SlideShare a Scribd company logo
1 of 5
Download to read offline
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021)
F-83
www.viva-technology.org/New/IJRI
A Study of Data Storage Security Issues in Cloud Computing
Tushar Bobade1,
Chandani Patel2
1
(Department of MCA, Viva School Of MCA/ University of Mumbai, India)
2
(Department of MCA, Viva School Of MCA/ University of Mumbai, India)
Abstract : Cloud computing provides on demand services to its clients. Data storage is among one of the primary
services provided by cloud computing. Cloud service provider hosts the data of data owner on their server and user
can access their data from these servers. As data, owners and servers are different identities, the paradigm of data
storage brings up many security challenges. An independent mechanism is required to make sure that data is
correctly hosted in to the cloud storage server. In this paper, we will discuss the different techniques that are used
for secure data storage on cloud.
Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for
consumers. Cloud computing offers standardized applications to users online and in a manner that can be
accessed regularly. Such applications can be accessed by as many persons as permitted within an organization
without bothering about the maintenance of such application. The Cloud also provides a channel to design and
deploy user applications including its storage space and database without bothering about the underlying
operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud
makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core
activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
Keywords - Cloud computing, Cloud storage server, Data storage , Functional paradigm , Storage space.
I. INTRODUCTION
Cloud computing is the combination of many pre- existing technologies that have matured at different
rates and in the different contexts. The goal of cloud computing is to allow users to take benefit of all these
technologies. Many organizations are moving into cloud because it allows users to store their data on clouds and
can access at anytime from anywhere. Data breaching is possible in cloud environment, since data from various
users and business organizations lie together in cloud. By sending data to the cloud, the data owners transfer the
control of their data to third person that may raise security problems. Sometimes the Cloud Service
Provider(CSP) itself will use/corrupt the data illegally.Cloud storage is important aspect of today’s life.[3][5]
Security and privacy stands as major obstacle on cloud computing i.e. preserving confidentiality, integrity and
availability of data. A simple solution is to encrypt the data before uploading it onto cloud. This approach
ensures that the data are not visibletoexternalusersandcloudadministratorsbut has the limitation that plain text
based searching algorithm are not applicable. In this paper, we discuss the security flaws in data storage and
mechanisms to overcomeit.[1][2]
II. CLOUD STORAGE
Cloud storage is one of primary use of cloud computing. We can define cloud storage as storage of the data
online in the cloud. A cloud storage system is considered as a distributed data centres, which typically use cloud-
computing technologies & offers some kind of interface for storing and accessing data. When storing data on
cloud, it appears as if the data is stored in a particular place with specific name.[6]
Thereare four main types of cloud storage:
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021)
F-84
www.viva-technology.org/New/IJRI
2.1 Personal CloudStorage:
It is also known as mobile cloud storage. In this type storage, individual's data is stored in the cloud, and
he/she may accessthedatafrom anywhere.[7]
2.2 Public Cloud Storage:
In Public cloud storage the enterprise and storage service provider are separate and there aren't any
cloud resources stored in the enterprise's data center. The cloud storage provider fully manages enterprise's
public cloud storage.[7]
2.3 Private Cloud Storage:
In Private Cloud Storage the enterprise and cloud storage provider are integrated in the enterprise's data
center. In private cloud storage, the storage provider has infrastructure in enterprise's data center that is
typically managed by the storage provider. Private cloud storage helps resolve the potential for security and
performance concerns while still offering the advantages of cloud storage.[7]
2.4 Hybrid cloud storage:
It is a combination of public and private cloud storage where some critical data resides in the
enterprise's private cloud while other data isstored andaccessiblefromapubliccloudstorageprovider.[7]
III. CHARACTERISTICS OF CLOUD COMPUTING
There are five characteristics of cloud computing. The first one is on-demand self-service, where a
consumer of services is provided the needed resources without human intervention and interaction with cloud
provider. The second characteristic is broad network access, which means resources can accessed from anywhere
through a standard mechanism by thin or thick client platforms such mobile phone, laptop, and desktop computer.
Resource pooling is another characteristic, which means resources are pooled in order for multi- tenants to
share the resources. In the multi-tenant model, resources are assigned dynamically to a consumer and after
