Sunteți pe pagina 1din 3

Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No.

2, April 2019 5

A Study of Data Storage Security Issues in Cloud


Computing
P. Sabarisha Malathi* and Dr.D. Vanathi

Abstract--- Cloud computing provides on demand services


to its purchasers. Knowledge storage is among one in every of II. CLOUD STORAGE
the first services provided by cloud computing. Cloud service Cloud storage is one amongst the first use of cloud
supplier hosts the information of knowledge owner on their computing. we will outline cloud storage as storage of the in
server and user will access their data from these servers. As foon-line within the cloud. A cloud storage system is taken
data, homeowners and servers are completely different into account as a distributed information centres, which
identities, the paradigm of knowledge storage brings up generally use cloud-computing technologies and offers some
several security challenges. Associate in Nursing freelance quite interface for storing and accessing information. once
mechanism is needed to form certain that knowledge is storing information on cloud, it seems as if the info is hold on
properly hosted in to the cloud storage server. During this in an exceedingly explicit place with specific name.
paper, we are going to discuss the various techniques that are There are four main forms of cloud storage:
used for secure knowledge storage on cloud. Personal Cloud Storage: It is conjointly called mobile cloud
Keywords--- Cloud Computing, Knowledge Storage, Cloud storage. during this sort storage, individual's knowledge is
Storage Server. keep within the cloud, and he/she might access the info from
anyplace.
I. INTRODUCTION Public Cloud Storage
In Public cloud storage the enterprise and storage service
C LOUD computing is that the combination of the many
antecedent technologies that have matured at different
rates and in numerous contexts. The goal of cloud computing
supplier are separate and there aren't any cloud resources keep
within the enterprise's information centre. The cloud storage
is to permit users to require get pleasure from of these supplier absolutely manages the enterprise's public cloud
technologies. several organizations are going in cloud as a storage.
result of it permits the users to store their knowledge on clouds Private Cloud Storage
and may access at anytime from anyplace. Knowledge
breaching is feasible in cloud surroundings, since knowledge In Private Cloud Storage the enterprise and cloud storage
from varied users and business organizations lie along in supplier are integrated within the enterprise's knowledge
cloud. By causing the information to the cloud, the information centre. in camera cloud storage, the storage supplier has
home owners transfer the management of their data to a infrastructure within the enterprise's knowledge centre that's
3rdindividual that could raise security issues. Generally the sometimes managed by the storage provider. personal cloud
Cloud Service Provider (CSP) itself can use/corrupt the storage helps resolve the potential for security and
information illicitly. performance considerations whereas still giving the benefits of
cloud storage.
Security and privacy stands as major obstacle on cloud
computing i.e. protective confidentiality, integrity and Hybrid cloud storage
accessibility of information. a straight forward answer is to It is a mix of public and personal cloud storage wherever
encode the information before uploading it onto the cloud. some vital knowledge resides within the enterprise's private
This approach ensures that was the information don't seem to cloud whereas different data is hold on and accessible from a
be visible to external users and cloud directors how ever has public cloud storage supplier.
the limitation that plain text primarily based looking
algorithmic program aren’t applicable. during this paper, we III. CHARACTERISTIC OF CLOUD COMPUTING
tend to discuss the safety flaws in information storage and There are 5 characteristics of cloud computing. the primary
therefore the mechanisms to beat it. one is on-demand self-service, wherever a shopper of services
is provided the required resources while not human
intervention and interaction with cloud supplier. The second
characteristic is broad network access, which implies resources
will be accessed from anyplace through a typical mechanism
P. Sabarisha Malathi*, PG Scholar, Department of CSE, Nandha
Engineering College (Autonomous), Erode, India. by skinny or thick shopper platforms such itinerant, laptop, and
E-mail: sabarishapatt1713@gmail.com microcomputer. Resource pooling is another characteristic,
Dr.D. Vanathi, Associate Professor, Department of CSE, Nandha which implies the resources are pooled so as for multitenant to
Engineering College (Autonomous), Erode, India. share the resources. within the multi-tenant model, resources
E-mail: vanathi.p@nandhaengg.org
DOI:10.9756/BIJSESC.9012 are allotted dynamically to a consumer and when the patron

ISSN 2277-5099 | © 2019 Bonfring


Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 2, April 2019 6

finishes it, it will be allotted to a different one to reply to high use (which should be controlled to avoid revealing processing)
resource demand. can force a niche between general functions and secure
computing. Another issue is that the software system running
Whether or not the resources are allotted to customers on
demand, they are doing not understand the situation of those on the SCP should be whole sure and verified. This security
allotted resources. demand implies that the software system running on the SCP
ought to be unbroken as straightforward as potential. we will
write in code the sensitive information sets victimisation
random personal keys and to alleviate the chance of key
revealing, we will use tamper-resistant hardware to store a
number of the encryption/decryption keys (i.e., a master that
encrypts all alternative keys).

