International Journal of Computer Engineering and Applications,
|
|
- Garey Wilcox
- 5 years ago
- Views:
Transcription
1 International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN DATA INTEGRITY CHECK IN CLOUD COMPUTING: A FRAMEWORK Neha Thakur 1, Aman Kumar Sharma 2 1 Department of Computer Engineering 2 Department of Computer Science Engineering Himachal Pradesh University Shimla, India ABSTRACT: Cloud computing is defined as Distributed computing on internet or delivery of computing services over the network. Cloud computing has potential to primordially change the ethos of Information and communication Technology [ICT] provision in the public service and significantly alleviate cost. The traditional storage techniques require high costs of data storage devices as well as the acute rate at which data is being generated, cloud computing vindicate expensive for enterprise and individual users to regularly update their hardware. Apart from reducing the cost cloud computing also minimize the maintenance efforts. In cloud computing data and program is moved to a remotely located cloud server, from where users can access the data at anytime and from anywhere through thin clients and mobile devices using internet. This brings many advantages such as data ubiquity, flexibility of access and resilience. However it also increase the threat of data integrity, cloud faithfully stores the data and return back to the owner whenever needed, but it doesn t guarantee that the data stored in cloud is secured and not altered by the cloud and TPA [1].In order to overcome the threat of integrity a mechanism is proposed where owner may verify the correctness of data without much hassles. Keywords: Data owner, Secret Key, Data Integrity, Proof of Reliability, Cloud Service Provider [1] INTRODUCTION Neha Thakur, Aman Kumar Sharma 38
2 DATA INTEGRITY CHECK IN CLOUD COMPUTING: A FRAMEWORK Cloud computing is the latest paradigm that involves delivering hosted services over the internet based on pay as you go approach. Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. It is a marketing term for technologies that provide computation, software, data access and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Cloud enhances collaboration, agility, scaling, and availability, and provides the potential for cost reduction through optimized and efficient computing. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. Cloud computing is broken down into three segments: "application" "storage" and "connectivity." Each segment serves a different purpose and offers different products for businesses and individuals around the world [2]. Cloud computing environments are likely to suffer from a number of known vulnerabilities, enabling attackers either to obtain computing services for free (attack against cloud providers), steal information from cloud users (attack against cloud customers data), or penetrate the infrastructure remaining in client premises through cloud connections (attack against cloud customer infrastructures). Typical examples of these attacks today are VoIP free calls, SQL injection, and drive by downloads [3]. Cloud networking will not change the fact that vulnerabilities will continue to exist and that attackers will continue to exploit them. Big IT giants like Google, Amazon, and salesforce.com are providing computing facility like storage, computation and application by pay as per usage through Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) cloud service models. Since cloud computing supports distributed service oriented architecture, multi users and multi-domain administrative infrastructure, it s more prone to security threats and vulnerabilities. Security issues are of more concern to cloud service providers who are actually hosting the services. [2] CLOUD COMPUTING ARCHITECTURE Cloud computing architecture refers to the components and subcomponents required for cloud computing. These components typically consist of a front end platform (fat client, thin client, mobile device), back end platforms (servers, storage), a cloud based delivery, and a network (Internet, Intranet, Intercloud). Combined, these components make up cloud computing architecture. [2.1] CLOUD COMPUTING SERVICE DELIVERY MODELS Cloud Computing can be broadly classified into three categories, i.e., three layers of Cloud Stack, also known as Cloud Service Models or Service Platform Infrastructure [SPI] Service Model. The three main cloud service delivery models are: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS) [4]. Neha Thakur, Aman Kumar Sharma 39