consumer finishes it, it can be assigned to another one to respond to high resource demand. Fig.1. Even if the
resources are assigned to customers on demand, they do not know the location of these assigned resources.
Following figures will show the characteristics of cloud computing .[8][10]
Fig. 1: Cloud environment architecture
Sometimes they know the location at a high-level abstraction, such as country, state, and data centre.
Storage, processing, memory, and network are the kind of resources are assigned. Rapid elasticity is another
characteristic, which means thatresources are dynamically increased when needed and decreased when there is
no need. Also, one of characteristics that a consumer needs is measured service in order to know how much is
consumed.[1]
IV. ENCRYPTED DATA STORAGE FOR CLOUD
Since data in the cloud is placed anywhere, it is important that data be encrypted. We are using secure
co-processor as part of the cloud infrastructure to enable efficient encrypted storage of sensitive data. By
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021)
F-85
www.viva-technology.org/New/IJRI
embedding a secure co-processor (SCP) into cloud infrastructure, the system can handle encrypted data
efficiently. Parts of the proposed instrument (see Figure 2). Basically, SCP is tamper-resistant hardware capable
of limited general-purpose computation. For example, IBM 4758 Cryptographic Coprocessor (IBM) is a single-
board computer consisting of a CPU, memory and special-purpose cryptographic hardware contained in a
tamper-resistant shell, certified to level 4 under FIPS PUB 140-1.[14] When installed on the server, it is capable
of performing local computations that completely hidden from the server. If tampering is detected, then secure
co-processor clears the internal memory. Since the secure coprocessor is tamper-resistant, one could be tempted
to run entire sensitive data storage server on the secure coprocessor. Pushing the entire data storage functionality
into a secure co-processor is not feasible due to many reasons. First of all, due to tamper-resistant shell, secure
co-processors have usually limited memory (only a few megabytes of RAM and
a few kilobytes of non-volatile memory) and computational power (Smith, 1999). Performance will improve
over time, but problems such as heat dissipation/power (which must be controlled to avoid disclosing
processing) will force a gap between general purposes and secure computing. Another issue is that software
running on the SCP must be totally trusted and verified. This security requirement implies that software running
on the SCP should be kept as simple as possible. We can encrypt the sensitive data sets using random private
keys and to alleviate risk of key disclosure, we can use tamper-resistant hardware to store some of
encryption/decryption keys (i.e., a master key that encrypts all other keys).[13][11]. It is basically very
important to encrypt the data in cloud storage. Fig.2.
Fig. 2: Parts of the proposed instrument
V. SECURITY AND PRIVATE ISSUES IN DATA STORAGE
Cloud Computing allows the users to store their data on storage location maintained by a third party.
Once the data is uploaded into cloud, the user loses its control over the data and the attackers can tamper the
data. The attacker may be an internal (CSP) or external. Unauthorized access is also a common practice due to
weak access control. The protection of information arises the following challenges:
The security and privacy issues related to data storage are confidentiality, integrity and availability. [2]
This changes are important to tackle the security issues in cloud computing.
5.1 Confidentiality
The major dispute in cloud computing is confidentiality. Data confidentiality means accessing data
only by authorized users and is strongly related to authentication. In another way, confidentiality means
keeping users data secret in the cloud systems. As we are storing the data on a remote server and transferring
control over the data to theproviderherearisesthequestions suchas:
For ensuring confidentiality, cryptographic encryption algorithms and strong authentication
mechanisms can be used. Encryption is the process of converting data into a form called cipher text that can be
understood only by authorized users. Fig.3. Encryption is an efficient technique for protecting the data but
have the obstacle that data will be lost once the encryption key is stealed. algorithms. Blowfish is a fat and
simple encryption algorithm. Formally the algorithm is based n confidentiality.[13]
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021)
F-86
www.viva-technology.org/New/IJRI
Fig. 3: Symmetric encryption
Theaboveencryption techniques havethe limitation that for searching data from the file, the entire file
has to be decrypted. Fig. 4. It is a time consuming process and thus searchable encryption was introduced.
Searchable encryption allows build an index for file containing the keywords and is encrypted and stored
along with file, so that while searching the data only the keywords are decrypted rather than the entire file
and search is made on it. Everything based on cloud computing defined in confidentiality area.[5]
Fig. 4: Asymmetric encryption
5.2 Integrity