Figure 1: Cloud Environment Architecture


Sometimes they understand the situation at a high-level
abstraction, like country, state, and knowledge centre. Storage, Figure 2: Parts of the Proposed Instrument
processing, memory, and network are the type of resources that
are appointed. fast snap is another characteristic, which implies V. SECURITY AND PRIVACY ISSUES IN DATA STORAGE
that resources are dynamically magnified once required and Cloud Computing permits the users to store their
attenuate when there's no want. Also, one among knowledge on the storage location maintained by a 3rd party.
characteristics that a shopper desires is measured service so as Once the information is uploaded into the cloud the user loses
to understand what proportion is consumed. its management over the data and therefore the data may be
tampered by the attackers. The assailant is also Associate in
IV. ENCRYPTED DATA STORAGE FOR CLOUD Nursing internal(CSP) or external. Unauthorized access is
Since knowledge within the cloud is placed anyplace, it’s additionally typical observe thanks to weak access
necessary that the information be encrypted. we tend to are management. The protection of data arises the subsequent
victimization secure co-processor as a part of the cloud challenges:
infrastructure to alter economical encrypted storage of The security and privacy problems associated with knowledge
sensitive knowledge. By embedding a secure co-processor storage are confidentiality, integrity and convenience.
(SCP) into the cloud infrastructure, the system will handle Confidentiality
encrypted knowledge with efficiency. elements of the planned
instrument (see Figure 2). Basically, SCP could be a tamper- The major dispute in cloud computing is confidentiality.
resistant hardware capable of restricted all-purpose information confidentiality means that accessing the
computation. for instance, IBM 4758 science Coprocessor information solely by licensed users and is powerfully
(IBM) could be a single board laptop consisting of a central associated with authentication. In a different way
processor, memory and special-purpose science hardware confidentiality means that keeping users information secret
contained in a very tamper-resistant shell, certified to level within the cloud systems. As we have a tendency to are storing
furbelow FIPS pothouse 140-1. once put in on the server, it's the information on a distant server and transferring the
capable of performing arts native computations that are utterly management over the data to the supplier here arises the
hidden from the server. If meddling is detected, then the secure queries such as:
co-processor clears the inner memory. Since the secure For making certain confidentiality, cryptologic
coprocessor is tamper-resistant, one might be tempted to run cryptography algorithms and powerful authentication
the complete sensitive knowledge storage server on the secure mechanisms are often used. Crypto graphyis that the method of
coprocessor. Pushing the complete knowledge storage changing the info into a type referred to as cipher text that may
practicality into a secure co-processor is not feasible due to be understood solely by the licensed users. cryptography is
many reasons.1st of all, because of the tamper-resistant shell, associate degree economical technique for shielding the info
secure co-processors have sometimes restricted memory (only however have the obstacle that data are lost once the
some megabytes of RAM and a few kilobytes of non-volatile encryption secret's algorithms. Blowfish could be a fat and
memory) and process power (Smith, 1999). Performance can easy cryptography rule.
improve over time, however issues like heat dissipation/power