3 International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN SAAS SAAS is a software model provided by the vendor through an online service. It provides networkbased access to commercially available software. User interface powered by "thin client" applications; cloud components; communication via (Application Program Interfaces (APIs); stateless; loosely coupled; modular; semantic interoperability. This will avoid capital expenditure on software and development resources; reduced Return On Investment (ROI) risk; streamlined and iterative updates. On the contrary, Centralization of data requires new/different security measures. Examples of SaaS include Netflix, Intuit QuickBooks Online, Gmail, and Google Docs [5]. The four major advantages of SaaS are:- Increased speed of deployment Increased user adoption Reduced support requirements Lowered cost of implementation and upgrades PAAS PaaS enables companies to develop applications more quickly and efficiently in a cloud environment using programming languages and tools supported by the provider. The defining factor that makes PaaS unique is that it lets developers build and deploy web applications on a hosted infrastructure. It consumes cloud infrastructure. All centralized system requires new/different security measures. Common examples of platforms include Windows, Apple Mac OS X, and Linux for operating systems; Google Android, Windows Mobile, and Apple ios for mobile computing; and Adobe AIR or the Microsoft.NET Framework for software frameworks[6][7]. IAAS This is the base layer of the cloud stack. It serves as a foundation for the other two layers, for their execution. The keyword behind this stack is Virtualization. Usually platform-independent; infrastructure costs are shared and thus reduced; service level agreements (SLAs); pay by usage; selfscaling. Avoid capital expenditure on hardware and human resources; reduced ROI risk; low barriers to entry; streamlined and automated scaling but disadvantages are Business efficiency and productivity largely depends on the vendor's capabilities; potentially greater long-term cost; centralization requires new/different security measures. With, a company can rent fundamental computing resources for deploying and running applications or storing data. IaaS enables fast deployment of applications, and improves the agility of IT services by instantly adding computing processing power and storage capacity when needed[8][9]. [2.2] CLOUD DEPLOYMENT MODELS Regardless of the service model utilized (SaaS, PaaS, or IaaS) there are four deployment models for cloud services [10][11][12]: Public Cloud: The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. Means where the infrastructure resides totally outside of the tenant /enterprises? Neha Thakur, Aman Kumar Sharma 40
4 DATA INTEGRITY CHECK IN CLOUD COMPUTING: A FRAMEWORK Private Cloud: The cloud infrastructure is operated solely for a single organization. It may be managed by the organization or a third party, and may exist on-premises or off premises. IT services are mounted on top of large-scale accumulated and virtualized infrastructure within enterprise firewall and consumed in per transaction basis. Community Cloud: The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, or compliance. considerations). It may be managed by the organizations or a third party and may exist on-premises or off-premises. Hybrid Cloud: The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds). Here, the infrastructure and business processes reside partly within the enterprise and partly consumed from third party. Figure: 1. cloud computing architecture [1] [3] DATA INTEGRITY Integrity, in terms of data security, is the guarantee that data can only be accessed or modified by those authorized to do so, in simple word it is process of verifying data. Data Integrity is very important among the other cloud challenges. As data integrity gives the guarantee that data is of high quality, correct, unmodified. After storing data to the cloud, user depends on the cloud to provide more reliable services to them and hopes that their data and applications are in secured manner. But that hope may fail sometimes the user s data may be altered or deleted. Sometimes, the cloud service providers may be dishonest and they may discard the data which has not been accessed or rarely accessed to save the storage space or keep fewer replicas than promised [2]. Moreover, the cloud service providers may choose to hide data loss and claim that the data are still correctly stored in the Cloud. As a result, data owners need to be convinced that their data are correctly stored in the Cloud. So, one of the biggest concerns with cloud data storage is that of data integrity verification at untrusted servers. In order to Neha Thakur, Aman Kumar Sharma 41
5 International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN solve the problem of data integrity checking, many researchers have proposed different systems and security models. [4] DATA INTEGRITY AUTHENTICATION TECHNIQUES AND THEIR CHALLENGES In Cloud computing the issue of data integrity is still carried out by many researchers. There is lot of research still going on in this field to provide secure and efficient data integrity in cloud computing. Researchers have given many solutions to focus on resolving the issues of data integrity. This paper provides analysis on the different techniques of data integrity and their advantages and disadvantages: Data Integrity Techniques Provable Data Possession PDP Scheme based on MAC Table1: Comparison of data integrity techniques[13] Methods