Anotherseriousproblemfacedbycloudcomputingis integrity. Integrity of data means to make sure that
data has not been changed by an unauthorized person or in an unauthorized way. It is a method for ensuring that
the data is real, accurate and safeguarded from unauthorized users. As cloud computing supports resource
sharing, there is a possibility of data being corrupted by unauthorized users. Digital Signatures can be used for
preserving integrity of data .Fig. 5. Integrity is very important point in cloud computing. The simple way for
providing integrity is using Message Authentication Code(MAC).[9]
Fig. 5: Remote auditing mechanism
5.3 Availability
Availabilityreferstobeingavailableandaccessibleto authorized users on demand. The aim of availability
inthecloudcomputingsystemsistoensurethatitsusers can use them at any place and at any time.[9]
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021)
F-87
www.viva-technology.org/New/IJRI
VI. CONCLUSION
Cloud computing enables users to store their data in remote storage location. But data security is
the major threat in cloud computing. Due to this many organizations are not willing to move into the cloud
environment. To overcome this, confidentiality, integrity, availability should be encapsulated in a CSP’s
Service- Level Agreement (SLA) to its customers. Otherwise ensure that any sensitive information is not put
into a public cloud and if any it is to be stored in the encrypted form. Effective auditing mechanisms also can be
used for providing data integrity. But there are other challenges cloud computing must overcome. People are
very skeptical about whether their data is secure and private. There are no standards or regulations worldwide
provided data through the cloud computing. Europe has data protection laws but the US, being one of the most
technological advance nation, does not have any data protection laws. Users also worry about who can disclose
their data and have ownership of their data. But once, there are standards and regulation worldwide, cloud
computing will revolutionize the future.
REFERENCES
[1] V.Nirmala, R.K.Sivanandhan, Dr.R.Shanmuga Lakshmi, “Data Confidentiality and Integrity Verification usingUser
Authenticator scheme in cloud”, Proceedings of 2013 International Conference on Green High Performance Computing
(ICGHPC 2013). March 14-15, 2013, India.
[2] Arjun Kumar, Byung Gook Lee, HoonJae Lee, Anu Kumari, “Secure Storage and Access of Data in Cloud Computing”, 2012
International Conference on ICT Convergence (ICTC),15-17 Oct. 2012.
[3] M.R.Tribhuwan, V.A.Bhuyar, Shabana Pirzade, “Ensuring Data Storage Security in Cloud Computing through Two-way
Handshake based on Token Management”, 2010 International Conference on Advances in Recent Technologies in
Communication and Computing.
[4] Mr. Prashant Rewagad, Ms.Yogita Pawar, “Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption
Algorithm to Enhance Data Security in Cloud Computing”, 2013 International Conference on Communication Systems and
Network Technologies.
UmaSomani,KanikaLakhani,ManishMundra, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the
Data Security of Cloud in Cloud Computing”, 1st International Conference on Parallel, Distributed and Grid Computing
(PDGC - 2010).
[5] M. AlZain, E. Pardede, B. Soh, and J. Thom, “Cloud computing security: From single to multi-clouds,” in System Science (HICSS),
2012 45th Hawaii International Conference on, Jan 2012, pp.5490–5499.
[6] M. Sookhak, H. Talebian, E. Ahmed, A. Gani, and M. K. Khan, “A review on remote data auditing in single cloud server:
Taxonomyand open issues,” Journal of Network and Computer Applications,vol.43,pp.121–141,2014.
[7] E. Aguiar, Y. Zhang, and M. Blanton, “An overviewofissuesandrecentdevelopmentsin cloudcomputingandstoragesecurity,”in
High PerformanceCloudAuditingandApplications. Springer, 2014, pp.3–33.
[8] I. Gul, M. Islam et al., “Cloud computing security auditing,” in Next Generation Information Technology (ICNIT), 2011 The 2nd
International Conference on. IEEE, 2011, pp. 143–148.
[9] E. M. Mohamed, H. S. Abdelkader, and S. El- Etriby, “Enhanced data security model for cloud computing,” in Informatics and
Systems (INFOS), 2012 8th International Conference on. IEEE, 2012, pp. CC–12.
[10] S. Ramgovind, M. M. Eloff, and E. Smith, “The management of security in cloud computing,” in Information Security for South
Africa (ISSA), 2010. IEEE,2010,pp. 1–7.
[11] F. Sabahi, “Cloud computing security threats and responses,” in Communication Software and Networks (ICCSN), 2011 IEEE
3rd International Conference on. IEEE, 2011, pp. 245–249.
[12] X. Wang, B. Wang, and J. Huang, “Cloud computing and its key techniques,” in Computer Science and Automation Engineering
(CSAE), 2011 IEEE International Conferenceon, vol. 2.IEEE, 2011,pp. 404–410
[13] Sultan Aldossary, William Allen, “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current
Solutions”, in International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 4, 2016
[14] Latifur Khan and Bhavani Thuraisingham, “Security Issues for Cloud Computing”, in Technical Report UTDCS-02-10,
February 2010.
[15] T. Sookhak, H. Talebian, E. Ahmed, A. Gani, and M. K. Khan, “A review on remote data auditing in single cloud server:
Taxonomyand open issues,” Journal of Network and Computer Applications,vol.43,pp.121–141,2014.

