Você está na página 1de 4

International Journal of Computer Trends and Technology (IJCTT) - volume4Issue4 April 2013

Data Storage Security in Multiple Unrelated Cloud Architecture


#1 Vartika, #2.J.Nithin Chowdary, #3 Dr.N.Srinivasu
Department of Computer Science and Engineering, K.L.University, Vaddeswaram, India.

Abstract
The latest and forth coming technology that all the organizations using today is Cloud Computing. Cloud Computing is the emerging technology because the data storage and retrieval for the users has become easy by using this technology. The data storage in the cloud has been a promising issue in these days. This is due to the fact that the users are storing their valuable data and information in the cloud. The users should trust the cloud service providers to provide security for their data. The cloud service providers also providing the security but not up to a complete level. The attack of malicious insiders into the cloud and to steal the data has been increased. This make the users to store their data in the cloud is complicated. But many solutions for the data storage security have been provided recently. This paper mainly focuses on the data storage security in the multiple unrelated cloud architecture. The multiple unrelated cloud architecture consists of many cloud servers which are unrelated to each other. This makes the data to be stored in more than one cloud server. The user can able to access the data from any one of the cloud in this multiple unrelated cloud architecture. The work discussed here is how the security is provided for the data storage in multiple unrelated clouds. This makes the data to be protected from malicious insiders entering into the cloud. So the data of the user cannot be hacked and get protected. The research related to the security provided for the data storage is proposed here.

Key words:
Single cloud, multi cloud, data storage, security, single cloud, multi clouds, mutilple unrelated cloud, malicious insiders, byzantine failures.

1. Introduction:
Cloud data storage redefines the issues targeted on customers out-sourced data (data that is not stored/retrieved from the costumers own servers) [2]. In cloud data storage system, users store their data in the cloud and no longer possess the data locally [1]. So, the correctness and availability of the data files being stored on the distributed cloud servers must be guaranteed. Data storage systems are expected to meet several rigorous requirements for maintaining users data and information, including high availability, reliability, performance, replication and data consistency. This is because of the conflicting nature of these requirements none of the system implements all of them together. When data is distributed it is stored at more locations increasing the risk of unauthorized physical access to the data. For example, in cloud based architecture, data is replicated and moved frequently so the risk of unauthorized data recovery increases dramatically. Risk of unauthorized access to data can be mitigated through the use of encryption, which can be applied to data as part of the storage service or by on-premises equipment that encrypts data prior to uploading it to the cloud. Cloud storage may be cost-efficient for many corporations and small businesses for everyday use, but for the average user of the

General terms:
Attack, data storage, cloud architecture, security

ISSN: 2231-2803

http://www.ijcttjournal.org

Page 651

International Journal of Computer Trends and Technology (IJCTT) - volume4Issue4 April 2013

computer and internet, the costs of cloud storage may outweigh its benefits

2. Background:
2.1. Components in Cloud Computing: Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services). There are five characteristics, three delivery models and four deployment models in cloud environment architecture. The five key characteristics of cloud computing are: location independent resource pooling, on-demand self-service, rapid elasticity, broad network access, and measured service The three delivery models are infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Infrastructure as a Service is the delivery of computer hardware (servers, networking technology, storage, and data center space) as a service. It may also include the delivery of operating systems and virtualization technology to manage the resources. Platform as a Service includes the delivery of more than just infrastructure. It delivers what you might call a solution stack-an integrated set of software that provides everything a developer needs to build an application for both software development and runtime. Software as a Service is the delivery of business applications designed for a specific purpose. The deployment models are public, private, hybrid and community models.

Figure 1: Data Storage in a Single Cloud

2.3. Multi Clouds: In a multi cloud environment the cloud architecture is made up of multi clouds in which in a big cloud there are different sub-clouds or inter-clouds. Each sub cloud will store the data and the user can access the stored information from any cloud. The data from all the sub clouds can be maintained and can be accessed by the user from a database management system. This is known as the multi cloud database system MCDB [7]. In multi-clouds the solutions for the security issues like data integrity, intrusion and service providence are solved. But if the hacker knows the cloud from which the users access his data he can easily hack it. So the security for the data storage has not been achieved to a complete level.

2.2. Single Cloud: In a single cloud environment the data of the users is stored in the cloud itself. The data is encrypted and stored in the cloud. But if the hacker knows the decryption technique he can easily hack the data. In a single cloud there is a third party auditor who will encrypt and decrypt the text or data. So the database should be provided with high security levels. If the data at the third party auditor is not encrypted in such a way that the hacker knows the decryption algorithm then it gets hacked easily. The out sourced files can be collected by the user from the data base. This storage has some security issues like data integrity, data intrusion and service availability.

2.4. Multiple Unrelated Clouds: In Multiple unrelated cloud architecture the data storage is done in the same way as in multi cloud architecture. In multi cloud architecture each sub cloud has data storage. Likewise in Multiple Unrelated cloud architecture different sub clouds of different cloud providers have their own data storage. The data storage of all the sub clouds will interact with the central database to send the response to the user. Thus the user can send requests and accept the response by using the multiple cloud database system.

