster.
 The data must be secured from the unauthorized access.
For securing the data from the natural disaster the cloud
provider can divide the data into small parts and save these
parts on different servers so that in case of damage to a
particular server the data can be recovered. This approach will
also increase the rate of access of data from different data
centers because the number of clients accessing their data on a
single data center will be divided among different data server
[3].
The other approach can be the maintenance of the metadata or
the duplicate copies of the data on the master server. In case
all the files of any client get damaged than in that situation we
can have this metadata which will at least provide the
information about the data lost so that the client can track
down his lost data.
The latter part of the security issue i.e. security from
unauthorized access can be done in different ways. In order to
protect the data at the data center, the cloud provider can use
two approaches. In the first approach the user can randomly
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 596
choose the two functions and use these functions on the data
before storing it over the data center [5]. The value given by
these functions should be recorded and whenever the user
wants to check the integrity of the data he will going to apply
the same two functions over the data stored in the data center
and value obtained should be verified from the value recorded.
This will ensure the secure data storage over the data center
[6].
Secondly we can use the approach of masking some of the
content of the file. In this case the user can mask the content
of the file, thus even after getting the access to the file, the
unauthorized user can’t even decrypt the information from the
file or he can mask the file name so that no one can predict the
information in the file.
In addition to this we can also count the number of characters
in the file and its size before storing it to the cloud server. In
case of checking the integrity of the file, the user can count the
numbers of characters in the file received from the cloud, its
size and check it with the previous calculated number of
characters and size. If both matches then the integrity of the
file may be unhampered.
3.2 VERIFICATION
Cloud provider used to provide different resources like
application and storage space to different IT industries and
customers thus there is a strict need of protection of particular
user data from other user’s data. Whenever the user access the
data in the cloud there must be some recording and tracing of
the user action. It is mandatory for the security purpose that no
one else other than the administrator can manage the data
moreover the administrator should also have the restricted
rights.
To ensure the privacy of user data there are many algorithm
until the data is with user only but in cloud storage the privacy
of data should not be alone maintained by the administrator. In
order to protect the data at the data center, the cloud provider
can use two approaches i.e. implementing the third interface
that will ensure the authenticity of the user. In this approach
the user cannot directly get the access of the files. He has to go
through the two level of security, one is the primary
authentication of the user and secondly after getting the
access, the third interface should also validate that user. for
example a banking client first has to login through their
credentials after that for downloading or accessing the file
client has to enter a secure one time password which will be
send by the third interface to a secure area like email or
mobile. This approach will secure most of the data and prevent
unauthorized access.
Fig -3: Third party checking the user integrity
In addition to this approach the cloud provider can use a
private area designated for a particular client. This will restrict
the user from accessing the file of other users as the user is
having a private area on the cloud. Paper proposes to use the
approach of dividing the file into small chunks of data and
storing it as an individual file on different data server so that
even the administrator can only view the particular part of that
file on that server and will be unable to extract the data from
the file.
3.3 Data Protection during Transfer
While storing data into the cloud storage the main overhead of
security of the data occurs while transferring the data from the
user hard disks to the designated data center. During this
transfer the data is more prone to security threats.
To minimize the security threat one of the method is to setup
different sub-data center between the path of user and the
main data center. This will hinder the attack by the
unauthorized people as the data will be going to take less time
to get transfer. Moreover during the transfer we can use
different cryptographic protocol like SSL and TLS that will
provide security of the data over internet [7].
Another main issue is the timely delivery of the information to
the user. This issue can be overcome by distributing the copies
of the data to the different data center being setup near the
user so as to maximize the bandwidth of access of data from
the different networks. The particular user will be going to
access the copy of the document that is being stored near to
him. By following this approach the uses of the central data
center is being reduced to minimal.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 597
4. CONCLUSIONS
Paper proposes the models for checking the authentication of
data during the transfer, storage at the data center and
unauthorized access of the user. In further research we will
try to improve our models in respect of the cloud storage
environment.
ACKNOWLEDGEMENTS
We would like to express our sincere gratitude to my guide
and the other author of this paper for their valuable help.
REFERENCES
[1]. BR Kandukuri, VR Paturi and Rakshit, A.Cloud Security
Issues, Services Computing, 2009. SCC'09.IEEE International
Conference on,P517-520,2009
[2]. http://en.wikipedia.org/wiki/Cloud_computing
[3]. Yan, L. and Rong, C. and Zhao, G.Strengthen cloud
computing security with federal identity management using
hierarchical identity-based cryptography, Cloud Computing,
P167-177,2009
[4]. Lian, Q, W Chen, and Z Zhang, On the Impact of Replica
Placement to the Reliability of Distributed Brick Storage
Systems. Distributed Computing Systems, 2005. ICDCS 2005.
Proceedings. 25th IEEE International Conference on, 2005: p.
187-196.
[5]. Wang, C., et al. Privacy-preserving public auditing for
data storage security in cloud computing. in INFOCOM, 2010
Proceedings IEEE. 2010:IEEE.
[6]. Yang, K. and X. Jia, Data storage auditing service in
cloud computing:challenges, methods and opportunities.
WorldWideWeb, s2012.15(4):p.409-428
[7]. W. Stallings. Cryptography and Network Security:
Principles and Practice. (3rd ed.). Prentice Hall, Upper
SaddleRiver, NewJersey, 2003
BIOGRAPHIES
Ramani S, received his M.Tech degree from
Bharathidasan Institute of Technology
affiliated to Bharathidasan University, Tamil
Nadu, India. He is pursuing Ph. D from VIT
University Vellore, India. His area of interests
includes Database, Web Technology, Data
Mining. E-mail: ramani.s@vit.ac.in
Amol Bhatnagar, student of computer
science engineering at Vellore Institute Of
Technology, Vellore, Tamil Nadu.He is
currently pursuing B.Tech in Computer
science at VIT University. His current area
of research includes Cloud Computing.
E-mail:amolmbd@gmail.com
Anant Mehrotra, is a student of computer
science and engineering at Vellore Institute
Of Technology, Vellore, Tamil Nadu.He is
currently pursuing B.Tech in Computer
science at VIT University. His current area
of research includes data mining.
E-mail:anantm.1608@gmail.com