More Related Content

What's hot

Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...csandit
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
 
A220113
A220113A220113
A220113irjes
 
Migration of Virtual Machine to improve the Security in Cloud Computing
Migration of Virtual Machine to improve the Security in Cloud Computing Migration of Virtual Machine to improve the Security in Cloud Computing
Migration of Virtual Machine to improve the Security in Cloud Computing IJECEIAES
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Zuhair Haroon khan
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Editor IJARCET
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 

What's hot (19)

Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
Security and Privacy of Sensitive Data in Cloud Computing : A Survey of Recen...
 
G033030035
G033030035G033030035
G033030035
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
H046053944
H046053944H046053944
H046053944
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
A220113
A220113A220113
A220113
 
6 7
6 76 7
6 7
 
Migration of Virtual Machine to improve the Security in Cloud Computing
Migration of Virtual Machine to improve the Security in Cloud Computing Migration of Virtual Machine to improve the Security in Cloud Computing
Migration of Virtual Machine to improve the Security in Cloud Computing
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 

Similar to 176

Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms IJECEIAES
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspectseSAT Publishing House
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTUREcscpconf
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingIJERA Editor
 
Security Concerns in Cloud Computing
Security Concerns in Cloud ComputingSecurity Concerns in Cloud Computing
Security Concerns in Cloud Computingijtsrd
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  dannyijwest
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxssuserea0dfe
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 

Similar to 176 (20)

Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
C017421624
C017421624C017421624
C017421624
 
F017414853
F017414853F017414853
F017414853
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
Cloud computing and its security aspects
Cloud computing and its security aspectsCloud computing and its security aspects
Cloud computing and its security aspects
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
Information Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud ComputingInformation Leakage Prevention In Cloud Computing
Information Leakage Prevention In Cloud Computing
 
Security Concerns in Cloud Computing
Security Concerns in Cloud ComputingSecurity Concerns in Cloud Computing
Security Concerns in Cloud Computing
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
G0314043
G0314043G0314043
G0314043
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
B1802041217
B1802041217B1802041217
B1802041217
 
Splendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptxSplendens Project Proposal by Slidesgo.pptx
Splendens Project Proposal by Slidesgo.pptx
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 

More from vivatechijri

Understanding the Impact and Challenges of Corona Crisis on Education Sector...
Understanding the Impact and Challenges of Corona Crisis on  Education Sector...Understanding the Impact and Challenges of Corona Crisis on  Education Sector...
Understanding the Impact and Challenges of Corona Crisis on Education Sector...vivatechijri
 
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT  LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT vivatechijri
 
A study on solving Assignment Problem
A study on solving Assignment ProblemA study on solving Assignment Problem
A study on solving Assignment Problemvivatechijri
 