used Advantages Limitations for data integrity Key Generation Algorithm Message Authenticatio n Code i. This technique gives a strong proof of data integrity. ii. Protection against small corruptions. iii. Allows public verifiability. i. Simple & Secure Technique. ii. Gives strong proof Integrity of Data. i. Lack of error correcting codes to address concerns of corruption. ii. iii. iv. Lack of privacy preservation. No dynamic support. Unbound no. of queries i. Limited number of verifications with limited number of secret keys. ii. The data owner has to retrieve the entire file of F from the server in order to compute new MACs, Which is not possible for large file. iii. Public auditability is not supported as the private keys are required for verification. Scalable PDP Cryptographic Hash function & symmetric key encryption i. It provides secure PDP by encryption. ii. Supports dynamic operations on outsourced data blocks iii. It is light weight PDP scheme as it supports i. Limited number of updates and challenges. ii. Does not perform block insertions anywhere only append-type insertions are possible. iii. Problematic for large files as each update Neha Thakur, Aman Kumar Sharma 42
6 DATA INTEGRITY CHECK IN CLOUD COMPUTING: A FRAMEWORK Dynamic PDP Proof of Retrievability POR based on keyed hash function hk POR for large files High Availability Integrity Layer (HAIL) POR Based on Selecting Random Bits in Data Blocks Rank-based authenticated skip list. Encryption Key Hash Function Sentinelbased scheme MAC, Pseudorando m function, Hash Function Generation of Meta Data homographic hash function. i. Offers fully dynamic operation. ii. Efficient integrity verification is made by querying and updating DPDP scenario. i. Reduces the computational and storage overhead of the client as well as CSP. ii. It also minimizes the size of the proof of data integrity as reduces the network. Bandwidth. i. Simple and easily implementable. i. Ensures both possession and retrievability of files on CSP i. Allow user to store data on multiple cloud. i. This technique is suitable for thin client. ii. Put minimum storage overhead on client and CSP. requires re-creating all the remaining challenges i. Client needs to perform extra computation. ii. Not suitable for thin client. iii. DPDP does not include provisions for robustness. i. It only works with static data sets. ii. It supports only a limited number of queries as a challenge since it deals with a finite number of check blocks. iii. A POR does not provide in prevention to the file stored on CSP. i. More number of keys for each check. ii. Requires high cost for computation. iii. Puts the computational burden on client as well as server. ii. Newly inserted sentinels and error correcting codes Put computational overhead. iii. Increases input/output and transmission cost across the network. iv. Works only with static data. i. This technique is only applicable for static data. ii. Not suitable for thin client i. This technique is only applicable for static data. ii. No Data Prevention mechanism is implemented in this technique. Neha Thakur, Aman Kumar Sharma 43
7 International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN [5] PROPOSED FRAMEWORK Traditional approach for checking data correctness is to retrieve entire file from the server and then verify the integrity of the file. Downloading the entire file from Cloud to verify the integrity increases cost on communication resources or hardware of the data owner. Also data can't be retrieved through thin clients or smart phones which have limited computation, battery power and bandwidth. In this study a solution is proposed wherein the owner does not need to retrieve the entire file to check the correctness of the file, the owner do this even without downloading a single bit of file thus reducing the hardware cost and time. This system is more suitable for users using thin clients or mobile devices, owner needs to store only a single secret key or metadata irrespective of the size of the data file. The verifier or owner before storing the file at the cloud pre-process the file and generate some metadata and store this metadata with them. At the time of verification the verifier uses this metadata to check the correctness of the data. It is important to know that proof of data integrity just check the integrity of data that is either the data has been illegally modified or deleted, it does not prevent the data from illegal accesses and modifications. This process of verifying the data stored in cloud storage follows following steps:- 1. Setup Phase a) In this phase before storing the file on cloud, we pre-process the file and divide it into M-size blocks shown in Figure2. b) k-bit is selected from each M-size blocks, where k-bit is user defined. c) Thus we generate secret key or metadata. Which store on owner side for verification process. Figure: 2. Generation of Secret Key 2. Verification Phase If verifier wants to verify the integrity of file, it requests cloud and asks for response. On the basis of response a decision is made whether the file is tampered or not. Every file contains N number of data blocks of M-size. From every data block K-bit position is selected for generating secret key or metadata. To check the integrity or obtaining the proof of reliability the data owner retrieves the particular k-bits from each M-size block instead of retrieving the whole file and then compare the value of these k-bits with the stored secret key or metadata. If both the values are matched with each other, it means data is safe or not modified by third party. If it is not, then data was modified or altered by third party. Neha Thakur, Aman Kumar Sharma 44
