Você está na página 1de 4

Data storage & Third Party Auditing Services in

Cloud Computing: A Review


Dandawate Vrushali Vilas Pathan Noumankhan Sayeedkhan DR. R. C. Thool
Information Technology Department Information Technology Department Information Technology Department
SGGS IE&T SGGS IE&T SGGS IE&T
Vishnupuri, Nanded Vishnupuri, Nanded Vishnupuri, Nanded
dandawatevrushali@yahoo.in noumanps@gmail.com rcthool@yahoo.in

Abstract-- Cloud computing technology today seen as the next- o Software as a Service (SaaS): Saas provides a
generation architecture of IT solution. Cloud computing is the software services to the end user. Web –based email
way of providing computing resources in the form of service and Google documents are best example of this
rather than a product. It also enables its user to store and access service. End user gets access to this software service
their data anywhere and anytime, and these services are
but he/she cannot modify this software utility
provided to the users over internet. To do so Users move their
data and application software to the internet network. Due to this .Software is configured on cloud utility not installed
it brings many new different security challenges. Ensuring data on end user computer.
storage security and maintaining the integrity stored data are the o Platform as a Service (PaaS): PaaS provides a
more crucial of them. A Third party auditor between data owner platform or an environment on which end user can
and cloud service provider is something which ensures the develop his own application. User is transparent about
integrity of the user data stored on the network, and reduces the the location of the platform whether it is hosted on
burden of data owner to audit the data in the cloud and it also cloud or (not).Google App engine is an example of
make the data owner free from worrying about the data lose in PaaS.
cloud storage.
End users access cloud based applications through a web
Index Terms—Cloud Computing, Third party auditor , cloud browser or a light weight desktop or a mobile app while the
service provider business software and data are stored on servers at a remote
location. Cloud application provider attempts to give the same
or better service and performance than if the software programs
I. INTRODUCTION were installed. Cloud computing entrusts services with user’s
Cloud computing is a specific style of computing in which data, software and computation on a published application
everything from computing power to infrastructure are programming interface over a network. The data is often of
provided as a service. Also cloud computing name comes from great value and its irrecoverable loss or damage could be a total
the use of cloud-shaped symbol as an abstraction for the disaster for its owner.
complex infrastructure it contains in system diagrams. In cloud, The main goal of cloud computing concept is to secure,
shared resources, software and information is provided as a defend the data and also the processes which come under the
metered service. Cloud computing has been envisaged as the property of users [4]. Cloud storage is built on the network
most promising technology of IT enterprise. It manages and computing environment. There are many benefits to move data
schedules the computing resources through network, and into the cloud. For example, users do not have to care about the
composes a large computing resources pool which can provide complexities of direct hardware management. But since users
service to users on their demand. Users can update stored their data in the cloud, it means that they will lose the
application/OS/middleware security patches faster because of control of them and more and more worries will come out
higher availability of staff and resources. The most about the data security. Such fear is becoming a barrier to
representative commercial cloud platforms are Amazon Elastic cloud services provider. There are following two issues [5]:
Compute Cloud (EC2) and Amazon Simple Storage System o Data handling can be done by the cloud service
[1], Google App Engine [2], and Microsoft Azure [3]. The provider (CSP) to other cloud users (i.e. entities) and
increasing network bandwidth and reliable yet flexible network these cloud users may hand over to the other users so
connections make it even possible that users can now subscribe on.
high quality services from data and software that reside solely o Cloud made the users whenever they can join and
on remote data centers. In cloud everything from storage to leave the cloud in the flexible manner.
computation is provided as a service. Depending on the nature These problems make the data handling as a lot of complex
of service, it is divided into following services: and tedious task within the cloud.
o Infrastructure as a Service (IaaS): IaaS provides an The importance of ensuring the data security in cloud
access to the hardware resources such as storage or computing has been highlighted by researchers and enterprises.
computing hardware services. Security is consequently a major element in any cloud
computing infrastructure, because it is important to ensure that III. CHALLENGES IN MAINTAINING DATA INTEGRITY IN CLOUD
only authorized access is permitted and secure behavior is Data integrity means ensuring that data is identically
accepted. All members in the cloud computing environment maintained during any operation (such as transfer, storage or
should be trusted by each other, and importantly the members retrieval). We can simply say that data integrity is assurance
that have communication in between should be trusted by each that the data is consistent and correct. Ensuring the integrity of
other. Trust is the major concern of the consumer and provider the data actually means that it changes only in response to
of services that participate in a cloud computing environment. authorized transactions.
Representative solution for ensuring data safety is utilizing a Cloud storage is built on the network computing
trustful third party auditor to assess and expose risk of cloud environment. There are many benefits to move data into the
storage services on behalf of the users upon request. Third cloud. For example, users do not have to care about the
party auditor(TPA) between data owner and cloud service complexities of direct hardware management. But since users
