Home > Computer science essays > Cloud computing, cloud storage

Essay: Cloud computing, cloud storage

Essay details and download:

  • Subject area(s): Computer science essays
  • Reading time: 10 minutes
  • Price: Free download
  • Published: 27 July 2024*
  • Last Modified: 27 July 2024
  • File format: Text
  • Words: 2,943 (approx)
  • Number of pages: 12 (approx)
  • Tags: Cloud Computing essays

Text preview of this essay:

This page of the essay has 2,943 words.

LITERATURE SURVEY
For through development of the system, it is needed to go through each and every technical aspect related to it. This chapter provides an introduction to area of research. It describes the survey done with respect to security and privacy in cloud computing.
2.1 Introduction to cloud computing
Cloud computing can be listed as one among the most influential innovations in information technology in present years. Along with resource virtualization, cloud will be capable to deliver computing resources and even services in pay-as-you-go mode. These computing services will be listed under Infra-structure-as-a-service (Iaas), Platform-as-a-service (Paas) and software-as-a-service (SaaS).
The officially display information examining plans come with number of properties, potential risks and inefficiency like security risks in authorized auditing requests and futher there still inefficiency exits in the activity of processing of small updates. In this technical paper, we turn our focus on better support for tiny dynamic updates, which futher benefits the scalability and efficiency of a cloud storage server. In order to attain this, Our scheme employs a flexible data segmentation strategy and also ranked merkle hash tree(RMHT). By the time, we shall throw an effort to provide a solution for potential security problem in supporting public verifiability further to raise the sheme efficiency to further more level of secure and robust, which can be achieved by addition of an additional authorization process within the three participating parties of client, CSS and third-party auditor(TPA). The notable contributions of this technically proposed paper can be summarized as follows:
‘ For the first time, on a formality role we analyze different varieties of fine-grained dynamic data update request on variable-sized file blocks in a single dataset. Considering from the best of our knowledge, we are the first to be listed out in representing a public auditing scheme that is based on BLS signature and Merkle hash tree(MHT) which holds the capability to support fine-grained update requests. On a comparison with existing schemes, the scheme presented from our ends supports updates with a size that is not restricted by the size of file blocks, hence provides extra flexibility and scalability compared to existing schemes.
‘ For better improvement on security, our proposed scheme incorporates an extra authorization process that holds the aim to eliminate threats of unauthorized audit challenges from malicious or pretended third-party auditor, which we name them as ‘authorized auditing’.
‘ We complete an investigation in request to enhance the productivity in checking successive little overhauls which exist in numerous prominent cloud and enormous information setting, for example, online networking. Likewise, we propose a further improvement for our plan to make it more suitable for this circumstance than existing plans. Contrasted with existing plans, both hypothetical examination and exploratory results show that our altered plan can altogether lower communication overheads.
Among the most remarkable issues identified with cloud is data security/privacy. It has been one of the most frequently raised concerns. There is a lot of work trying to enhance cloud data security/privacy with technological approaches on CSP side.
D.Zissis Secure overlay cloud storage with Access Control and Assure Deletion Mar.2011 IEEE Transactions
The notable point in proposed system is that user out sourced data backups off site to third party cloud storage services in order to bring the graph of data management costs. The user must facilitate with security guarantees for the data outsourced by user, which is now under the maintainace of third parties. A design and implement FADE, and secure overlay cloud storage system that achieves fine-grained, policy-based access control and file assured deletion. It associates out sourced files with file access policies, and assuredly deletes file to make them unrecoverable to anyone upon revocations of file access policies. To achieve such security goals, FADE is built upon a set of cryptographic key operations that are self-maintained by a Quorum of key managers that are independent of third-party clouds. In particular, FADE acts as an overlay system that works seamlessly tops today’s cloud storage services. Cloud storage is new business for remote backups outsourcing, as it offers an abstraction of infinite storage space for clients to host data backups in pay-as-you go manner. The imagination level assume that more people will follow utilizing the applications like Drop box for the transfer of audio/videos which has typically limited storage resources.
Related work on cloud security and Access Control
New business solution for the purpose remote backup out sourcing by name cloud storage has been defined, as it comes with features like abstraction of infinite storage space for clients to host data backups in pay-as-you-go manner. One among the current methodologies is time based file guaranteed deletion. Time ‘based record granted erasure, implies that records can be erased without a doubt and stays unavailable on a lasting premise after a predefined span. The principle thought is that a document is scrambled with an information key by the proprietor of the record, and this information key is further encode with a control key by different key administrator that is in charge of cryptographic key administrator. The control key is time based, implies it will be totally uprooted by the key administrator after reaching the termination, where the close time is indicated then the document is initially announced.
S.E SCHMIDT, ADDRESSING SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING March 25 2013 IEEE Transaction
The above mentioned technical and pricing opportunities which is new holds the ability to change the style of the business operated. It fuses the properties of the traditional computing technology such as grid, parallel and distributed computing and so on. Here the main purpose of the cloud computing s to come up with high performance computing system for the customers facilitating the low cost without depending on the own infrastructure.