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...vivatechijri
 
Theoretical study of two dimensional Nano sheet for gas sensing application
Theoretical study of two dimensional Nano sheet for gas sensing  applicationTheoretical study of two dimensional Nano sheet for gas sensing  application
Theoretical study of two dimensional Nano sheet for gas sensing applicationvivatechijri
 
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOODMETHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOODvivatechijri
 
The Business Development Ethics
The Business Development EthicsThe Business Development Ethics
The Business Development Ethicsvivatechijri
 
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEAn Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEvivatechijri
 
Enhancing The Capability of Chatbots
Enhancing The Capability of ChatbotsEnhancing The Capability of Chatbots
Enhancing The Capability of Chatbotsvivatechijri
 
Smart Glasses Technology
Smart Glasses TechnologySmart Glasses Technology
Smart Glasses Technologyvivatechijri
 
Future Applications of Smart Iot Devices
Future Applications of Smart Iot DevicesFuture Applications of Smart Iot Devices
Future Applications of Smart Iot Devicesvivatechijri
 
Cross Platform Development Using Flutter
Cross Platform Development Using FlutterCross Platform Development Using Flutter
Cross Platform Development Using Fluttervivatechijri
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systemsvivatechijri
 
Light Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking TechnologyLight Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking Technologyvivatechijri
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacyvivatechijri
 
THE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCETHE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCEvivatechijri
 
Google File System
Google File SystemGoogle File System
Google File Systemvivatechijri
 
A Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain TechnologyA Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain Technologyvivatechijri
 

More from vivatechijri (20)

Understanding the Impact and Challenges of Corona Crisis on Education Sector...
Understanding the Impact and Challenges of Corona Crisis on  Education Sector...Understanding the Impact and Challenges of Corona Crisis on  Education Sector...
Understanding the Impact and Challenges of Corona Crisis on Education Sector...
 
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT  LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
 
A study on solving Assignment Problem
A study on solving Assignment ProblemA study on solving Assignment Problem
A study on solving Assignment Problem
 
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
 
Theoretical study of two dimensional Nano sheet for gas sensing application
Theoretical study of two dimensional Nano sheet for gas sensing  applicationTheoretical study of two dimensional Nano sheet for gas sensing  application
Theoretical study of two dimensional Nano sheet for gas sensing application
 
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOODMETHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
 
The Business Development Ethics
The Business Development EthicsThe Business Development Ethics
The Business Development Ethics
 
Digital Wellbeing
Digital WellbeingDigital Wellbeing
Digital Wellbeing
 
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEAn Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
 
Enhancing The Capability of Chatbots
Enhancing The Capability of ChatbotsEnhancing The Capability of Chatbots
Enhancing The Capability of Chatbots
 
Smart Glasses Technology
Smart Glasses TechnologySmart Glasses Technology
Smart Glasses Technology
 
Future Applications of Smart Iot Devices
Future Applications of Smart Iot DevicesFuture Applications of Smart Iot Devices
Future Applications of Smart Iot Devices
 
Cross Platform Development Using Flutter
Cross Platform Development Using FlutterCross Platform Development Using Flutter
Cross Platform Development Using Flutter
 
3D INTERNET
3D INTERNET3D INTERNET
3D INTERNET
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
 
Light Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking TechnologyLight Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking Technology
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
THE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCETHE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCE
 
Google File System
Google File SystemGoogle File System
Google File System
 
A Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain TechnologyA Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain Technology
 

Recently uploaded

Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
Industrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsIndustrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsAlirezaBagherian3
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 

Recently uploaded (20)

Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
Industrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsIndustrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal Compressors
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 