provider(CSP) is proposed which reduce the burden of data stored their data in the cloud, it means that they will lose the
owner to audit the data in the cloud and it also make the data control of them and more and more worries will come out
owner free from worrying about the data lose in cloud storage . about the data security.
The rest of this paper is organized as follows: Section 2 The main challenge of cloud storage is guaranteeing
discusses storage as a service in cloud computing. Section 3 control, and the necessary integrity and confidentiality of all
provides the different challenges in maintaining data integrity stored data. Also cloud faces challenges such as Security and
in cloud. Section 4 analyzes third party auditing services in privacy, lack of standards, continuously evolving, compliance
cloud. Section 5 gives the final conclusion of this paper. concerns, data recovery and availability, management
II. STORAGE AS A SERVICE capabilities etc. As users don’t possess the storage of data
physically, we cannot follow the traditional cryptographic
Basically a cloud storage system can be considered as a primitives for data security protection [4]. Again, in case of
distributed data centers which typically use cloud computing maintaining the integrity of the data, we cannot trust the
technologies and offers some kind of interface for storing and service provider to handle the data, as cloud provider himself
accessing data. To increase the availability, the data may be can modify the original data and the integrity of the data may
stored at different locations. User-friendly, easily accessible be lost. If a smart hacker hacks the cloud server and steals the
and money-saving ways of storing and automatically backing data and modifies it then in some cases this modification is not
up arbitrary data are available on-demand on the Internet. A even identified by the cloud provider. So, in such case, we need
customer simply accesses cloud storage provider’s website and to take the help of a trusted third party auditor which checks for
rents storage space as necessary by selecting one of the the integrity of our data. In the corporate world there are a
provider's packages. huge number of clients which are accessing the data and
Many cloud storage providers are active on the market who modifying it. In the cloud, application and services move to
offers various kinds of services to their customers. Basic cloud centralized huge data center and services and management of
storage services are generally not designed to be accessed this data may not be trustworthy [7].
directly by users but rather incorporated into custom software Cloud data security is a major concern for the client while
using application programming interfaces (API)". Amazon using the services provided by the cloud service provider.
S34, Rackspace5 and Nirvanix6 are some examples of such There may be some security issues and conflicts between the
basic cloud storage services. These services should have the client and the service provider. To resolve those issues, we can
typical features of cloud storage services such as copy, backup, use a third party as an auditor.
synchronization and sharing. A particular service should offer a
minimum of one in all these features, and may supply multiple IV. THIRD PARTY AUDITING SERVICES
features at the same time. In conventional practice, the third party auditor is operated
The data is often of great value and its irrecoverable loss or by an institute which is not related to the cloud service
damage could be a total disaster for its owner. This requires provider. Third party auditor can be a trusted third party to
secure methods of preserving important data in order to prevent resolve the conflicts between the cloud service provider and the
irrecoverable data loss, whilst constantly keeping up with client. Over the years various schemes are proposed by authors
increasing demands for storage space [6].It is necessary to to provide a trusted environment for cloud services. Various
often create additional copies of the information, so as to be Encryption and Decryption algorithms are being used to
ready to restore it to an earlier version required. These copies provide the security to user while using third party auditor [7].
further increase the demand for storage space. For well organization it is very essential that cloud that
Private and business users demand an easy way to allows investigation from a single party, audit the outsource
synchronize and access their data independent of both device data to ensure the data security and save the user’s computation
and location. Additional requirements arise from the variety of and data storage. It is very essential to provide public auditing
devices used to access the data simultaneously. The software service for cloud data storage, in order that the user trusts an
providing these features must also be tailored to the needs of independent third party auditor (TPA). TPA checks the
the individual with no technical background. integrity of data on the cloud on the behalf of the users, and it
provides the reasonable way for the users to ascertain the
validity of data in the cloud. In all, enabling public auditing Being outside the cloud service provider this third party
services plays a very important role in establishing cloud auditor may produce wasting of resource and slowness of
economy, it provides users a way to assess the risk and gain response under the circumstances. In the meantime, the
faith in the cloud [4]. Public auditing along with the user possibility of the stoppage of the third party auditor may lead a
provides the external party to verify the correctness of stored potential instability to the system. It obviously obstructs the
data against the external attacks. development and application of the cloud storage.
Users would try to access data either within or outside the Third-party-auditor not only read but also may be change
scope of their access privilege. The cloud service provider is the data. Therefore a certain mechanism should be provided to
more interested in user access privilege, public/private key and solve the problem.
other information stored in the third party auditor than any An effective and novel scheme about the third party auditor
other secret information [8]. for cloud data storage has been proposed that would ensure the
