58,883 research outputs found

    State of The Art and Hot Aspects in Cloud Data Storage Security

    Get PDF
    Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area. In this paper, we examine the state of the art in cloud storage security through an overview of selected peer reviewed publications. We address the question of defining cloud storage security and its different aspects, as well as enumerate the main vec- tors of attack on cloud storage. The reviewed papers present techniques for key management and controlled disclosure of encrypted data in cloud storage, while novel ideas regarding secure operations on encrypted data and methods for pro- tection of data in fully virtualized environments provide a glimpse of the toolbox available for securing cloud storage. Finally, new challenges such as emergent government regulation call for solutions to problems that did not receive enough attention in earlier stages of cloud computing, such as for example geographical location of data. The methods presented in the papers selected for this review represent only a small fraction of the wide research effort within cloud storage security. Nevertheless, they serve as an indication of the diversity of problems that are being addressed

    Cloud Computing Data Security: A Review

    Get PDF
    Cloud computing has great potential of providing robust computational power to the society at reduced cost. With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. This data would be more useful to cooperating organizations if they were able to share their data. Two major obstacles to this process of data sharing are providing a common storage space and secure access to the shared data. All types of users who require the secure transmission or storage of data in any kind of media or network. We are in great need of encrypting the data. A method to build a trusted computing environment for Cloud Computing system by providing Secure cross platform in to Cloud Computing system. In this method some important security services including authentication, encryption and decryption are provided in Cloud Computing system. In this paper, we propose Data Storage Security by using Trusted Platform Module to achieve storage correctness incorporating Cloud’s dynamic nature while maintaining low computation and communication cost and ensures the security of static data

    On the Application of Cloud Computing Technology in Computer Security Storage

    Get PDF
    With the widespread adoption of the Internet and the growing volume of data storage, cloud computing has emerged as the predominant method for storing information. It offers users convenient and efficient storage processes, along with remarkable flexibility and scalability. By dynamically allocating computing resources and storage space according to user needs, cloud computing ensures secure storage of information data. In light of this, this paper provides a comprehensive overview of the specific application of cloud computing technology in the field of computer security storage

    Secure Authorized Deduplication for Hybrid Cloud Storage

    Get PDF
    Cloud computing provides number of applications, as utilities in the internet .This applications create, configure and customize accessing referring the cloud computing as online utility. Cloud computing offers online data storage, infrastructure, services over networks and applications. Cloud storage is an widely popular offering of cloud computing. Cloud storage is used for increasing the number of users, access the users data from anywhere and also space for data storage in computing. Data deduplication means a type of data compression. This data compression to reduce its storage requirement using encoding of data. Data deduplication method used for replacement of multiple copies of data or eliminating duplicate copies of data. It also reduce storage space and save bandwidth. Deduplication is having one of the advantage for new security and privacy challenges with high cost. Basically, data deduplication means of reducing storage space in cloud. In this paper certain improves the speed of data deduplication with encrypted data reduces the cloud storage capacity of data. This paper first to show that addressing the problem of secure authorized data deduplication. Data deduplication works by eliminating data and ensuring that only one unique instance of data. Hence,Data deduplication is also called as single instance storage, because of the differential privilege of users considered in duplicate check. In this paper we implement that deduplication with encrypted data using SHA and MD5 algorithm for hybrid cloud storage

    Attribute-Based Encryption Scheme for Secured data Storage in Cloud Computing

    Get PDF
    This a storage security model in Cloud Computing and making a considerable measure of convincing purposes behind organizations to convey cloud-based storage. For another business, start-up costs are fundamentally decreased in light of the fact that there is no compelling reason to contribute capital in advance for an inner to help the business. By a long shot, the main inquiry customers considering a move to cloud storage ask is regardless of whether their data will be secure. Stored data offsite doesn't change data security necessities; they are the same as those confronting data put away on location. Security ought to be based on business prerequisites for particular applications and data sets, regardless of where the data is stored. We trust that data storage security in Cloud Computing, a zone brimming with challenges and of fundamental significance, is still in its earliest stages now, and numerous examination issues are yet to be distinguished. In this paper, we examined the issue of data security in cloud data storage, to guarantee the rightness of customers' data in cloud data storage. We proposed a Hierarchical Attribute-Based Secure Outsourcing for moldable Access in Cloud computing which likewise guarantees data storage security and survivability accordingly giving put stock in condition to the customers. To battle against unapproved data spillage, delicate data must be encoded before outsourcing in order to give end-to-end data confidentiality affirmation in the cloud and past. It upgrades the security in the proposed model successfully.

    A Survey on Secure Storage Services in Cloud Computing

    Get PDF
    Cloud computing is an emerging technology and it is purely based on internet and its environment It provides different services to users such as Software-as-a-Service SaaS PaaS IaaS Storage-as-a-service SaaS Using Storage-as-a-Service users and organizations can store their data remotely which poses new security risks towards the correctness of data in cloud In order to achieve secure cloud storage there exists different techniques such as flexible distributed storage integrity auditing mechanism distributed erasure-coded data Merkle Hash Tree MHT construction etc These techniques support secure and efficient dynamic data storage in the cloud This paper also deals with architectures for security and privacy management in the cloud storage environmen

    The Secured Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing

    Get PDF
    This paper is an endeavor to give an upgraded data storage security model in Cloud Computing and making a put stock in condition in cloud computing. There are a considerable measure of convincing purposes behind organizations to convey cloud-based storage. For another business, start-up costs are fundamentally decreased in light of the fact that there is no compelling reason to contribute capital in advance for an inner to help the business. By a long shot, the main inquiry customers considering a move to cloud storage ask is regardless of whether their data will be secure. Stored data offsite doesn't change ata security necessities; they are the same as those confronting data put away on location. Security ought to be based on business prerequisites for particular applications and data sets, regardless of where the data is stored. We trust that data storage security in Cloud Computing, a zone brimming with challenges and of fundamental significance, is still in its earliest stages now, and numerous examination issues are yet to be distinguished. In this paper, we examined the issue of data security in cloud data storage, to guarantee the rightness of customers' data in cloud data storage. We proposed a Hierarchical Attribute-Based Secure Outsourcing for moldable Access in Cloud computing which likewise guarantees data storage security and survivability accordingly giving put stock in condition to the customers. To battle against unapproved data spillage, delicate data must be encoded before outsourcing in order to give end-to-end data confidentiality affirmation in the cloud and past. It upgrades the security in the proposed model successfully

    Handling Confidential Data on the Untrusted Cloud: An Agent-based Approach

    Get PDF
    Cloud computing allows shared computer and storage facilities to be used by a multitude of clients. While cloud management is centralized, the information resides in the cloud and information sharing can be implemented via off-the-shelf techniques for multiuser databases. Users, however, are very diffident for not having full control over their sensitive data. Untrusted database-as-a-server techniques are neither readily extendable to the cloud environment nor easily understandable by non-technical users. To solve this problem, we present an approach where agents share reserved data in a secure manner by the use of simple grant-and-revoke permissions on shared data.Comment: 7 pages, 9 figures, Cloud Computing 201
    • …
    corecore