8 DATA INTEGRITY CHECK IN CLOUD COMPUTING: A FRAMEWORK [6] CONCLUSIONS & FUTURE WORK Every coin has two sides. Even though the cloud technology offers great potential to improve quality, optimize productivity and cost effective, it also includes many security challenges related to the data safety and accuracy. As the cloud is mainly used for storage purposes, data integrity is of primary concern to the user as the control over the data is relinquished from the user. The proposed system provides the proof of data integrity and the owner can check the integrity of their data in efficient manner. If any modification is done by the Third Party Auditor [TPA], owner can easily detect those changes. So privacy and data integrity is secured properly. It also reduces the cost for retrieving the file and bandwidth consumption across the network. The scheme proposed in this paper, works only for static data and not for dynamic data. So expanding the scope of this paper will be the future work. REFERENCES [1] Balachandra Reddy Kandukuri, Ramakrishna Paturi V, Dr. Atanu Rakshit, "Cloud Security Issues, Proceedings IEEE International Conference on Services Computing, September [2] P Schoo, V Fusenig, V Souza, M Melo, P Murray, H Debar, H Medhioub, and D Zeghlache, Challenges for Cloud Networking Security, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Volume 68, Part VII, [3] N Provos, M A Rajab, P Mavrommatis, Cybercrime 2.0: When the cloud turns dark, Queue, PP 46 47, [4] A Juels and B S Kaliski Jr, Proofs of Retrievability for Large Files, Proceedings of 14th ACM Conference Computer and Communication Security, [5] E Aguiar, Y Zhang and M Blanton, An overview of issues and recent developments in cloud computing and storage security in high performance cloud auditing and applications, Springer, PP 3 33, [6] K DBowers, A Juels, and A Oprea, HAIL: A high-availability and integrity layer for cloud storage, Proceedings of 16th ACM conference on Computer and communications security,ieee, [7] R Sravan kumar and Saxena, Data integrity proofs in cloud storage, Volume 4, Isssue 2, IEEE, [8] S Ramgovind, M M Eloff, and E Smith, The management of security in cloud computing, Information Security for South Africa (ISSA), IEEE, PP 1 7,2010. [9] F Sabahi, Cloud computing security threats and responses, Communication Software and Networks (ICCSN), IEEE 3rd International Conference on cloud computing security, PP , [10] X Wang, B Wang and J Huang, Cloud computing and its key techniques, Computer Science and Automation Engineering (CSAE), Volume 2, IEEE, PP , [11] S Subashini and V Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of network and computer applications, Volume 34, PP 1 11, 2011 [12] J. Yang and Z. Chen, Cloud computing research and security issues, Computational Intelligence and Software Engineering (CiSE), IEEE, PP 1 3, [13] Neha Thakur, Aman Kumar Sharma, Data integrity techniques in cloud computing: an analysis, International journal for advance research in computer science and software engineering (IJARCSSE), Volume 7 Issue 8, Neha Thakur, Aman Kumar Sharma 45
Research Article. August 2017
International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-8) a Research Article August 2017 Data Integrity Techniques in Cloud Computing:
More informationDATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS
DATA INTEGRITY TECHNIQUES IN CLOUD: AN ANALYSIS 1 MS. R. K. PANDYA, 2 PROF. K. K. SUTARIA 1 M.E.[Cloud Computing] Student, Computer Engineering Department, V. V. P. Engineering College, Rajkot, Gujarat
More informationMulti Packed Security Addressing Challenges in Cloud Computing
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationImproving data integrity on cloud storage services
International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Improving data integrity on cloud storage services Miss. M.Sowparnika 1, Prof. R. Dheenadayalu 2 1 (Department of
More informationCHEM-E Process Automation and Information Systems: Applications
CHEM-E7205 - Process Automation and Information Systems: Applications Cloud computing Jukka Kortela Contents What is Cloud Computing? Overview of Cloud Computing Comparison of Cloud Deployment Models Comparison
More informationFine-Grained Data Updates on Cloud with Authorized Public Auditing
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Fine-Grained Data Updates on Cloud with Authorized Public Auditing Sindhu L 1 Ms Leelavathi
More informationBuilding a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.