ISSN 2277-5099 | © 2019 Bonfring


Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 2, April 2019 7

VI. CONCLUSION
Cloud computing allows users to store their information in
remote storage location. However information security is that
the major threat in cloud computing. Thanks to this several
organizations aren't willing to manoeuvre into cloud
environment. To overcome this, confidentiality, integrity,
accessibility ought to be encapsulated in a very CSP’s Service-
Level Agreement (SLA) to its customers. Otherwise make sure
that any sensitive data isn't place into a public cloud and if any
it's to be hold on in encrypted kind. Effective auditing
mechanisms can also be used for providing information
integrity.
Figure 3: Symmetric encryption
The on top of secret writing techniques have the limitation REFERENCES
that for looking the info from the file, the whole file should be [1] V. Nirmala, R.K. Sivanandhan and Dr.R. Shanmuga Lakshmi, “Data
decrypted. it's a time overwhelming method and therefore Confidentiality and Integrity Verification using User Authenticator
searchable secret writing was introduced. Searchable secret scheme in cloud”, International Conference on Green High Performance
Computing (ICGHPC 2013), Pp. 1-5, 2013.
writing permits build Associate in Nursing index for the file [2] Kumar, B. Gook Lee, H.J. Lee and A. Kumari, “Secure Storage and
containing the keywords and is encrypted and keep together Access of Data in Cloud Computing”, International Conference on ICT
with the file, in order that where as looking the info solely the Convergence (ICTC), Pp. 336-339, 2012.
keywords are decrypted instead of the whole file and search is [3] M.R. Tribhuwan, V.A. Bhuyar and S. Pirzade, “Ensuring Data Storage
Security in Cloud Computing through Two-way Handshake based on
formed thereon. Token Management”, International Conference on Advances in Recent
Technologies in Communication and Computing, Pp. 386-389, 2010.
[4] Prashant Rewagad, Ms.Yogita Pawar, “Use of Digital Signature with
Diffie Hellman Key Exchange and AES Encryption Algorithm to
Enhance Data Security in Cloud Computing”, International Conference
on Communication Systems and Network Technologies, Pp. 437-439,
2013.
[5] U. Somani, K. Lakhani and M. Mundra, “Implementing Digital Signature
with RSA Encryption Algorithm to Enhance the Data Security of Cloud
Figure 4: Asymmetric encryption in Cloud Computing”, 1st International Conference on Parallel,
Distributed and Grid Computing (PDGC), Pp. 211-216, 2010.
Integrity [6] M. AlZain, E. Pardede, B. Soh and J. Thom, “Cloud computing security:
From single to multi-clouds,” 45th Hawaii International Conference on In
Another major problem faced by cloud computing is System Science (HICSS), Pp. 5490–5499, 2012.
integrity. Integrity of information means that to form certain [7] M. Sookhak, H. Talebian, E. Ahmed, A. Gani and M. K. Khan, “A
that the info has not been modified by Associate in Nursing review on remote data auditing in single cloud server: Taxonomy and
unauthorized person or in an unauthorized means. it's a open issues”, Journal of Network and Computer Applications, Vol. 43,
Pp. 121–141, 2014.
technique for making certain that the info is real, correct and [8] E. Aguiar, Y. Zhang and M. Blanton, “An overview of issues and recent
safeguarded from unauthorized users. As cloud computing developments in cloud computing and storage security”, In High
supports resource sharing, there's an opening of information Performance Cloud Auditing and Applications. Springer, Pp. 3–33, 2014.
being corrupted by unauthorized users. Digital Signatures may [9] Gul and M. Islam, “Cloud computing security auditing”, In 2nd
International Conference on Next Generation Information Technology
be used for protective the integrity of information. the straight (ICNIT), Pp. 143–148, 2011.
forward means for providing integrity is mistreatment Message [10] E.M. Mohamed, H.S. Abdelkader and S. ElEtriby, “Enhanced data
Authentication Code(MAC). security model for cloud computing”, IEEE 8th International Conference
on in Informatics and Systems (INFOS), Pp. CC–12, 2012.
[11] S. Ramgovind, M.M. Eloff and E. Smith, “The management of security
in cloud computing”, IEEE In Information Security for South Africa
(ISSA), Pp. 1–7, 2010.
[12] F. Sabahi, “Cloud computing security threats and responses”, IEEE 3rd
International Conference on In Communication Software and Networks
(ICCSN), Pp. 245–249, 2011.
[13] X. Wang, B. Wang and J. Huang, “Cloud computing and its key
techniques”, IEEE International Conference on Computer Science and
Automation Engineering (CSAE), Vol. 2, Pp. 404–410, 2011.
[14] [14] S. Aldossary and W. Allen, “Data Security, Privacy, Availability
and Integrity in Cloud Computing: Issues and Current Solutions”, In
Figure 5: Remote auditing mechanism International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 4, 2016.
Availability [15] Latifur Khan and Bhavani Thuraisingham, “Security Issues for Cloud
Computing”, International Journal of Information Security and Privacy
Availability refers to being obtainable and accessible to (IJISP), Vol. 4, No. 2, Pp. 36-48, 2010.
approved users on demand. The aim of availableness in cloud
computing systems is to make sure that its users will use them
at anyplace and at any time

ISSN 2277-5099 | © 2019 Bonfring

S-ar putea să vă placă și