Open Access Open Access  Restricted Access Subscription or Fee Access

A Comprehensive Methodology for Data Security and Privacy in Cloud Computing Systems

Abid Hussain Wani

Abstract


Cloud computing encompasses computing with a pool of virtualized computer resources. A cloud provides for self-recovering highly-scalable programming models, workloads to recover from hardware/software failures and rebalance allocations, can host different workloads and allows workloads to be deployed/scaled-out on-demand by rapid provisioning of virtual or physical machines. The idea is to move desktop computing to a service-oriented platform using server clusters and huge databases at data centers. Cloud computing has become a standard method of software operation for many businesses. However, challenges are being faced by both research and professional cloud computing communities on optimized architectures, quality reliability, data security and privacy fronts. Services offered in cloud computing face the overwhelming challenges to ensure the proper physical, logical and personnel security controls, especially when considering the fact that cloud computing moves the application software and databases to the large data centers and in doing so the management of the data and services may not be fully trustworthy. In this paper, the main focus is given to highlight and investigate the data storage from perspective of threats and attacks and potential solution strategies. The paper also proposes an effective and flexible distributed scheme with two salient features, i.e., achieving the integration of storage correctness insurance and data error localization.

Full Text:

PDF

References


Xie Minqi, Zhou Rong, Zhang Wei, et al. Security and privacy in cloud computing: A survey. Sixth International Conference on Semantics Knowledge and Grid (SKG). 2010.

What is Cloud Computing? Retrieved April 6, 2011, available at: http://www.microsoft.com/business/engb/solutions/Pages/Cloud.aspx

What is Cloud Computing? Retrieved April 6, 2011, available at: http://www.ibm.com/developerworks/cloud/newto.ht ml#WHATIS

What is Cloud? Retrieved April 6, 2011, Available at: http://www.rackspace.co.uk/cloud-hosting/learn- more/whatis-cloud/

Recession is good for Cloud Computing Microsoft Agrees. Available at: http://www.cloudave.com/2425/recession-is- goodfor- cloud-computing-microsoft-agrees/

De Capitani di Vimercati S, Foresti S, Paraboschi S, et al. Ecient and private access to outsourced data. In Proc. of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, Minnesota, USA, June 2011.

Chow R, Golle P, Jakobsson M, et al. controlling data in the cloud: Outsourcing computation without outsourcing control. In ACM Workshop on Cloud Computing Security, 2009.

Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications. 2011; 34(1): 1–11p.

IT Cloud Services User Survey, pt.2: Top Benefits & Challenges. http://blogs.idc.com/ie/?p=210.

New IDC IT Cloud Services Survey: Top Benefits and Challenges. Retrieved April 8, 2011. Available at: http://blogs.idc.com/ie/?p=730

Maheshwari Rohit. International Journal of Recent Technology and Engineering (IJRTE). March 27, 2012.

Cong Wang, Qian Wang, Kui Ren. International Journal of Recent Technology and Engineering (IJRTE). April 12, 2011.

An Information-Centric Approach to Information Security. http://virtualization.sys- con.com/node/171199.

EMC, Information-Centric Security. http://www.idc.pt/resources/PPTs/2007/IT&Internet_ Security/12.EMC.pdf.

End-User Privacy in Human-Computer Interaction. Available at:http://www.cs.cmu.edu/~jasonh/publications/fnt-end-

user-privacy-in-human-computer-interaction-final.pdf.

ESG White Paper, the Information-Centric Security Architecture. Available at:http://japan.emc.com/collateral/analyst- reports/emc-white-paper-v4-4-21-2006.pdf.

Latest Cloud Storage Hiccups Prompt Data Security Questions. http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9130682&sourc e=NLT_PM.

Danwei Chen, Yanjun He. Computer technology. Journal of Convergence Information Technology. September 2010; 5(7).




DOI: https://doi.org/10.37591/ijowns.v1i2.851

Refbacks

  • There are currently no refbacks.