IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 289-295

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Secure the Cloud Storage and Recovery of Security Risks and Problems in Single Cloud. 1

Sireesha Chekuri, Seelam Satyanarayana Reddy PG Scholar, Computer Science and Engineering, Lakki Reddy Balli Reddy College of Engineering Mylavaram, Andhra Pradesh, India [email protected] Professor, Computer Science and Engineering, Lakki Reddy Balli Reddy College of Engineering 2Mylavaram, Andhra Pradesh, India [email protected]

Abstract Now a day‟s rapidly increased use of cloud computing in the many organization and IT industries and provides new software with low cost . Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. In this paper, we will comprehensively survey the concepts and architecture of cloud computing, as well as its security and privacy issues. Dealing with “single cloud” providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud. A movement towards “multi-clouds”, or in other words interclouds or cloud-of-clouds has emerged recently. In this paper, we provide solutions for secure cloud storage in multi cloud based system. In this paper we have represented the survey on different issues related to data storage security on single cloud as well as multi cloud and fault tolerance . This work aims to promote the use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user. This paper surveys to many running research related paper to single cloud and multi clouds security using Shamir‟s Secret Sharing algorithm Keywords— Cloud computing, single cloud, multi-cloud, data privacy, models, data integrity, cloud storage, data intrusion, service availability.

1. INTRODUCTION Cloud computing is the next generation in the Internet's technology which provides the user everything in terms of services like computing power to computing infrastructure, applications, business processes as per the need of user over the internet. Cloud providers should address privacy and security issues as a matter of high and urgent priority. Dealing with “single cloud” providers is becoming less popular with customers due to potential problems such as service availability failure and the possibility that there are malicious insiders in the single cloud. Cloud computing is quickly becoming one of the most popular and trendy phrases being tossed around in today’s technology world. According to The Economist in a 2008 article, it will have huge impacts on the information technology industry, and also profoundly change the way people use computers [2]. ]. Cloud computing resources can be quickly extracted and effortlessly scaled with all the processes, services and applications provisioned on demand service despite the consequences of the user location or device. Sireesha Chekuri,IJRIT

289

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 289-295

Hence, the opportunity for an organization to enhance their service achieved through cloud computing.

deliverance

efficiencies

is

This paper focuses on the issues related to the data security aspect of cloud computing. As data and information will be shared with a third party, cloud computing users want to avoid an untrusted cloud provider. Protecting private and important Cloud providers should address privacy and security issues as a matter of high and urgent priority. Dealing with “single cloud” providers is becoming less popular with customers due to potential problems such as service availability failure and the possibility that there are malicious insiders in the single cloud. In recent years, there has been a move towards “multiclouds”, “intercloud” or “cloud-of-clouds”. In order to define cloud computing, it is first necessary to explain what is referenced by the phrase “The Cloud”. The first reference to “The Cloud” originated from the telephone in-dustry in the early 1990s, when Virtual Pri-vate Network (VPN) service was first offered. Aim of the paper the data security aspect of cloud computing, data and information will be shared personal and important documents such as debit/credit cards details or medical report from hackers or malicious insiders is the importance. It supply secure cloud database that will prevent security risks. Cloud computing has four main features: elasticity, self-service of provisioning and need base usage payment. a.

Deployment Models There are Four different deployment models of cloud computing. 1. Public Cloud: Public or external cloud is one of type of cloud in which user can use the recourses as per the need and pay for usage. This type of cloud also has various service providers who provide traditional cloud computing services to users and charged for it. 2. Private Cloud: Private cloud is the type of cloud in which the cloud is operated in only one organization or developed for one organization and managed by them or third party service provides. Basically this type of cloud is for the internal purpose of organization which is operated in geographically distributed. 3. Hybrid Cloud: Hybrid Cloud can be made up with the combination of two type of cloud like private and public cloud or the combination of cloud virtualization server with physical hardware. This type of cloud is much cost expensive compare to public cloud. 4. Community Cloud: If several organizations have similar kind of requirement, they can share the cloud then this type of cloud establishment is made possible in market. This cloud is also costly in compare to public cloud but provides high level security.

1.deployment models.