More Related Content

What's hot

SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspectseSAT Publishing House
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
 
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...IRJET Journal
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingMonishaNehkal
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learningManimaran A
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataIRJET Journal
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...eSAT Publishing House
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computingijtsrd
 

What's hot (20)

SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspects
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
A study on security issues in cloud based e learning
A study on security issues in cloud based e learningA study on security issues in cloud based e learning
A study on security issues in cloud based e learning
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
Towards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the DataTowards Achieving Efficient and Secure Way to Share the Data
Towards Achieving Efficient and Secure Way to Share the Data
 
R180203114117
R180203114117R180203114117
R180203114117
 
Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...Measurable, safe and secure data management for sensitive users in cloud comp...
Measurable, safe and secure data management for sensitive users in cloud comp...
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 

Viewers also liked

Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsCloudMask inc.
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in CloudIOSR Journals
 
Is The Cloud Secure Enough For Your Data?
Is The Cloud Secure Enough For Your Data?Is The Cloud Secure Enough For Your Data?
Is The Cloud Secure Enough For Your Data?OSIbeyond
 
The Trusted Cloud Transfer Protocol (TCTP)
The Trusted Cloud Transfer Protocol (TCTP)The Trusted Cloud Transfer Protocol (TCTP)
The Trusted Cloud Transfer Protocol (TCTP)Mathias Slawik
 
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...OneLogin
 
Securing Your Data In The Cloud
Securing Your Data In The CloudSecuring Your Data In The Cloud
Securing Your Data In The CloudOmer Trajman
 

Viewers also liked (6)

Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data  in CloudA Detailed Analysis of the Issues and Solutions for Securing Data  in Cloud
A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud
 
Is The Cloud Secure Enough For Your Data?
Is The Cloud Secure Enough For Your Data?Is The Cloud Secure Enough For Your Data?
Is The Cloud Secure Enough For Your Data?
 