176

  • 1. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021) F-83 www.viva-technology.org/New/IJRI A Study of Data Storage Security Issues in Cloud Computing Tushar Bobade1, Chandani Patel2 1 (Department of MCA, Viva School Of MCA/ University of Mumbai, India) 2 (Department of MCA, Viva School Of MCA/ University of Mumbai, India) Abstract : Cloud computing provides on demand services to its clients. Data storage is among one of the primary services provided by cloud computing. Cloud service provider hosts the data of data owner on their server and user can access their data from these servers. As data, owners and servers are different identities, the paradigm of data storage brings up many security challenges. An independent mechanism is required to make sure that data is correctly hosted in to the cloud storage server. In this paper, we will discuss the different techniques that are used for secure data storage on cloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations. Keywords - Cloud computing, Cloud storage server, Data storage , Functional paradigm , Storage space. I. INTRODUCTION Cloud computing is the combination of many pre- existing technologies that have matured at different rates and in the different contexts. The goal of cloud computing is to allow users to take benefit of all these technologies. Many organizations are moving into cloud because it allows users to store their data on clouds and can access at anytime from anywhere. Data breaching is possible in cloud environment, since data from various users and business organizations lie together in cloud. By sending data to the cloud, the data owners transfer the control of their data to third person that may raise security problems. Sometimes the Cloud Service Provider(CSP) itself will use/corrupt the data illegally.Cloud storage is important aspect of today’s life.[3][5] Security and privacy stands as major obstacle on cloud computing i.e. preserving confidentiality, integrity and availability of data. A simple solution is to encrypt the data before uploading it onto cloud. This approach ensures that the data are not visibletoexternalusersandcloudadministratorsbut has the limitation that plain text based searching algorithm are not applicable. In this paper, we discuss the security flaws in data storage and mechanisms to overcomeit.[1][2] II. CLOUD STORAGE Cloud storage is one of primary use of cloud computing. We can define cloud storage as storage of the data online in the cloud. A cloud storage system is considered as a distributed data centres, which typically use cloud- computing technologies & offers some kind of interface for storing and accessing data. When storing data on cloud, it appears as if the data is stored in a particular place with specific name.[6] Thereare four main types of cloud storage:
  • 2. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021) F-84 www.viva-technology.org/New/IJRI 2.1 Personal CloudStorage: It is also known as mobile cloud storage. In this type storage, individual's data is stored in the cloud, and he/she may accessthedatafrom anywhere.[7] 2.2 Public Cloud Storage: In Public cloud storage the enterprise and storage service provider are separate and there aren't any cloud resources stored in the enterprise's data center. The cloud storage provider fully manages enterprise's public cloud storage.[7] 2.3 Private Cloud Storage: In Private Cloud Storage the enterprise and cloud storage provider are integrated in the enterprise's data center. In private cloud storage, the storage provider has infrastructure in enterprise's data center that is typically managed by the storage provider. Private cloud storage helps resolve the potential for security and performance concerns while still offering the advantages of cloud storage.[7] 2.4 Hybrid cloud storage: It is a combination of public and private cloud storage where some critical data resides in the enterprise's private cloud while other data isstored andaccessiblefromapubliccloudstorageprovider.[7] III. CHARACTERISTICS OF CLOUD COMPUTING There are five characteristics of cloud computing. The first one is on-demand self-service, where a consumer of services is provided the needed resources without human intervention and interaction with cloud provider. The second characteristic is broad network access, which means resources can accessed from anywhere through a standard mechanism by thin or thick client platforms such mobile phone, laptop, and desktop computer. Resource pooling is another characteristic, which means resources are pooled in order for multi- tenants to share the resources. In the multi-tenant model, resources are assigned dynamically to a consumer and after consumer finishes it, it can be assigned to another one to respond to high resource demand. Fig.1. Even if the resources are assigned to customers on demand, they do not know the location of these assigned resources. Following figures will show the characteristics of cloud computing .[8][10] Fig. 1: Cloud environment architecture Sometimes they know the location at a high-level abstraction, such as country, state, and data centre. Storage, processing, memory, and network are the kind of resources are assigned. Rapid elasticity is another characteristic, which means thatresources are dynamically increased when needed and decreased when there is no need. Also, one of characteristics that a consumer needs is measured service in order to know how much is consumed.[1] IV. ENCRYPTED DATA STORAGE FOR CLOUD Since data in the cloud is placed anywhere, it is important that data be encrypted. We are using secure co-processor as part of the cloud infrastructure to enable efficient encrypted storage of sensitive data. By