ISSN: 2231-2803

http://www.ijcttjournal.org

Page 652

International Journal of Computer Trends and Technology (IJCTT) - volume4Issue4 April 2013

3. Related Work:
According to Amir Mohamed Talib et al. [1] Multi Agent System (MAS) techniques should be used for Cloud Data Storage (CDS) and Cloud Data Storage Security (CDSS). MAS architecture offered eleven security attributes generated from four main security policies of correctness, integrity, confidentially and availability of users data in the cloud. Neetha et al. [3] proposed solutions for security risks like data integrity, intrusion and service availability. But the service availability can be still a problem in the cloud because the cloud service providers cannot provide service at a time for many users. The interfaces between the cloud providers and the network traffic between the providers will still remain as a problem. Deepanchakaravarthi et al. [4] presented a research on security for data access from unauthorized users. Quality of service is an important aspect for data security. If there is no quality of service there will be catastrophic failures in data updating, deleting, appending and during the data transmission. According to Mehdi Hojabri et al. [5] the data storage security is proposed by implementation of Kerberos authentication service. It consists of a Authentication service (AS) and a Ticket Granting Service (TGS) for the authentication of the user to the authenticated cloud server. This provides the security for the data storage. Cong Wang et al. [6] proposed a system in which one of the security issues for the data storage in cloud is byzantine failure. The byzantine failures can get overcome by using the byzantine fault tolerant replication protocol. But using this inside a cloud doesnt support the cloud architecture. So it can be used in multi clouds and unrelated multi cloud architecture to avoid the byzantine failures in the data storage. Mohammed A. AlZain et al. [7] suggested a system known as Multi- cloud database Model (MCDB) to provide data storage in a multi cloud. This will provide high service availability for the users without any time delay. The issues like data integrity and intrusion can also be reduced. The MCDB contains three layers: presentation layer, application layer and the data management layer. These layers will perform their work in the data interaction

between the user and the cloud server. The data flow can be done through http server and servlet engine. Rajasekar et al. [8] proposed a secured cost-effective multicloud storage (SCMCS) model in cloud computing which holds an economical distribution of data among the available SPs in the market, to provide customers with data availability as well as secure storage. To ensure data availability, the users data block is divided into data pieces and distributed among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block. Qian Wang et al. [9] had done research on data storage security and gave two salient features in the protocol design. They are to achieve efficient data dynamics and to support efficient handling of multiple auditing tasks. TPA can perform multiple auditing tasks simultaneously so that the data availability is high and the data integrity can be maintained.

4. Data storage in Multiple Unrelated Clouds:


The Multiple Unrelated cloud data storage consists of several cloud providers, a central database management system for all the providers and the client who interacts with the data source through servlet engine and the http server. The cloud providers in an unrelated multi cloud environment contain many sub clouds which are from different unrelated cloud servers. They combine to form a big cloud for the communication between the server to server and server to client. The data storage is the important aspect in the unrelated multiple cloud storage. This is due to the fact that the cloud providers are different and they are not related to each other. So security must be provided in a high level. If the security can be provides to a complete level then the users can get access to their data without any problem. So several security issues of the data storage security have been solved by using this cloud architecture. Here the byzantine fault tolerant protocol can be suited for rectifying the errors caused due to byzantine failures. Mostly the problems faced are the message is not delivered in a sequence, the message will not reach within the time and the message will get changed by reaching the client.

ISSN: 2231-2803

http://www.ijcttjournal.org

Page 653

International Journal of Computer Trends and Technology (IJCTT) - volume4Issue4 April 2013

These failures can be prevented and security for the data storage is provided in this architecture.

References:
[1] Amir Mohamed Talib, Rodziah Atan, Rusli Abdullah & Masrah Azrifah Azmi Murad, Security Framework of Cloud Data Storage Based on Multi Agent System Architecture: Semantic Literature Review, Faculty of Computer Science & IT, University Putra Malaysia. [2] B.AmarNadh Reddy, P.Raja Sekhar Reddy, Effective Data Distribution Techniques for Multi-Cloud Storage in Cloud Computing, CSE, Anurag Group of Institutions, Hyderabad, A.P, India. [3] T.Neetha, CH.Sushma, Security for Effective Data Storage in Multi Clouds, Kommuri Pratap Reddy Institute of Technology, Hyderabad, India. [4] Deepanchakaravarthi Purushothaman and Dr.Sunitha Abburu, An Approach for Data Storage Security in Cloud Computing, Adhiyamaan College of Engineering, Hosur, Tamilnadu-635109, India. [5] Mehdi Hojabri, Ensuring data storage security in cloud computing with effect of Kerberos. [6] Cong Wang, Qian Wang, and Kui Ren, Ensuring Data Storage Security in Cloud Computing, Illinois Institute of Technology. [7] Mohammed A. AlZain, Ben Soh and Eric Pardede, MCDB: Using Multi-Clouds to Ensure Security in Cloud Computing, Department of Computer Science and Computer Engineering, LaTrobe University, Bundoora 3086, Australia. [8] K.Rajasekar & C. Kamalnathan, Towards Of Secured Cost-Effective Multi-Cloud Storage in Cloud Computing, Bannari Amman Institute of Technology, Sathyamangalam, Erode. [9] Qian Wang, Cong Wang, Kui Ren, Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing.

Figure 2: Data Storage in Multiple Unrelated Cloud Architecture

5. Conclusion:
Cloud computing is the emerging technology in the IT Enterprise. The use of cloud computing and its technologies have been increased and many users look forward to do their work in the cloud. Providing security for data storage has been an important aspect in cloud computing. Many companies are coming with different architectures for the data storage in the cloud. By using the unrelated multiple cloud data storage the security issues will get reduced and the user can put his data in the safe hands. So the cloud providers and the companies should make use of this architecture for better data storage in the cloud.

ISSN: 2231-2803

http://www.ijcttjournal.org

Page 654

Você também pode gostar