The Trusted Cloud Transfer Protocol (TCTP)
The Trusted Cloud Transfer Protocol (TCTP)The Trusted Cloud Transfer Protocol (TCTP)
The Trusted Cloud Transfer Protocol (TCTP)
 
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
Securing Apps and Data in the Cloud and On-Premises with OneLogin and Duo Sec...
 
Securing Your Data In The Cloud
Securing Your Data In The CloudSecuring Your Data In The Cloud
Securing Your Data In The Cloud
 

Similar to Ensuring secure transfer, access and storage over the cloud storage

Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implicationseSAT Publishing House
 
Privacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudPrivacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudeSAT Publishing House
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Journals
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud IRJET Journal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...pharmaindexing
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsIRJET Journal
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlijdpsjournal
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudIRJET Journal
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
 

Similar to Ensuring secure transfer, access and storage over the cloud storage (20)

Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Issues of cloud security and its implications
Issues of cloud security and its implicationsIssues of cloud security and its implications
Issues of cloud security and its implications
 
Privacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloudPrivacy preserving external auditing for data storage security in cloud
Privacy preserving external auditing for data storage security in cloud
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 A Survey Paper on Removal of Data Duplication in a Hybrid Cloud  A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
A Survey Paper on Removal of Data Duplication in a Hybrid Cloud
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Flaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple cloudsFlaw less coding and authentication of user data using multiple clouds
Flaw less coding and authentication of user data using multiple clouds
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 
Data Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