Building a Secure and Compliant Cloud Infrastructure Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc. Why Are We Here? Expanded Enterprise Data access anywhere, anytime
More information1/10/2011. Topics. What is the Cloud? Cloud Computing
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
More informationKusum Lata, Sugandha Sharma
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 4 ISSN : 2456-3307 A Survey on Cloud Computing and Mobile Cloud Computing
More informationCloud Computing Concepts, Models, and Terminology
Cloud Computing Concepts, Models, and Terminology Chapter 1 Cloud Computing Advantages and Disadvantages https://www.youtube.com/watch?v=ojdnoyiqeju Topics Cloud Service Models Cloud Delivery Models and
More informationAssistant Professor, School of Computer Applications,Career Point University,Kota, Rajasthan, India Id
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 7 ISSN : 2456-3307 An Architectural Framework of Cloud Computing behind
More informationCloud Computing: Making the Right Choice for Your Organization
Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,
More informationCLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department
1 CLOUD COMPUTING Networks and Communication Department Lecture 4: Introductory lecture for cloud computing By: Latifa ALrashed Outline 2 Introduction to the cloud comupting Define the concept of cloud
More informationCloud Computing Security Issues
Cloud Computing Security Issues Anjum Asma 1, Mousmi Ajay Chaurasia 2 and Hala Mokhtar 3 1 Information Technology Department, College of Computer and Information Sciences King Saud University, Kingdom
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationLarge Scale Computing Infrastructures
GC3: Grid Computing Competence Center Large Scale Computing Infrastructures Lecture 2: Cloud technologies Sergio Maffioletti GC3: Grid Computing Competence Center, University
More informationPERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY
PERFORMANCE OF CLOUD DATA INTEGRITY PROOFS IN CLOUD STORAGE SYSTEM USING CRYPTOGRAPHIC KEY B.M.RAJESH 1 Asst Prof, Department of Information Technology, SNMV College of Arts and Science, Tamil Nadu, India
More informationSAAS: THE RDP ADVANTAGE FOR ISVS AND USERS
SAAS: THE RDP ADVANTAGE FOR ISVS AND USERS How RDP SaaS deployment reduces costs, time to market and barriers to entry while improving security, performance and the UX Independent Software Vendors (ISVs)
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationEfficient integrity checking technique for securing client data in cloud computing
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 43 Efficient integrity checking technique for securing client data in cloud computing Dalia Attas and Omar Batrafi Computer
More informationI. INTRODUCTION CLOUD COMPUTING BLOCKS. ISSN: Page 25
RESEARCH ARTICLE OPEN ACCESS Security Threat Issues and Countermeasures in Cloud Computing Jahangeer Qadiree [1], Trisha Arya [2] Ph.D. Scholar [1] Department Of Information Technology Aisect University,
More informationSECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON
White Paper SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON Abstract This white paper explains the benefits to the extended enterprise of the on-premise, online file sharing storage
More informationABSTRACT I. INTRODUCTION
2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,
More informationISSN Vol.08,Issue.16, October-2016, Pages:
ISSN 2348 2370 Vol.08,Issue.16, October-2016, Pages:3146-3152 www.ijatir.org Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation VEDIRE AJAYANI 1, K. TULASI 2, DR P. SUNITHA
More informationWhy the cloud matters?
Why the cloud matters? Speed and Business Impact Expertise and Performance Cost Reduction Trend Micro Datacenter & Cloud Security Vision Enable enterprises to use private and public cloud computing with
More informationAES and DES Using Secure and Dynamic Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationHALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere.
HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD Automated PCI compliance anytime, anywhere. THE PROBLEM Online commercial transactions will hit an estimated
More informationImplementation of Decentralized Access Control with Anonymous Authentication in Cloud
Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 210-214 Implementation of Decentralized Access Control with Anonymous Authentication in Cloud
More informationINFS 214: Introduction to Computing
INFS 214: Introduction to Computing Session 13 Cloud Computing Lecturer: Dr. Ebenezer Ankrah, Dept. of Information Studies Contact Information: eankrah@ug.edu.gh College of Education School of Continuing
More informationTo Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing
International Journal of Emerging Trends in Science and Technology To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing Author Preeti Ahuja Punjabi University
More informationKey Terms: Cloud Computing, cloud Service Provider, Provable Data Possession, Dynamic File Block, Map Version Table.
Volume 6, Issue 6, June 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic File Block
More informationCloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015
Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually
More informationCloud Computing An IT Paradigm Changer
Cloud Computing An IT Paradigm Changer Mazin Yousif, PhD CTO, Cloud Computing IBM Canada Ltd. Mazin Yousif, PhD T-Systems International 2009 IBM Corporation IT infrastructure reached breaking point App
More informationPrivacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code
Privacy Preserving Public Auditing in Secured Cloud Storage Using Block Authentication Code Sajeev V 1, Gowthamani R 2 Department of Computer Science, Nehru Institute of Technology, Coimbatore, India 1,
More informationCLOUD COMPUTING PRIMER
CLOUD COMPUTING PRIMER for Small and Medium-Sized Businesses CONTENTS 1 Executive Summary 2 ABCs of Cloud Computing An IT Revolution 3 The Democratization of Computing Cloud Computing Service Models SaaS
More informationBusiness Technology Briefing: Fear of Flying, And How You Can Overcome It
Business Technology Briefing: Fear of Flying, And How You Can Overcome It Joseph Tobloski Senior Director for Data & Platforms R&D Accenture Technology Labs Fear of Flying And How You Can Overcome It May
More informationCloud Computing, SaaS and Outsourcing
Cloud Computing, SaaS and Outsourcing Michelle Perez, AGC Privacy, IPG Bonnie Yeomans, VP, AGC & Privacy Officer, CA Technologies PLI TechLaw Institute 2017: The Digital Agenda Introduction to the Cloud
More informationEBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud
EBOOK: VMware Cloud on AWS: Optimized for the Next-Generation Hybrid Cloud Contents Introduction... 3 What is VMware Cloud on AWS?... 5 Customer Benefits of Adopting VMware Cloud on AWS... 6 VMware Cloud
More informationThird Party Cloud Services Its Adoption in the New Age
Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals
More informationKeywords Cloud Data Storage, Privacy Preserving, Public Auditability, Cryptographic Protocols, Cloud Computing.