Sireesha Chekuri,IJRIT

290

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 289-295

B.Services of Cloud Computing Cloud computing is offered in different forms: public clouds, private clouds, and hybrid clouds, which combine both public and private [3]. 1. Cloud Software as a Service (SaaS) : Software as a Service provides software or application which can be used over the internet and user does not have not aware of any information regarding operating system, physical hardware. This type of application can be access via internet and through browser at user side. User can have only some of control setting for application. 2. Cloud Platform as a Service (PaaS) : Platform as a Service provide the setup of client’s software packages and other tools which set up on service providers’ physical hardware over the internet. So whole establishment is take place on service providers’ environment and user can access that software after authentication process passes successfully. This user can free from the hardware failure problem by adopting this service. 3. Cloud Infrastructure as a Service (IaaS) : In this type of cloud, user can have whole virtual server and user can access it as he can access it local like start, needs them.

2.Cloud Services

C. Benefits of Cloud Computing 1. Reduction in capital expenditure on hardware and software deployment. 2. Location independence, as long as there is access to the Internet. 3. Increased flexibility and market agility as the quick deployment model of cloud computing increases the ability to re-provision rapidly as required. 4. Allows the enterprise to focus on its core business. 5. Increased competitive advantage. 6. Increased security at a much lesser cost as compared to traditional standalone applications due to centralization of data and increased security-focused resources. 7. Easy to maintain as they don't have to be installed on each user's computer. The cloud services that are implemented or those that will be implemented will always be accompanied by several threats. Knowledge about these threats shall prove to be the first step to prevent them. Hence security is the chief concern of several clients who desire to leverage cloud services. In all types of cloud, security issues arrive in many ways in different phases such as user’s authentication, open source provision, virtual infrastructure, SLA, data storage and resource request[5]. Out of Sireesha Chekuri,IJRIT

291

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 289-295

these, Cloud based data storage systems have many complexities regarding critical/confidential/sensitive data of client. The trust required on Cloud storage is so far far had been limited by users [6]. The survey of related research work done on the cloud data storage security is discussed in the paper. The discussion spans the security challenges with respect to the type of deployment, service and common network issues.

2. Cloud architecture NIST [1] describes cloud computing as “a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”.The cloud computing model consists of five characteristics, three delivery models, and four deployment models [1]. The five key characteristics of cloud computing are: locationindependent resource pooling, on-demand self-service, rapid elasticity, broad network access, and measured service [51]. These five characteristics represent the first layer in the cloud environment architecture Cloud deployment models include public, private, community, and hybrid clouds. A cloud environment that is accessible for multi-tenants and is available to the public is called a public cloud,and private cloud is available for a particular group, while a community cloud is modified for a specific group of customers. Hybrid cloud infrastructure is a composition of two or more clouds (private, community, or public cloud) [51]. This model represents the third layer in the cloud environment architecture. Cloud service providers should ensure the security of their customers’ data and should be responsible if any security risk affects their customers’ service infrastructure. A cloud provider offers many services that can benefit its customers, such as fast access to their data from any location, scalability, pay-for-use, data storage, data recovery, protection against hackers, on-demand security controls, and use of the network and infrastructure facilities [49].

3. Cloud computing architecture

Sireesha Chekuri,IJRIT

292

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 289-295

3. Cloud Computing-security risks According to Amazon [46], their EC2 addresses security control in relation to physical, environmental, and virtualization security, whereas, the users remain responsible for addressing security control of the IT system including the operating systems, applications and data. According to Tabakiet al. [51], the way the responsibility for privacy and security in a cloud computing environment is shared between consumers and cloud service providers differs between delivery models. In SaaS, cloud providers are more responsible for the security and privacy of application services than the users. This responsibility is more relevant to the public than the private cloud environment because the clients need more strict security requirements in the public cloud. In PaaS, users are responsible for taking care of the applications that they build and run on the platform, while cloud providers are responsible for protecting one user’s applications from others. In IaaS, users are responsible for protecting operating systems and applications, whereas cloud providers must provide protection for the users’ data [51]. As the cloud services have been built over the Internet, any issue that is related to internet security will also affect cloud services. Resources in the cloud are accessed through the Internet; consequently even if the cloud provider focuses on security in the cloud infrastructure, the data is still transmitted to the users through networks which may be insecure. As a result, internet security problems will affect the cloud, with greater risks due to valuable resources stored within the cloud and cloud vulnerability. The technology used in the cloud is similar to the technology used in the Internet. Encryption techniques and secure protocols are not sufficient to protect data transmission in the cloud. Data intrusion of the cloud through the Internet by hackers and cybercriminals needs to be addressed and the cloud environment needs to be secure and private for clients [49]. We will address three security factors that particularly affect single clouds, namely data integrity, data intrusion, and service availability.