Ensuring secure transfer, access and storage over the cloud storage

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 594 ENSURING SECURE TRANSFER, ACCESS AND STORAGE OVER THE CLOUD STORAGE Ramani S1 , Amol Bhatnagar2 , Anant Mehrotra3 1 Assistant Professor, Computer Science & Engineering, VIT University, Tamil Nadu, India 2 Student, Computer Science & Engineering, VIT University, Tamil Nadu, India 3 Student, Computer Science & Engineering, VIT University, Tamil Nadu, India Abstract The main concern in today’s growing IT sectors is the storage and maintenance of the data. As the data keep on updating according to the needs of users, there is a huge overhead in the maintenance of the hardware by the company. One of the solutions to this problem is the use of cloud storage for this enormous data. The cloud storage uses the huge data centers, which are remotely located, to store the data. In addition to the easy storage of the data, this huge data center also reduces the cost of maintenance of the data .However this distinct feature of cloud storage leads to many security issues which should be lucidly understood by the IT sectors. One of the emerging security issue would be the integrity of the data stored in the data center i.e. to check whether the cloud provider misuses the data or not .The cloud provider can misuses the data in many ways like they can copy or modify the file .Due to the storage of data on the data center, user is not able to access the data physically thus there should be the way by which user can check the reliability of the data on the cloud. In this paper we provide the scheme to check the reliability of the data and this scheme can be agreed upon by both the user and the cloud provider. Keywords: Cloud Security, Masking, Cloud Storage Security, Data Center -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Cloud computing has been one of the emerging technology in providing the solutions for various IT industry problem. Mostly, the cloud computing environment is used in providing the data centers for storing the data thus the main concern in cloud computing environment is the security of the data stored in data centers which are remotely located and used to store the data in the public storage. Data center in the cloud environment is used by large number of people and different IT industries. These people used the data center to store their critical data (like a banker client will store the important information in the cloud) and none of the client knows where exactly the data is being stored. Most of the client’s data is stored on the hybrid cloud which can be accessed by different clients so the security issue becomes very important in this type of environment. There are different types of users depending on the level of security they want on their data thus the cloud storage should be able to provide different hierarchy of data security for different users depending on both types of data and the money they are paying [1]. There are different types of cloud storage depending on the level of security they provide. Public cloud is a union of set of computers and network resources based on cloud computing model. In public cloud Application, storage and other resources are provided to the every user over the internet by the cloud service provider like Amazon AWS, Microsoft and Google. As the cloud is accessed by all the general public thus the security issues is one of the biggest overhead in the public cloud. Private cloud is a cloud infrastructure used solely for a single client and the other clients have no access to this infrastructure thus the security is not a big overhead here. Hybrid cloud is a combination of two or more clouds (private or public) having the benefits of both the environments. By having the hybrid cloud infrastructure, IT industries and different users can obtain the extended capacity or the capability of the cloud services [4]. 1.1 Cloud Services SaaS (Software as a Service): Software Application is used as an on demand service. Usually provided via the Internet Eliminates the need to install and run the application on the customer's own computer. Activities are managed from central locations rather than at each customer's site, enabling customers to access applications remotely via the Web. Examples: Google Apps, Salesforce.com
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 595 PaaS (Platform as a Service): Delivers a computing platform and/or solution stack as a service over the Internet, eliminating the need to install and run the application on the customer's own computers and simplifying maintenance and support Facilitates deployment of applications without the cost and complexity of buying and managing the underlying hardware and software layers Examples: Google App Engine, Hadoop (Map Reduce), Microsoft Azure IaaS (Infrastructure as a Service): Delivery of computer infrastructures such as Processors/CPUs, Memory, Storage, Networking typically via virtualization. Rather than purchasing servers, software, data center space or network equipment, clients instead buy those resources as a fully outsourced service. IaaS clouds often offer additional resources such as a virtual-machine disk image library, raw (block) and file-based storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles. IaaS-cloud providers supply these resources on- demand from their large pools installed in data centers. Examples: Amazon EC2, Google Compute Engine, HP Cloud 2. BASIC CONCEPT OF CLOUD STORAGE Nowadays, the cloud is basically used for storing the data. In cloud storage the data is stored on different data centers. While transferring data to the data center the client can only see the virtual server but in reality the cloud also uses the different data centers to store the client data. The architecture of the storage in the cloud consists of one master data center which will store the information about the client’s data and different data centers used for storing the client data [2]. Basically the cloud storage consists of one data center and one client computer connected over the internet and sending the data to the data center. Fig -1: Cloud Storage Architecture 3. PROBLEM STATEMENT In storing the delicate data over the data center provides the overhead of data security. To ensure the data security over the cloud storage we have to make sure that the data is secured in the three levels i.e. Client Authority, During Transfer and over the Data center. Fig -2: Secure Access, Transfer and Storage 3.1 Secure Storage Over Data Center For the data to be secure over the data center, we have to make sure the following basic requirements of data security  The data must be secured from the natural disaster.  The data must be secured from the unauthorized access. For securing the data from the natural disaster the cloud provider can divide the data into small parts and save these parts on different servers so that in case of damage to a particular server the data can be recovered. This approach will also increase the rate of access of data from different data centers because the number of clients accessing their data on a single data center will be divided among different data server [3]. The other approach can be the maintenance of the metadata or the duplicate copies of the data on the master server. In case all the files of any client get damaged than in that situation we can have this metadata which will at least provide the information about the data lost so that the client can track down his lost data. The latter part of the security issue i.e. security from unauthorized access can be done in different ways. In order to protect the data at the data center, the cloud provider can use two approaches. In the first approach the user can randomly
