BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS

Similar documents
The Design and Implementation of Disaster Recovery in Dual-active Cloud Center

Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm

Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures

Overview of PBI-blockchain cooperation technology

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN

Construction Scheme for Cloud Platform of NSFC Information System

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Analysis on computer network viruses and preventive measures

Based on The DES_RSA Encryption Algorithm Improvement and Implementation

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI

Understanding Virtual System Data Protection

S. Indirakumari, A. Thilagavathy

An Indian Journal FULL PAPER. Trade Science Inc. Research on data mining clustering algorithm in cloud computing environments ABSTRACT KEYWORDS

Intelligent Computer Room Management Platform Based on RF Card

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

ABSTRACT I. INTRODUCTION

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. The study on magnanimous data-storage system based on cloud computing

SECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA

CLOUD COMPUTING PRIMER

Analysis of Computer Network and Communication System

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso

Research Article Volume 6 Issue No. 5

WHITE PAPER. The 450 MHz Band Ecosystem

EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC]

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

Application of Nonlinear Later TV Edition in Gigabit Ethernet. Hong Ma

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved.

The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1, a, Zhong Liang 2, b, Chen Yue 3, c

KODO for Samsung Knox Enterprise Data Protection & Secure Collaboration Platform

Housing Estates Information Management System Based on.net. Jianliang Min

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

HIPAA Compliance Checklist

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning

Design and Implementation of Inspection System for Lift Based on Android Platform Yan Zhang1, a, Yanping Hu2,b

Energy efficient optimization method for green data center based on cloud computing

Security in India: Enabling a New Connected Era

Who What Why

What can the OnBase Cloud do for you? lbmctech.com

Keywords Cloud Computing, Data Audit security, E Commerce, Public Key Infrastructure, Security Strategies

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space

Cloud Computing Introduction & Offerings from IBM

ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump

Cloud Computing: Making the Right Choice for Your Organization

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

Backup and Recovery: New Strategies Drive Disk-Based Solutions

DEVELOPMENT AND EVALUATION OF A SYSTEM FOR CHECKING FOR IMPROPER SENDING OF PERSONAL INFORMATION IN ENCRYPTED

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

VOXOX. A Tell-All Guide EVERYTHING YOU NEED TO KNOW ABOUT HOSTED PBX. a VOXOX ebook VOXOX, Inc A Comprehensive Guide

Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies

Abstract. main advantage with cloud computing is that, the risk of infrastructure maintenance reduces a

How to Install RSI Robot

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

WHITE PAPER. Secure communication. - Security functions of i-pro system s

Virtual private networks

How Architecture Design Can Lower Hyperconverged Infrastructure (HCI) Total Cost of Ownership (TCO)

How to Create, Deploy, & Operate Secure IoT Applications

Ultra-high-speed In-memory Data Management Software for High-speed Response and High Throughput

Problems and Countermeasures of Information Security of Electric. Power Enterprises in China

How unified backup and cloud enable your digital transformation success

Intelligent Terminal System Based on Trusted Platform Module

CenturyLink for Microsoft

Blanket Encryption. 385 Moffett Park Dr. Sunnyvale, CA Technical Report

Remote Key Loading Spread security. Unlock efficiency

The Application of CAN Bus in Intelligent Substation Automation System Yuehua HUANG 1, a, Ruiyong LIU 2, b, Peipei YANG 3, C, Dongxu XIANG 4,D

DATA DEDUPLCATION AND MIGRATION USING LOAD REBALANCING APPROACH IN HDFS Pritee Patil 1, Nitin Pise 2,Sarika Bobde 3 1

The Research on PGP Private Key Ring Cracking and Its Application

Authentication Technology for a Smart eid Infrastructure.

Ten things hyperconvergence can do for you

Construction and Application of Cloud Data Center in University

SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES

Cloud-Security: Show-Stopper or Enabling Technology?