Volume 4, Issue 10, October 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Implementation
More informationCLOUD COMPUTING-ISSUES AND CHALLENGES
CLOUD COMPUTING-ISSUES AND CHALLENGES Asstt. Prof.Vandana S.D.S.P.Memorial College for Women, Rayya (India) ABSTRACT Cloud computing is a multifaceted technological paradigm that is outgrowth of decades
More informationMANAGING THE COMPLEXITY.
AS A SERVICE MANAGING THE COMPLEXITY. HOW WILL YOU SIMPLIFY ESN MIGRATION? Control room IT solutions play a vital role in incident management. Technologies such as Integrated Communications Control Systems
More informationIntroduction to Cloud Computing
You will learn how to: Build and deploy cloud applications and develop an effective implementation strategy Leverage cloud vendors Amazon EC2 and Amazon S3 Exploit Software as a Service (SaaS) to optimize
More informationNETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.
NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING. The old mantra of trust but verify just is not working. Never trust and verify is how we must apply security in this era of sophisticated breaches.
More informationAvailable online at ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015)
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 48 (2015 ) 347 352 International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015) (ICCC-2014)
More informationQUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING
QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING ABSTRACT G KALYANI 1* 1. M.Tech Student, Dept of CSE Indira Institute of Engineering and Technology, Markapur, AP. Cloud computing has been
More informationInternational Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing
Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN
More informationBatch Verification Scheme for Economic Cloud Storage Services
Batch Verification Scheme for Economic Cloud Storage Services K. Sudha 1, Mr. S. Sivaraj, ME 2 II-M.E (CSE), Dept. of CSE, SSM College of Engineering, Komarapalayam, Tamilnadu, India 1 Assistant Professor,
More informationCLOUD COMPUTING. A public cloud sells services to anyone on the Internet. The cloud infrastructure is made available to
CLOUD COMPUTING In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet.
More informationThe Device Has Left the Building
The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use
More informationMitigating Risks with Cloud Computing Dan Reis
Mitigating Risks with Cloud Computing Dan Reis Director of U.S. Product Marketing Trend Micro Agenda Cloud Adoption Key Characteristics The Cloud Landscape and its Security Challenges The SecureCloud Solution
More informationSEEM3450 Engineering Innovation and Entrepreneurship
SEEM3450 Engineering Innovation and Entrepreneurship Cloud Computing Guest Lecture Gabriel Fung, Ph.D. 2017-10-26 What is Cloud Computing? According to NIST (National Institute of Standards and Technology)
More informationExam C Foundations of IBM Cloud Reference Architecture V5
Exam C5050 287 Foundations of IBM Cloud Reference Architecture V5 1. Which cloud computing scenario would benefit from the inclusion of orchestration? A. A customer has a need to adopt lean principles
More informationBRINGING CLARITY TO THE CLOUD
BRINGING CLARITY TO THE CLOUD OpenSky Networks discusses the complexities of the cloud market by distinguishing the difference between true cloud solutions and rebranded services; and how knowing that
More informationInternational Journal of Advance Engineering and Research Development. A Private Cloud On Open Source Paradigm
Impact Factor: 4.14 (Calculated by SJIF-2015) e- ISSN: 2348-4470 p- ISSN: 2348-6406 International Journal of Advance Engineering and Research Development Volume 3, Issue 4, April -2016 A Private Cloud
More informationHyper-Converged Infrastructure: Providing New Opportunities for Improved Availability
Hyper-Converged Infrastructure: Providing New Opportunities for Improved Availability IT teams in companies of all sizes face constant pressure to meet the Availability requirements of today s Always-On
More informationDelegating Auditing Task to TPA for Security in Cloud Computing
Delegating Auditing Task to TPA for Security in Cloud Computing 1 Nallam Gowri, 2 D.Srinivas 1,2Dept. of CSE,Kakinada Institute of Engineering & Technology, Korangi, e.g.dt,ap, India Abstract: This paper
More informationUdaipur, Rajasthan, India. University, Udaipur, Rajasthan, India