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 596 choose the two functions and use these functions on the data before storing it over the data center [5]. The value given by these functions should be recorded and whenever the user wants to check the integrity of the data he will going to apply the same two functions over the data stored in the data center and value obtained should be verified from the value recorded. This will ensure the secure data storage over the data center [6]. Secondly we can use the approach of masking some of the content of the file. In this case the user can mask the content of the file, thus even after getting the access to the file, the unauthorized user can’t even decrypt the information from the file or he can mask the file name so that no one can predict the information in the file. In addition to this we can also count the number of characters in the file and its size before storing it to the cloud server. In case of checking the integrity of the file, the user can count the numbers of characters in the file received from the cloud, its size and check it with the previous calculated number of characters and size. If both matches then the integrity of the file may be unhampered. 3.2 VERIFICATION Cloud provider used to provide different resources like application and storage space to different IT industries and customers thus there is a strict need of protection of particular user data from other user’s data. Whenever the user access the data in the cloud there must be some recording and tracing of the user action. It is mandatory for the security purpose that no one else other than the administrator can manage the data moreover the administrator should also have the restricted rights. To ensure the privacy of user data there are many algorithm until the data is with user only but in cloud storage the privacy of data should not be alone maintained by the administrator. In order to protect the data at the data center, the cloud provider can use two approaches i.e. implementing the third interface that will ensure the authenticity of the user. In this approach the user cannot directly get the access of the files. He has to go through the two level of security, one is the primary authentication of the user and secondly after getting the access, the third interface should also validate that user. for example a banking client first has to login through their credentials after that for downloading or accessing the file client has to enter a secure one time password which will be send by the third interface to a secure area like email or mobile. This approach will secure most of the data and prevent unauthorized access. Fig -3: Third party checking the user integrity In addition to this approach the cloud provider can use a private area designated for a particular client. This will restrict the user from accessing the file of other users as the user is having a private area on the cloud. Paper proposes to use the approach of dividing the file into small chunks of data and storing it as an individual file on different data server so that even the administrator can only view the particular part of that file on that server and will be unable to extract the data from the file. 3.3 Data Protection during Transfer While storing data into the cloud storage the main overhead of security of the data occurs while transferring the data from the user hard disks to the designated data center. During this transfer the data is more prone to security threats. To minimize the security threat one of the method is to setup different sub-data center between the path of user and the main data center. This will hinder the attack by the unauthorized people as the data will be going to take less time to get transfer. Moreover during the transfer we can use different cryptographic protocol like SSL and TLS that will provide security of the data over internet [7]. Another main issue is the timely delivery of the information to the user. This issue can be overcome by distributing the copies of the data to the different data center being setup near the user so as to maximize the bandwidth of access of data from the different networks. The particular user will be going to access the copy of the document that is being stored near to him. By following this approach the uses of the central data center is being reduced to minimal.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 597 4. CONCLUSIONS Paper proposes the models for checking the authentication of data during the transfer, storage at the data center and unauthorized access of the user. In further research we will try to improve our models in respect of the cloud storage environment. ACKNOWLEDGEMENTS We would like to express our sincere gratitude to my guide and the other author of this paper for their valuable help. REFERENCES [1]. BR Kandukuri, VR Paturi and Rakshit, A.Cloud Security Issues, Services Computing, 2009. SCC'09.IEEE International Conference on,P517-520,2009 [2]. http://en.wikipedia.org/wiki/Cloud_computing [3]. Yan, L. and Rong, C. and Zhao, G.Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography, Cloud Computing, P167-177,2009 [4]. Lian, Q, W Chen, and Z Zhang, On the Impact of Replica Placement to the Reliability of Distributed Brick Storage Systems. Distributed Computing Systems, 2005. ICDCS 2005. Proceedings. 25th IEEE International Conference on, 2005: p. 187-196. [5]. Wang, C., et al. Privacy-preserving public auditing for data storage security in cloud computing. in INFOCOM, 2010 Proceedings IEEE. 2010:IEEE. [6]. Yang, K. and X. Jia, Data storage auditing service in cloud computing:challenges, methods and opportunities. WorldWideWeb, s2012.15(4):p.409-428 [7]. W. Stallings. Cryptography and Network Security: Principles and Practice. (3rd ed.). Prentice Hall, Upper SaddleRiver, NewJersey, 2003 BIOGRAPHIES Ramani S, received his M.Tech degree from Bharathidasan Institute of Technology affiliated to Bharathidasan University, Tamil Nadu, India. He is pursuing Ph. D from VIT University Vellore, India. His area of interests includes Database, Web Technology, Data Mining. E-mail: ramani.s@vit.ac.in Amol Bhatnagar, student of computer science engineering at Vellore Institute Of Technology, Vellore, Tamil Nadu.He is currently pursuing B.Tech in Computer science at VIT University. His current area of research includes Cloud Computing. E-mail:amolmbd@gmail.com Anant Mehrotra, is a student of computer science and engineering at Vellore Institute Of Technology, Vellore, Tamil Nadu.He is currently pursuing B.Tech in Computer science at VIT University. His current area of research includes data mining. E-mail:anantm.1608@gmail.com