4. Details of Proposed Security Mechanism A. Data integrity in Multi Cloud We provide a fast and effective mechanism for providing data integrity for user data in multi cloud. Our mechanism is a hash based approach. The users file is split to many blocks. At any instant of time the files are stored in two different clouds. For each block hash is calculated and the hash is also maintained in the cloud. When any user requests for the cloud, the file blocks are retrieved from two cloud locations. The blocks are ideally kept in different storage servers in the cloud. The blocks are assembled to form wherever it is not corrupted. The corrupted blocks are replaced with valid block from other locations. Through the hash value of block matching with stored hash value the integrity is verified. We also keep track of number of times the files for corrupted for the user and the number of times the files are corrupted in the cloud server. If the count of the number of times file corrupted for user are higher, then it concludes the authentication of the user has a leakage and his files are purposely corrupted by compromise of authentication parameters. In our proposed system we will keep various levels of security and different security profiles will be enabled based on the file corruption threshold parameter. Also from the count of number of times files getting corrupted in cloud server, reputation of storage server is found. This will help the administrators to use mechanism like firewalls to improve the security of lower reputation storage servers. Based on the reputation of all servers in the cloud storage the reputation of the cloud calculated. If the reputation of cloud is lower the cloud data is backed up to other cloud and cloud is removed all the contents and that storage cloud is drooped from use for storage. While penalizing the cloud for its lower reputation , we should also consider that compromise in user security may be due to user fault and penalizing should not be done due to this fault. The file corruption Sireesha Chekuri,IJRIT

293

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 289-295

condition must be accounted in bas reputation only when highest security profile is allocated to user and still data corruption occurs.

B. Data Intrusion in Multi Cloud To avoid data intrusion, ie user authentication is hacked and fake users login and corrupt the data we the user data is corrupted , he is move to highest security profile level starting from the lower security profile level. In our proposed solution we provide but many levels can be provided 1. User name , password based authentication 2. Secure session id sent to user on his mobile phone for authentication 3. Biometric authentication. The default security profile is Level 1 user name/Password based authentication. If the user files are frequently corrupted with Level 1, than provided a multi level security profile for the user. The levels of security for the user are very adaptive. If for the particular user Level 2 authentication is used. In Level 2 user has to enter his user id and get the password for access on his registered mobile number and he has to login using that password. This mechanism is more secure than Level 1. If the user file is still getting corrupted in Level 2 , the authentication is migrated to Level 2. In Level 2 biometric authentication is provided which is much more secure than Level1.

C. Service Availability in Multi cloud Service availability is multi cloud is guaranteed with replicated file storage in two clouds. The file is replicated in the minimum of two clouds so that any point of time one cloud is always available. At each cloud , the file blocks are kept in the cloud storage , to guarantee high availability for the block. 1+1 replication for blocks are kept in servers , so that even if one of server is down the blocks can be retrieved from other server.

5. Conclusion and Enhancements Although the use of cloud computing has rapidly increased, cloud computing security is still considered the major issue in the cloud computing environment. The main purpose of this work is to survey the recent research done on single cloud as well as on multi cloud to solve the security issues faced by the data owners. . Customers do not want to lose their private information as a result of malicious insiders in the cloud. In addition, the loss of service availability has caused many problems for a large number of customers recently. Furthermore, data intrusion leads to many problems for the users of cloud computing. In this paper , we have proposed solutions for three most common security threat in cloud storage. We have proved that our mechanism performs better in reducing the security threat on cloud.