  • 3. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021) F-85 www.viva-technology.org/New/IJRI embedding a secure co-processor (SCP) into cloud infrastructure, the system can handle encrypted data efficiently. Parts of the proposed instrument (see Figure 2). Basically, SCP is tamper-resistant hardware capable of limited general-purpose computation. For example, IBM 4758 Cryptographic Coprocessor (IBM) is a single- board computer consisting of a CPU, memory and special-purpose cryptographic hardware contained in a tamper-resistant shell, certified to level 4 under FIPS PUB 140-1.[14] When installed on the server, it is capable of performing local computations that completely hidden from the server. If tampering is detected, then secure co-processor clears the internal memory. Since the secure coprocessor is tamper-resistant, one could be tempted to run entire sensitive data storage server on the secure coprocessor. Pushing the entire data storage functionality into a secure co-processor is not feasible due to many reasons. First of all, due to tamper-resistant shell, secure co-processors have usually limited memory (only a few megabytes of RAM and a few kilobytes of non-volatile memory) and computational power (Smith, 1999). Performance will improve over time, but problems such as heat dissipation/power (which must be controlled to avoid disclosing processing) will force a gap between general purposes and secure computing. Another issue is that software running on the SCP must be totally trusted and verified. This security requirement implies that software running on the SCP should be kept as simple as possible. We can encrypt the sensitive data sets using random private keys and to alleviate risk of key disclosure, we can use tamper-resistant hardware to store some of encryption/decryption keys (i.e., a master key that encrypts all other keys).[13][11]. It is basically very important to encrypt the data in cloud storage. Fig.2. Fig. 2: Parts of the proposed instrument V. SECURITY AND PRIVATE ISSUES IN DATA STORAGE Cloud Computing allows the users to store their data on storage location maintained by a third party. Once the data is uploaded into cloud, the user loses its control over the data and the attackers can tamper the data. The attacker may be an internal (CSP) or external. Unauthorized access is also a common practice due to weak access control. The protection of information arises the following challenges: The security and privacy issues related to data storage are confidentiality, integrity and availability. [2] This changes are important to tackle the security issues in cloud computing. 5.1 Confidentiality The major dispute in cloud computing is confidentiality. Data confidentiality means accessing data only by authorized users and is strongly related to authentication. In another way, confidentiality means keeping users data secret in the cloud systems. As we are storing the data on a remote server and transferring control over the data to theproviderherearisesthequestions suchas: For ensuring confidentiality, cryptographic encryption algorithms and strong authentication mechanisms can be used. Encryption is the process of converting data into a form called cipher text that can be understood only by authorized users. Fig.3. Encryption is an efficient technique for protecting the data but have the obstacle that data will be lost once the encryption key is stealed. algorithms. Blowfish is a fat and simple encryption algorithm. Formally the algorithm is based n confidentiality.[13]
  • 4. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021) F-86 www.viva-technology.org/New/IJRI Fig. 3: Symmetric encryption Theaboveencryption techniques havethe limitation that for searching data from the file, the entire file has to be decrypted. Fig. 4. It is a time consuming process and thus searchable encryption was introduced. Searchable encryption allows build an index for file containing the keywords and is encrypted and stored along with file, so that while searching the data only the keywords are decrypted rather than the entire file and search is made on it. Everything based on cloud computing defined in confidentiality area.