The cloud present the various level of services, which are offered via the internet, there is a good deal of uncertainty about security and privacy at various level are arises.
Security Threats and challenges In cloud
Network Level: The security system level, on a compulsory part we ought to separate in the middle of open and private mists. As private cloud foundation goes inside the association limits, the client has more control over the cloud framework. This demonstrates that there is no space for new assaults or vulnerabilities in private cloud. Any ways, in general society cloud environment guaranteeing fitting access control, guaranteeing classified and respectability of the client’s information in travel, guaranteeing accessibility of web assists are the urgent component that must be looked into guarantee the system level security.
Host level: Threats pertaining to cloud computing at the host level are directly related to virtualization vulnerabilities such as VM escape, threats to hypervisor due to weak access control caused in public cloud environment.
Iaas Host level security
The accompanying are the host level security issues identified with Iaas.
‘ Hyper version security dangers: Hypervisor can be characterized as a programming which empowers the virtualization. The most vital thing in broad daylight cloud environment is to guarantee the respectability and accessibility of the hypervisor all through its whole life cycle. It is feasible for ‘zero-day weakness’ in VM if the aggressor controls the hypervisor.
‘ Edge security issue: In a distributed computing model, to give border security like firewall in a virtual domain can be said as intricate movement than in an ordinary system in the light of the fact that a percentage of the virtual server may speak to outside a firewall. This will be the obligation of the administration supplier. Despite the fact that the cloud host is considered within the edge go, the aggressor inside the border may hack the frame work.
‘ Virtual machine security: Iaas clients have complete access to the virtualized visitor VMs which are facilitated and separated by hypervisor programming. Along these lines the Iaas client are considered for security administration of the visitor VM. Cloud administration supplier starts the client to utilize SSH private Keys that are used to get to and oversee virtual occasion. Further this can be killed by putting away the private keys on the framework in a scrambled structure.
Privacy ConvernIn cloud
There are some consideration with respect to privacy in cloud are storage, retention destruction, regulatory compliance, auditing and monitoring and privacy breaches.
‘ Storage: To distinguish where the clients information is put away and in which area information centers taking rest are made obscure from the client. At times the client’s data which is considered as delicate may be exchange to other nation without their insight, put the lawful issues on the grounds that every nation security laws will vary from others.
‘ Maintenance: The clients touchy information once moved to cloud, the inquiry emerges that to what extent that dwells in the cloud, what sort maintenance arrangements is used to deal with that information and who actualize this approach in the cloud.
‘ Destruction: Soon after the retention period, the user personal information must be deleted from the provider storage. If multiple copies are maintained to make sure the availability of the data that replicated copies should be removed from the respective server. A major concern comes into picture when the organization need to ensure all these things is performed correctly.
‘ Administrative consistence: the consumer ought to need to know security agreeability necessity in the cloud and why should mindful dealing with this agreeability ad how existing agreeability prerequisite affected by moving to the cloud.
These are the real protection worry that the customer can thing about it before moving to cloud. The buyer ought to peruse the term of administration and protection approach altogether before they put their touchy information to cloud and they ought to attempt to abstain from putting the data that ought to be avoided private prosecute.
Current Security solution in cloud
Many research works concentrated over providing solutions in order to overcome the various security issues discussed in the cloud computing context. Further to address the cloud strand issues, several cloud organizations join their hands together in addition to maintain a standard of common platform that make sure the interoperability of various cloud provider services. The cloud standard coordination is a Wikipedia that comprises details of several cloud standard organization. It provide a gateway to various standard organizations to put for the ideas from their end. Cloud security alliance(CSA) is a forum which encourages the series of the best practices to ensure the security in cloud computing. Several best practices it supports are CSA controls Matrix, Security Guidance focus on critical areas of cloud computing, Cloud Audit, Cloud Data governance and cloud Trust Protocol. Cache hierarchy aware approach is easy to implement than page coloring approach. However the processor resources efficiently utilized only in pages coloring approach. When the search keyword is not exactly matched with the files, the closest possible matches will be retrieved.
Platform resources are under-utilized in cache hierarchy aware approach in case if VM uses fewer cores than total number cores assigned to its group. The method only supports the single keyword search. Conjunction of keyword search and sequence of keyword are yet to be developed.
C.WANG,Q.WANG PRIVACY- PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE 30st IEEE CONF. ON COMPUTING 2010
By embracing Cloud storage, Clients will be Furnished with an office to remotely store their information and appreciate the on-interest top notch applications and administrations from a mutual pool of configurable processing assets, without the word load related to nearby information stock piling and upkeep. Anyways, the fact that user no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task, mainly for user along with constrained computing resource.