Application of Redundant Backup Technology in Network Security

The State of Cloud Monitoring

Study on Computer Network Technology of Digital Library

Contents. viii. List of figures. List of tables. OGC s foreword. 3 The ITIL Service Management Lifecycle core of practice 17

ISSN Vol.04,Issue.05, May-2016, Pages:

Huawei Railway Communication Service Solution Guide

A Study of Future Internet Applications based on Semantic Web Technology Configuration Model

Third Party Cloud Services Its Adoption in the New Age

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

Cloud Computing Security: From Single to Multi-Clouds

A Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT:

Service Level Agreement Research Computing Environment and Managed Server Hosting

Construction of Computer Encrypted Secure Communication Environment Based on Private Virtual Network Technology

Data Protection. Rethinking. Michael Andrews, Director, Enterprise Data Protection, APJ HP Autonomy IM

Complete Data Protection & Disaster Recovery Solution

BLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION

Keep the Door Open for Users and Closed to Hackers

Issues of Operating Systems Security

CDW LLC 200 North Milwaukee Avenue, Vernon Hills, IL

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Computer Life (CPL) ISSN: Simulation and Implementation of Cloud Computing Based on CloudSim

LOAD BALANCING AND DEDUPLICATION

PLAYBOOK. How Do You Plan to Grow? Evaluating Your Critical Infrastructure Can Help Uncover the Right Strategy

Transcription:

[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13778-13783] Study on secure data storage based on cloud computing Shuying Li, Ya Pan School of Information and Electronics Engineering, Shangqiu Institute of Technology, Shangqiu, 476000, (CHINA) ABSTRACT With the advance of cloud computing technology, more economic benefits have been brought to users. While satisfying the needs of users, cloud computing brings its advantages-low costs, rapid deployment and flexible scale adjustment into full play. Increasing number of data is stored in all kinds of networks with more and more companies and people using cloud computing service, thus put severe challenge on users data security and availability. Under these circumstances, the study analyzed data security of users, and found out that data storage security attracts attentions both from private users and business users. The security challenges cloud computing has brought to us are how to prevent users data from leaking, how to guarantee users obtain data efficiently and accurately. It introduced the research status of secure data storage under the circumstance of cloud computing. Surveys showed that experts and scholars have attached great attention to data security under this circumstance. Strategies on secure data transmission and storage based on cloud computing, including encryption and decryption processing, were also introduces in this paper. To protect user data security, structure model has been built and secure data storage system under cloud computing has also been introduced. KEYWORDS Cloud computing; Economic benefits; Security; Encryption processing. Trade Science Inc.

BTAIJ, 10(22) 2014 Shuying Li and Ya Pan 13779 INTRODUCTION Information technology advanced greatly with the development of social economy and science and technology. Users deeds for data computing and storage also increased greatly. Compared with traditional model, which computes and stores data based on numerous high-performance servers, cloud computing, the new computing model adapt to users need of high distribution, low costs and high versatility, can not only provide users with high-speed computing, but also satisfy users needs for large-scale data storage [1]. Cloud computing service will be needed increasingly, and its application will become wider. As shown in Figure 1, users need for cloud computing. It shows that the reason for users to choose cloud computing is its cloud host and cloud storage application. In the future, users needs for cloud computing in business management, application development services and network acceleration services will continue to grow [2]. With the increasing need for cloud service, the focus of cloud computing R&D at the present stage is how to ensure data security and integrity in networks [3]. Started from data storage and application status of cloud computing, and considering the protection of users data security, a data storage system based on cloud computing should be designed to protect the security of data transmission and security. Category of current using cloud services Application development services, such as API open interface Computing resources renting, such as the renting of cloud rendering Network acceleration services like cloud distribution Search engine and map loading location service Business Management software service Business communications software service Cloud storage and cloud backup Cloud host and cloud web hosting Category of future planning purchase of cloud services 22% 32.90% 24.30% 31.80% 28.30% 40.50% 34.10% 39.90% 35.80% 43.90% 41.60% 39.30% 52.00% 46.80% 53.80% 48.60% Figure 1 : Users needs for cloud computing THE PROBLEM ANALYSIS OF USERS DATA SECURITY OF CLOUD COMPUTING Users date security is among the key issues that need to be addressed with the advance of cloud computing technology [4]. With the popularization of cloud computing service, concerns on cloud computing data security among users have been growing [5]. From the survey result shows in Figure 2, security problem remains to be the most concerned issues of private users. Figure 3 is the survey on business users by IDC in 2010. The result shows that, security risks of computing technology and data supervision risks are the mostly concerned problems of business users. That means could computing security problem is both the concern of private users and business users. execution of SLA lack of management tools Infrastructure outsourcing Supplier locking in Lack of client ports and client Lack of success cases Problem determination and resolution Reliability Business data protection Security 30.00 35.00 37.00 38.00 39.00 41.00 48.00 100.00 138.00 249.00 Figure 2 : Survey on the most concerned problems of users as for cloud service The problems of user data security should be addressed in time by cloud service providers; otherwise the problem might become more severe as cloud computing system developing [6]. Specific expressions of data security problems are as following: (1)Only if cloud service providers create a trustworthy environment for users could make users update various kinds of data to the cloud. We could see that users attach great importance to the security, stability and reliability of cloud computing.