ROLE OF NETWORK VIRTUALIZATION IN CLOUD COMPUTING AND NETWORK CONVERGENCE 1 SHAIKH ABDUL AZEEM, 2 SATYENDRA KUMAR SHARMA 1 Research Scholar, Department of Computer Science, Pacific Academy of Higher Education
More informationTHIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA
THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA ABSTRACT K.Govinda #1, V.Gurunathaprasad #2, H.Sathishkumar #3 Cloud computing is the way of providing computing
More informationClouds in the Forecast. Factors to Consider for In-House vs. Cloud-Based Systems and Services
Clouds in the Forecast Factors to Consider for In-House vs. Cloud-Based Systems and Services Speakers Sam Gabal Sam Gabal is a Sales Executive with Origami Risk, based in Orange County and experienced
More informationEFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC]
EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC] Rajalakshmi V., Jothi Nisha V. and Dhanalakshmi S. Faculty of Computing, Sathyabama University, Chennai,
More informationIntroduction to Cloud Computing
Introduction to Cloud Computing Nabil Abdennadher nabil.abdennadher@hesge.ch 2017/2018 1 Plan Context Definition Market Cloud service models Cloud deployments models Key drivers to adopting the Cloud Barriers
More informationIntegrity Check Mechanism in Cloud Using SHA-512 Algorithm
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 6033-6037 Integrity Check Mechanism in Cloud Using SHA-512 Algorithm Mrs.Shantala
More informationCloud Security: Constant Innovation
Cloud Security: Constant Innovation without constant capital expenditure Presented by Richard Brown Wednesday 19 July 2017 CIO Summit Gold Coast, Australia How do we combat evolving threats? Traditional
More informationSecuring Your Amazon Web Services Virtual Networks
Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,
More informationCloud Computing Introduction & Offerings from IBM
Cloud Computing Introduction & Offerings from IBM Gytis Račiukaitis IT Architect, IBM Global Business Services Agenda What is cloud computing? Benefits Risks & Issues Thinking about moving into the cloud?
More informationCloud Computing Briefing Presentation. DANU
Cloud Computing Briefing Presentation Contents Introducing the Cloud Value Proposition Opportunities Challenges Success Stories DANU Cloud Offering Introducing the Cloud What is Cloud Computing? IT capabilities
More informationCompleting your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT
Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT Introduction Amazon Web Services (AWS) provides Infrastructure as a Service (IaaS) cloud offerings for organizations. Using AWS,
More informationIntroduction to Cloud Computing. [thoughtsoncloud.com] 1
Introduction to Cloud Computing [thoughtsoncloud.com] 1 Outline What is Cloud Computing? Characteristics of the Cloud Computing model Evolution of Cloud Computing Cloud Computing Architecture Cloud Services:
More informationThe Emerging Role of a CDN in Facilitating Secure Cloud Deployments
White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub August 2017 IDC OPINION The ongoing adoption of cloud services and the desire for anytime,
More informationTransform Your Business To An Open Hybrid Cloud Architecture. Presenter Name Title Date
Transform Your Business To An Open Hybrid Cloud Architecture Presenter Name Title Date Why You Need To Transform Your Business Public cloud performance setting new expectations for: IT speed, flexibility
More informationProtecting your Data in the Cloud. Cyber Security Awareness Month Seminar Series
Protecting your Data in the Cloud Cyber Security Awareness Month Seminar Series October 24, 2012 Agenda Introduction What is the Cloud Types of Clouds Anatomy of a cloud Why we love the cloud Consumer
More informationIntroduction To Cloud Computing
Introduction To Cloud Computing What is Cloud Computing? Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g.,
More information10 Cloud Myths Demystified
10 Cloud s Demystified The Realities for Digital Healthcare Transformation It s a challenging time for the healthcare industry, with changing regulations, consolidation and the consumerization of healthcare
More informationCloud First Policy General Directorate of Governance and Operations Version April 2017
General Directorate of Governance and Operations Version 1.0 24 April 2017 Table of Contents Definitions/Glossary... 2 Policy statement... 3 Entities Affected by this Policy... 3 Who Should Read this Policy...
More informationWhat is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet.