6. References [1] [2] [3] [4] in [5] [6]

(NIST), http://www.nist.gov/itl/cloud/. I. Abraham, G. Chockler, I. Keidar and D. Malkhi, "Byzantine disk paxos: optimal resilience with Byzantine shared memory", Distributed Computing, 18(5), 2006, pp. 387-408. Margaret Rouse, “CLOUD APPLICATION PERFORMANCE MANAGEMENT: DOING THE JOB RIGHT“, last modified December 2010. Anju Bala, Inderveer Chana, “Fault Tolerance- Challenges, Techniques and Implementation Cloud Computing”, in the year of January 2012. M.A. AlZain and E. Pardede, "Using Multi Shares for Ensuring Privacy in Database-as-a-Service", 44th Hawaii Intl. Conf. on System Sciences (HICSS), 2011, pp. 1-9. Amazon, Amazon Web Services. Web services licensing agreement, October3,2006. [7] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, "Provable data possession at untrusted stores", Proc. 14th ACM Conf. on Computer and

Sireesha Chekuri,IJRIT

294

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 6, June 2014, Pg: 289-295

[8] [9] [10] [11] [12] [13] [14]

[15] [16] [17] [18] [19]

communications security, 2007, pp. 598-609. Gangolu Sreedevi, Prof. C. Rajendra,” ICCC: Information Correctness to the Customers in Cloud Data Storage”, in the year of June 2012. Rupali Sachin Vairagade, Nitin Ashokrao Vairagade ,” Cloud Computing Data Storage and Security Enhancement”, in the year of August 2012. K.D. Bowers, A. Juels and A. Oprea, "HAIL: A high-availability and integrity layer for cloud storage", CCS'09: Proc. 16th ACM Conf. on Computer and communications security, 2009, pp. 187-198. C. Cachin, R. Haas and M. Vukolic, "Dependable storage in the Intercloud", Research Report RZ, 3783, 2010. C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud", ACM SIGACT News, 40, 2009, pp. 81-86. C. Cachin and S. Tessaro, "Optimal resilience for erasure-coded Byzantine distributed storage", DISC:Proc. 19thIntl.Conf. on Distributed Computing, 2005, pp. 497-498 Amir Mohamed Talib, Rodziah Atan, Rusli Abdullah, Masrah Azrifah Azmi Murad,” Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi-Agent System Architecture”, in the year of 2012. G. Chockler, R. Guerraoui, I. Keidar and M. Vukolic, "Reliable distributed storage", Computer, 42, 2009, pp. 60-67. Clavister, "Security in the cloud", Clavister White Paper, 2008. A.J. Feldman, W.P. Zeller, M.J. Freedman and E.W. Felten, "SPORC: Group collaboration using untrusted cloud resources", OSDI, October2010, pp. 1-14. G.R. Goodson, J.J. Wylie, G.R. Ganger and M.K. Reiter, "Efficient Byzantine-tolerant erasurecoded storage",DSN'04: Proc.Intl. Conf. on Dependable Systems and Networks,2004, pp.1-22. E. Grosse, J. Howie, J. Ransome, J. Reavis and S. Schmidt, "Cloud computing roundtable", IEEE Security & Privacy, 8(6), 2010, pp. 17-23.

Sireesha Chekuri,IJRIT

295

Secure the Cloud Storage and Recovery of Security Risks and ... - IJRIT

Now a day‟s rapidly increased use of cloud computing in the many organization and IT industries and provides new software with low cost . Ensuring the ...

738KB Sizes 2 Downloads 198 Views

Recommend Documents

Secure the Cloud Storage and Recovery of Security Risks and ... - IJRIT
of multi-clouds due to its ability to reduce security risks that affect the cloud computing user. ... In order to define cloud computing, it is first necessary to explain what is ... Software as a Service provides software or application which can be

Secure overlay cloud storage with access control and ...
We design and implement FADE, a secure overlay cloud storage system that achieves ... a more fine-grained approach called policy based file assured deletion, ...

Security and Interoperability in Cloud Computing and Their ... - IJRIT
online software applications, data storage and processing power. ... Interoperability is defined as Broadly speaking, interoperability can be defined ... Therefore, one of the solutions is to request required resources from a cloud IaaS provider.

Security and Interoperability in Cloud Computing and Their ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, ..... which its role is a service management, data transmission, service brokerage ...