[5] Fig. 4: Asymmetric encryption 5.2 Integrity Anotherseriousproblemfacedbycloudcomputingis integrity. Integrity of data means to make sure that data has not been changed by an unauthorized person or in an unauthorized way. It is a method for ensuring that the data is real, accurate and safeguarded from unauthorized users. As cloud computing supports resource sharing, there is a possibility of data being corrupted by unauthorized users. Digital Signatures can be used for preserving integrity of data .Fig. 5. Integrity is very important point in cloud computing. The simple way for providing integrity is using Message Authentication Code(MAC).[9] Fig. 5: Remote auditing mechanism 5.3 Availability Availabilityreferstobeingavailableandaccessibleto authorized users on demand. The aim of availability inthecloudcomputingsystemsistoensurethatitsusers can use them at any place and at any time.[9]
  • 5. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021) F-87 www.viva-technology.org/New/IJRI VI. CONCLUSION Cloud computing enables users to store their data in remote storage location. But data security is the major threat in cloud computing. Due to this many organizations are not willing to move into the cloud environment. To overcome this, confidentiality, integrity, availability should be encapsulated in a CSP’s Service- Level Agreement (SLA) to its customers. Otherwise ensure that any sensitive information is not put into a public cloud and if any it is to be stored in the encrypted form. Effective auditing mechanisms also can be used for providing data integrity. But there are other challenges cloud computing must overcome. People are very skeptical about whether their data is secure and private. There are no standards or regulations worldwide provided data through the cloud computing. Europe has data protection laws but the US, being one of the most technological advance nation, does not have any data protection laws. Users also worry about who can disclose their data and have ownership of their data. But once, there are standards and regulation worldwide, cloud computing will revolutionize the future. REFERENCES [1] V.Nirmala, R.K.Sivanandhan, Dr.R.Shanmuga Lakshmi, “Data Confidentiality and Integrity Verification usingUser Authenticator scheme in cloud”, Proceedings of 2013 International Conference on Green High Performance Computing (ICGHPC 2013). March 14-15, 2013, India. [2] Arjun Kumar, Byung Gook Lee, HoonJae Lee, Anu Kumari, “Secure Storage and Access of Data in Cloud Computing”, 2012 International Conference on ICT Convergence (ICTC),15-17 Oct. 2012. [3] M.R.Tribhuwan, V.A.Bhuyar, Shabana Pirzade, “Ensuring Data Storage Security in Cloud Computing through Two-way Handshake based on Token Management”, 2010 International Conference on Advances in Recent Technologies in Communication and Computing. [4] Mr. Prashant Rewagad, Ms.Yogita Pawar, “Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing”, 2013 International Conference on Communication Systems and Network Technologies. UmaSomani,KanikaLakhani,ManishMundra, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010). [5] M. AlZain, E. Pardede, B. Soh, and J. Thom, “Cloud computing security: From single to multi-clouds,” in System Science (HICSS), 2012 45th Hawaii International Conference on, Jan 2012, pp.5490–5499. [6] M. Sookhak, H. Talebian, E. Ahmed, A. Gani, and M. K. Khan, “A review on remote data auditing in single cloud server: Taxonomyand open issues,” Journal of Network and Computer Applications,vol.43,pp.121–141,2014. [7] E. Aguiar, Y. Zhang, and M. Blanton, “An overviewofissuesandrecentdevelopmentsin cloudcomputingandstoragesecurity,”in High PerformanceCloudAuditingandApplications. Springer, 2014, pp.3–33. [8] I. Gul, M. Islam et al., “Cloud computing security auditing,” in Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on. IEEE, 2011, pp. 143–148. [9] E. M. Mohamed, H. S. Abdelkader, and S. El- Etriby, “Enhanced data security model for cloud computing,” in Informatics and Systems (INFOS), 2012 8th International Conference on. IEEE, 2012, pp. CC–12. [10] S. Ramgovind, M. M. Eloff, and E. Smith, “The management of security in cloud computing,” in Information Security for South Africa (ISSA), 2010. IEEE,2010,pp. 1–7. [11] F. Sabahi, “Cloud computing security threats and responses,” in Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. IEEE, 2011, pp. 245–249. [12] X. Wang, B. Wang, and J. Huang, “Cloud computing and its key techniques,” in Computer Science and Automation Engineering (CSAE), 2011 IEEE International Conferenceon, vol. 2.IEEE, 2011,pp. 404–410 [13] Sultan Aldossary, William Allen, “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions”, in International Journal of Advanced Computer Science and Applications, Vol. 7, No. 4, 2016 [14] Latifur Khan and Bhavani Thuraisingham, “Security Issues for Cloud Computing”, in Technical Report UTDCS-02-10, February 2010. [15] T. Sookhak, H. Talebian, E. Ahmed, A. Gani, and M. K. Khan, “A review on remote data auditing in single cloud server: Taxonomyand open issues,” Journal of Network and Computer Applications,vol.43,pp.121–141,2014.