1 INTRODUCTION What is Cloud Computing? Cloud computing is the dynamic delivery of IT resources and capabilities as a Service over the Internet. Cloud computing encompasses any Subscriptionbased or pay-per-use
More informationTotal Cost of Ownership: Benefits of ECM in the OpenText Cloud
Total Cost of Ownership: Benefits of ECM in the OpenText Cloud OpenText Managed Services brings together the power of an enterprise cloud platform with the technical skills and business experience required
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationECE Enterprise Storage Architecture. Fall ~* CLOUD *~. Tyler Bletsch Duke University
ECE590-03 Enterprise Storage Architecture Fall 2017.~* CLOUD *~. Tyler Bletsch Duke University Includes material adapted from the course Information Storage and Management v2 (module 13), published by
More informationCloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION
Cloud Computing January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Purpose and Methodology Survey Sample Field Work December 20, 2011 January 9, 2012 Total Respondents 554 Margin of Error +/- 4.2%
More informationEllie Bushhousen, Health Science Center Libraries, University of Florida, Gainesville, Florida
Cloud Computing Ellie Bushhousen, Health Science Center Libraries, University of Florida, Gainesville, Florida In the virtual services era the term cloud computing has worked its way into the lexicon.
More informationTransform your network and your customer experience. Introducing SD-WAN Concierge
Transform your network and your customer experience Introducing SD-WAN Concierge Optimize your application performance, lower your total cost of ownership and simplify your network management. 2X Bandwith
More informationEfficient Data Storage Security with Multiple Batch Auditing in Cloud Computing
Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing P. Sukumar [1] Department of Computer Science Sri Venkateswara College of Engineering, Chennai B. Sathiya [2] Department
More informationHow Credit Unions Are Taking Advantage of the Cloud
2013 CliftonLarsonAllen LLP How Credit Unions Are Taking Advantage of the Cloud CUNA Technology Council Conference September 2013 CLAconnect.com Randy Romes, CISSP, CRISC, MCP, PCI-QSA Principal, Information
More informationAn introductory look. cloud computing in education
An introductory look cloud computing in education An introductory look cloud computing in education Today, the question for education IT managers is not whether to adopt cloud computing, but when. With
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK TECHNIQUES FOR ENSURING DATA STORAGE SECURITY IN CLOUD COMPUTING GANESH B. CHAVAN
More informationSpotlight Report. Information Security. Presented by. Group Partner
Cloud SecuriTY Spotlight Report Group Partner Information Security Presented by OVERVIEW Key FINDINGS Public cloud apps like Office 365 and Salesforce have become a dominant, driving force for change in
More informationCloud Computing 4/17/2016. Outline. Cloud Computing. Centralized versus Distributed Computing Some people argue that Cloud Computing. Cloud Computing.
Cloud Computing By: Muhammad Naseem Assistant Professor Department of Computer Engineering, Sir Syed University of Engineering & Technology, Web: http://sites.google.com/site/muhammadnaseem105 Email: mnaseem105@yahoo.com
More informationHow to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud
PRESENTED BY How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud BIG-IP enables the enterprise to efficiently address security and performance when migrating to
More informationALI-ABA Topical Courses ESI Retention vs. Preservation, Privacy and the Cloud May 2, 2012 Video Webcast
21 ALI-ABA Topical Courses ESI Retention vs. Preservation, Privacy and the Cloud May 2, 2012 Video Webcast The NIST Definition of Cloud Computing: Recommendations of the National Institute of Standards
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security
More informationTechnical Brief Distributed Trusted Computing
Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,
More informationInternational Journal of Advance Engineering and Research Development. An Overview of Cloud Computing: Data Storage Protocols and Security Techniques
Scientific Journal of Impact Factor (SJIF): 3.134 International Journal of Advance Engineering and Research Development Volume 2, Issue 11, November -2015 e-issn(o): 2348-4470 p-issn(p): 2348-6406 An Overview
More informationAbstract. main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a
Abstract Cloud computing is the key technology widely used across most of the organizations. The main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a lot. Most
More informationSurvey on Efficient Audit Service to Ensure Data Integrity in Cloud Environment
Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 4 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationNetwork Services, Cloud Computing and Virtualization
Network Services, Cloud Computing and Virtualization Client Side Virtualization Purpose of virtual machines Resource requirements Emulator requirements Security requirements Network requirements Hypervisor
More informationSecurity Enhancements
OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows
More informationCloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
More informationInternational Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN STUDY ON CLOUD COMPUTING
Omkumar R. Badhai, Shreya A. Deo, Snehal B.Satpute, Mansi Agrawal Department of Computer Engineering, Sipna College Of engineering and Technology, Amravati, Sant Gadge Baba Amravati University ABSTRACT:
More information