Furthermore, user must be capable enough to use the cloud storage as if it is local, by avoiding the tension about the need of verifying its integrity. Therefore, enabling public audit ability for cloud storage is of critical importance is that user will be able to resort to a third party auditor(TPA) further to check the integrity of outsourced data and be worry-free. Further to introduce an effective TPA, the auditing process must bring in on new vulnerabilities heading towards user data privacy, and should not come up with additional online burden provided to user. In this paper, we put forth a secure cloud storage system that holds the capability to support privacy-preserving public auditing.
MAC-based solution there is two fruit full gateways to utilize MAC in order to authenticate the data. One of the trivial gateway is just uploading the data blocks with their MACs to server, and sends the particular mystery key to the TPA. Next, the TPA can arbitrarily recover hinder with the MACs and check the rate of accuracy by means of sk. apart from the high (linear in the sampled data size)communication and computation complexities, the TPA need the learning of information pieces with the end goal of verification.
HAL-based solution. To give the backing efficiency, public audit ability without needing to recover the information squares themselves, we can employ the HLA Strategy . HLAs, like MACs, are likewise noted down under the rundown of some unforgivable verification metadata that confirm the integrity of a data block. The only difference is that HLAs can be aggregated. Further it is flexible enough to compute an aggregated HLA which authenticates a linear combination of the individual data blocks.
Privacy ‘preserving public auditing scheme
Achieve privacy-preserving auditing, we put forth a uniquely integrated homomorphic liner authenticator along with random masking technique. In our protocol, the linear combination of sampled blocks in the server’s response is masked with randomness generated the server. With irregular covering, the TPA doesn’t accompany stamina to hold the vital data to assemble a right gathering of straight mathematical statements and further cant infer the client’s information content, regardless of what number of direct mixes of the same arrangement of file squares can be gathered. On the opposite side of a coin, the accuracy acceptance of the square authenticator sets can in any case be completed in a new style which will be demonstrated in the blink of an eye, even in the vicinity of the irregularity. Our configuration makes utilization of an open key based HLA, to furnish the examining convention with open audit ability.
REMOTE DATA CHECKING USING PROVABLE DATA POSSESSION
We present a model for provable data possession(PDP) which will be utilized to check remote information. A customer that has kept information in an untrusted server and further can confirm that the server has the first information without recovering it. The model can promptly create probabilistic confirmations of ownership by inspecting arbitrary arrangements of square from the end of server, which altogether brings the I/O costs.The client tries to maintain a constant amount of metadata for verification of the proof. The challenge/response protocol transmits a small, constant amount of data, which reduces network communication. Therefore, the PDP model for the purpose of remote data checking can be mentioned as lightweight and it further supports larger data sets in distributed storage system. This model is also robust, in that we employ mechanism for mitigating arbitrary amounts of data corruption. We put provably-secure PDP schemes that can be said as more efficient one than solutions. More particularly, the overhead at the server is low(or even consistent), instead of straight in the span of the information. Moreover, we speak to a bland change that adds vigor to any remote information checking plan taking into account spot checking.
COOPERATIVE SCHEDULE DATA POSSESSION FOR INTEGRITY VERIFICATION IN MULTI-CLOUD STORAGE
Provable data possession (PDP) is a technique employed to ensure the integrity of data in storage outsourcing. In this specialized paper, we address the development of a productive PDP plan for appropriated distributed storage to backing the versatility of administration and information relocation, in which we consider the presence of various cloud administration suppliers to store and keep up the customer’s information. We set forth a plan by name agreeable PDP (CPCP) that is taking into account homomorphic certain reaction and hash file pecking order. Further, in light of multi-demonstrate zero-learning confirmation framework we give the verification of security capacity of our plan, which can meet culmination, information soundness and zero-learning properties. Besides, we speak to a strategy that is sufficiently proficient to settle on a decision inside ideal parameter qualities to bring down the reckoning expenses of customer and stockpiling administration suppliers.
Cloud services are climbing the ladder of faster profit growth point along with a comparably low cost, scalable, position-independent platform for clients data. It comes from the base of an open architectures and interfaces, which is capable enough to incorporate multiple internal and /or external cloud services together on order to provide high interoperability. Such distributed cloud environment we assign a name as multi-cloud allows clients to easily access hi /her resource remotely through with tools and technologies for multi-cloud, like platform VM Orchestrator, VMware V sphere.
To avail the availability status of integrity of outsourced data in cloud storages, researchers have come up with two different and basics approach named as provable Data possession and proofs of retrievability. Ateniese et al. first represented the PDP model to ensure possession of file on un-trusted storages and provided static case with a RSA- based scheme that reaches the cost of communication. Even presented a public verifiable version. That welcomes anyone, to challenge the server for data possession
2.3 Summary
This chapter gives the survey on the cloud computing, secure overlay cloud storage with access control and assure deletion, Addressing security and privacy issues in cloud computing, Privacy preserving, and exiting problem in providing security to data in cloud computing.

Discover more:

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Cloud computing, cloud storage. Available from:<https://www.essaysauce.com/computer-science-essays/essay-cloud-computing-cloud-storage/> [Accessed 19-11-24].

These Computer science essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.