13780 Study on secure data storage based on cloud computing BTAIJ, 10(22) 2014 There might not have proper cloud computing The interoperability of cloud provider is weak Concerns about the costs of demand payment mode Can not meet customized need Possibility-concerns about the quality of network or Performance-concerns about too network speed, and IT Systems and management that have difficulty in key information is banned to put in data centers Security, cloud computing will place our information 3.04 3.11 3.15 3.37 3.47 3.49 3.60 3.84 3.96 Figure 3 : Items of business users concern about cloud computing (2)While users store data into cloud, relative cloud service provider should guarantee the completeness and reliability in the storage devices. Besides, cloud service provider should provide various measures ready for use to deal with emergencies so as to guarantee the security and completeness of users data. (3)Cloud service providers should have perfect management mechanism for the management of data process after users have update the data to cloud. Once lost control on data management, great losses of users will be thus caused. (4)Privacy is of great importance to user. In data retrieval and process, the service provider should guarantee that users privacy should not be invaded. From the above analysis, we could conclude that cloud computing security has two major aspects: first is to prevent the leakage of users data so as to avoid causing unnecessary loss of users; second is to guarantee the efficiency and accuracy of data acquisition when user has a specific need for a certain type of data. From the above analysis, we could say that the major task of cloud service provider is to guarantee the security of users data transmission and storage. Some private data are unavoidable stored when users store data, such as bank account information, users personal information and private mails. Under this circumstance, following problems should be addressed when users updating date to cloud: how to prevent information from being stolen by other people? How to prevent information from being stolen by internal staff from cloud service providers? How to guarantee the login legitimacy and ready-access at any time? In face of these problems, in-depth study should be carried out by cloud service providers so as to address the data security problem of users. ANALYSIS OF RESEARCH STATUS OF SECURE DATA STORAGE UNDER CLOUD COMPUTING ENVIRONMENT With the development of information technology, cloud computing technology becomes mature gradually. Thus demand for cloud service has been increasing. The result of the above is more and more people have carried out research on cloud computing secure data storage. Figure 4 is the number of published paper about secure data storage under cloud computing environment on CNKI (National Knowledge Infrastructure) from 2008 to 2013. It is a little growth from 2008 to 2009. The growth is a logarithmic one from 2009 to 2013, which means the problem is becoming an increasing concern of experts and scholars. It also means the problem is the one need immediate solution right now. Many experts have already dedicated themselves in the in-depth study on the problem to find out the best method to guarantee data security in cloud service. Figure 4 : The number of published paper about secure data storage under cloud computing environment on CNKI