Towards secure the multi –cloud using homomorphic ... - IJRIT
atomism of traditional social science in which individual behavior—such as ... Title : Public-Key Cryptosystems Based on Composite Degree Residuosity Classes ... The social network field is an interdisciplinary research programmer which ...

Towards secure the multi –cloud using homomorphic ... - IJRIT
Towards secure the multi –cloud using homomorphic encryption scheme. Rameshbabu .... in the design of current SNA techniques. Multiple key issues can be ...

Diversification and Energy Security Risks: The ...
The 1973 Arab–Israeli war and the subsequent oil crisis had a significant impact on Japanese energy policy. In response to increased oil prices and concerns about the availability of oil, Japan institutionalised a policy which had two pillars designe

Identity-Based Secure Distributed Data Storage with Dual ... - IJRIT
In Cryptographic. File System scheme the reliability of the perceptive file is provided by digital signature methods and the message authentication codes. (MAC).

Identity-Based Secure Distributed Data Storage with Dual ... - IJRIT
In Cryptographic. File System scheme the reliability of the perceptive file is provided by digital signature methods and the message authentication codes. (MAC).

Safe-And-Secure-Transport-And-Storage-Of-Radioactive-Materials ...
Page 1 of 3. Download ]]]]]>>>>>(PDF) Safe And Secure Transport And Storage Of Radioactive Materials. [eBooks] Safe And Secure Transport And Storage Of. Radioactive Materials. SAFE AND SECURE TRANSPORT AND STORAGE OF RADIOACTIVE MATERIALS EBOOK AUTHO

Data Security Proofs in the Cloud Storage Data ... - IJRIT
Company, who desires to store their data in the cloud, buy or lease storage capacity from them ... Blob store, cloud by Apple. ... It's further complicated for the owner of the data whose devices like Personnel Digital Assist and mobile phones.

Data Security Proofs in the Cloud Storage Data ... - IJRIT
In cloud computing, data is moved to a remotely located cloud server. Cloud ... Data Integrity is very important among the other cloud storage issues. .... The next generation of cloud storage provides a new architecture to address the storage, ...

Yobicash: a cryptocurrency for secure sharing and storage of data
The World Wide Web is built on top of technologies for sharing, storing and retrieving data. A few decades after its inception, the web has become the backbone of the information economy, and thanks to innovations as the Internet of Things, Virtual R

Privacy Preserving Public Auditing for Secure Cloud Storage Using TPA
the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. To securely introduce an ...

Evolving Methods of Data Security in Cloud Computing - IJRIT
TPA makes task of client easy by verifying integrity of data stored on behalf of client. In cloud, there is support for data dynamics means clients can insert, delete or can update data so there should be security mechanism which ensure integrity for

An Approach For Integrity Verification In Multi Cloud Storage ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 7, July 2014, Pg: 100-105. Vinitha Varghese ... In this paper, we address the ... Since cloud computing environment is constructed based on open architectures ...

An Approach For Integrity Verification In Multi Cloud Storage ... - IJRIT
using virtual infrastructure management (VIM) , a multi-cloud allows clients to easily ... These tools help cloud providers construct a distributed cloud storage ...

P3 explain the security risks and protection mechanisms involved in ...
P3 explain the security risks and protection mechanisms involved in website performance.pdf. P3 explain the security risks and protection mechanisms involved ...

P3 explain the security risks and protection mechanisms involved in ...
virus can have the risk of simply causing your internet connection fail or as ... Facebook has to legally comply with the Data Protection Act. of 1998 ... P3 explain the security risks and protection mechanisms involved in website performance.pdf.

Storage Architecture and Challenges Cloud Platform
Jul 29, 2010 - A typical warehouse-scale computer: 10,000+ ... 2-10%: disk drive annualized failure rate .... Roger wants to see data on laptop from phone.

Diversification and Energy Security Risks: The ...
than seeking to define energy security comprehensively and while ..... index models in terms of ease of calculating the enormous number of co-variances.

Enabling Secure and Efficient Ranked Keyword ... - IJRIT
the problem of secure ranked keyword search over encrypted cloud data. Ranked search greatly enhances system usability by enabling search result relevance ...