The representative (traditional) architecture for cloud data security of the data stored in cloud. An efficient mechanism for
storage is shown in Figure 1. moving the third party auditor functions into the cloud service
provider and achieve the following goals is designed:
(1) Access control safety: to ensure both users and cloud
service provider must communicate with each other with a
privilege given by a certain authentication module.
(2) Authentication data trustful in cloud storage servers: to
forbid the users and cloud service provider to acquire any
authentication information which they are not wanted to.
(3) Authentication information efficiently in use: to
exchange and make backups authentication information validly
in cloud service provider, design a reasonable method to make
cloud service provider interior can operate efficiently.
For the third party auditing in cloud storage systems, there
are several important requirements which have been proposed
in some previous works [10, 11]. The auditing protocol should
Figure 1 Representative traditional architecture have the following properties:
Traditional architecture consists of three different network (1) Confidentiality: The auditing protocol should keep
entities which are users, cloud service provider and third party owner’s data confidential against the auditor.
auditor [9]. (2) Dynamic Auditing: The auditing protocol should
(1) Users are active participants. They have data to be support the dynamic updates of the data in the cloud.
stored in the cloud and rely on the cloud for data maintenance (3) Batch Auditing The auditing protocol should also be
and computation. Both individual consumers and organizations able to support the batch auditing for multiple owners and
can be the users. multiple clouds.
(2)Cloud service provider has significant storage space and This architecture for cloud storage is composed of just two
computation resource to maintain the users’ data. It also has parts: Users and Advanced Cloud Service Provider. It is
expertise in building and managing distributed cloud storage illustrated in Figure 2.
servers and the ability to own and operate live cloud computing
systems.
(3)Third party auditor has expertise and capabilities that
users do not have and it is trusted to assess and expose risk of
cloud storage services on behalf of the users upon request.
Users who put their large data files in the cloud storage
servers can relieve the burden of storage and computation. At
the same time, it is critically important for users to ensure that
their data are being stored correctly and securely. This third
party auditor takes care of data and makes sure that data
integrity is maintained. The procedure of integrity checking is Figure 2 Proposed architecture
viewed as a key’s proficiency within software, platform, and All of users, third party auditor and cloud service provider
infrastructure security focus area of new cloud architecture. shown on the figure have the same function discussed above.
Cloud service provider is always online so as the third party The main difference between this architecture and the
auditor. It makes every data access be in control. traditional one is that the third party auditor function is
In cloud environment the computing resources are under combined with the cloud service provider.
control of service provider and the third-party-auditor ensures Data is indeed stored appropriately and kept intact all the
the data integrity over out sourced data time in the cloud storage servers. Users modifying, deleting or
appending their data files in the cloud have correctness
assurance. Data is available against Byzantine failures, SCIENTIFIC AND TECHNICAL RESEARCH (ISSUE 2,
malicious data modification and server colluding attacks [12]. VOLUME 4- August 2012), ISSN 2249-9954
Most of the schemes rely on encrypting the data using some [5] M.Vanitha, R.Raju, “Data Sharing: Efficient Distributed
encryption algorithm and make third party auditor store a Accountability in Cloud Using Third Party Auditor”,
message digest or encrypted copy of the same data that is International Journal of Innovative Technology and Exploring
stored with the service provider. Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-5,
April 2013
V. CONCLUSION [6] Fraunhofer Verlag,” SIT Technical reports On THE Security of
Cloud Storage Services ”
Privacy and security are the very important issues of any
technology. The paper provides an abstract view of the [7] Ashish Bhagat, Ravi Kant Sahu, “Using Third Party Auditor
for Cloud Data Security: A Review” , International Journal of
challenges present in maintaining data integrity and different Advanced Research in Computer Science and Software
schemes proposed in recent past for cloud data security using Engineering, Volume 3, Issue 3, March 2013 ISSN: 2277 128X
third party auditor. The paper says that moving third party [8] Shuai Han, Jianchuan Xing, “ENSURING DATA STORAGE
auditor function into cloud service provider will increase SECURITY THROUGH A NOVEL THIRD PARTY
response time and may use the resources more effectively AUDITOR SCHEME IN CLOUD COMPUTING”, Cloud
ensuring the data security. Computing and Intelligence Systems (CCIS), 2011 IEEE
International Conference, Proceedings of IEEE CCIS2011
[9] Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou,
ACKNOWLEDGMENT “Enabling Public Verifiability and Data Dynamics for Storage
“I would like to thank Mr. Chetan R. Solanki, Department Security in Cloud Computing”, ESORICS 2009.
of Information technoly, SGGS IE&T, Vishnupuri, Nanded, for [10] Wang, C.,Ren,K., Lou,W., Li, J.: Toward publicly auditable
his valuable suggestions”. secure cloud data storage services. IEEE Netw. 24(4), 19–24
(2010)
REFERENCES [11] Yang, K., Jia, X.: Data storage auditing service in cloud
[1] Amazon Web Services, Online at http://aws.amason.com. computing: challenges, methods and opportunities. World
[2] Google App Engine, Online at Wide Web 15(4), 409–428 (2012)
http://code.google.com/appengine/. [12] Cong Wang, Qian Wang, Kui Ren, Wenjing Lou, “Ensuring
[3] Microsoft Azure, Online athttp://www.microsoft.com/azure/. Data Storage Security in Cloud Computing”, IEEE, IWQoS.
17th International 2009.
[4] K.Govinda, V.Gurunathaprasad, H.Sathishkumar, “THIRD
PARTY AUDITING FOR SECURE DATA STORAGE IN
CLOUD THROUGH DIGITAL SIGNATURE USING RSA” ,
INTERNATIONAL JOURNAL OF ADVANCED

Você também pode gostar