BTAIJ, 10(22) 2014 Shuying Li and Ya Pan 13781 The demands of users are increasing with the development of cloud computing technology. More and more cloud computing service providers emerge with the tide of fashion. Differences do exist among different cloud service providers as for the nature of service and the scale, especially differences in data security protection and risks-handle abilities. Providers are weak in comprehensive strength and have deficiency will be gradually eliminated. When cloud service providers facing troubles, how to process data stored in cloud is unknown. Considering this, users will take data providers and preservers into consideration when choosing cloud providers. From Figure 5, we can see that users most favored cloud service is 115 network disk, followed by DBank. Among the applications of services under cloud computing, the mostly concerned of users is the security of timely service. Users of cloud computing thought that providers should constantly update relative technology of cloud computing and strengthen supervision so as to guarantee the security of cloud service. &RPSDULVRQVRIWKH1XPEHURI5HJLVWUDWLRQVRI &ORXG6WRUDJH3URGXFWV8QLWHWHQWKRXVDQG QHWZRUN GLVN '%DQN.DQER[.LQJVRIW GLVN FORXG GLVN Figure 5 : Comparisons of the number of registrations of cloud products in the first half of 2011 in China SECURITY STRATEGY ON SECURE DATA TRANSMISSION AND STORAGE BASED ON CLOUD COMPUTING Encryption processing is the commonly used way to guarantee security in data transmission and storage. Data of users can be stored in any storage space in cloud computing secure storage service. After being encrypted, people other than the user can not acquire or access the information. Data encryption and decryption are used in cloud computing data transmission and storage at present. Data encryption processing At the beginning of user data encryption processing, user receives user s data from key store and extracts data with the public key encryption algorithm. Information verification is included in the process of encryption. Then Asymmetric encryption by secret key is carried out. Finally, data information storing secret key and encrypted user information are together stored into cloud. Continue to repeat the process until the final encrypted data is updated to cloud. This also comes to the end of the whole encryption process. When it comes to the encryption large-capacity data storage for users, two asymmetric encryption processes should be added to the secret key of symmetric encryption algorithm before updating secret key and encrypted data to cloud. In this way, users only have to keep the asymmetric encryption algorithm instead of storing large-capacity data, thus reducing the need for storage room. This will also reduces transmission costs and storage costs and makes users management of secret keys more convenient. Data decryption processing When decrypting data, the decrypting party need to use the secret key of asymmetric algorithm to encrypt by carrying out piled encryption algorithm of secret key, thus the secret key is restored. Then the restored secret key will restore all the stored data through decryption packet of piled encryption algorithm. Repeat the above steps and all the data packets will be decrypted. After the completion of all data decryption, we will get the most primitive data of users. Problems in the management of secret key of symmetric algorithm will be addressed through the combination of asymmetric and symmetric algorithms. It also can be used to encrypt large-scale data. This strategy could guarantee that every user can conduct asymmetric encryption on data. Besides, the secret data is preserved in certain store of the cloud. When data exchange is needed by the users, they could download corresponding secret key. Besides, users rights to encrypt the data are also guaranteed. Data encrypted in this way can ensure data security. THE DESIGN OF SECURE DATA STORAGE SYSTEM BASED ON CLOUD COMPUTING The structure model of cloud storage As the foundation and core of cloud computing, cloud storage refers to the process of providing data storage service and business access service externally by the combined efforts of various storage devices through relative application

13782 Study on secure data storage based on cloud computing BTAIJ, 10(22) 2014 devices. During the process, the functions of different network technologies and distributed file systems are also used. Users data storage by cloud computing is not got from a certain storage device, but through the data access service provided by a cloud storage system. The core of cloud storage is to effectively combine application software and storage devices then alter storage devices into a storage service through application software [7]. As shown in Figure 6, the structure model of cloud storage is composed of four layers; they are access layer, application interface layer, basic management layer and storage layer. Each layer is endowed with different function. (1)Access layer: mainly to provide users with application interface for cloud storage system login. The layer provides corresponding access type and access means according to different client units. (2)Application interface layer: characterized by flexibility and changeability. Cloud service providers proved different application service and develop different service interfaces in accordance with business types needed by the users. (3)Basic management layer: it includes cluster system, distributed file system and network computing. These technologies can realize the coordinated work among different storage devices. It is responsible for content distribution, deduplication, data compression, data encryption, data decryption and data backup. (4)Storage layer: the main function of this layer is to realize logical virtualization management of storage devices, centralized management of data, status monitoring of data and system maintain and update. Figure 6 : Structure model of cloud storage The design of secure data storage system under cloud computing environment The design of secure data storage system under cloud computing environment consists of storage cloud, control center, the user interface and Client, as shown in Figure 7. Figure 7 : Architecture of secure data storage system under cloud computing environment (1)Cloud Storage:mainly include two parts, public data storage cloud and private data storage cloud. The function of storage cloud is to store all the data and operations of user without having to proved arithmetic function. Private cloud, by providing business users with a private data storage platform, can guarantee data security. Storage space can be saved by dividing cloud storage into private cloud and public cloud. Besides, it could solve problems of cloud platform that worry the

BTAIJ, 10(22) 2014 Shuying Li and Ya Pan 13783 users. Private cloud provides users with secure platform. The way to achieve private cloud: Linux system with Xen is installed into the physical machine in the clusters. At the same time, all the physical machines open SSH services together. The controller of cloud service provider manages private cloud through Xen and SHH. The relationship among cloud components are shown in Figure 8.