Preview

Data Security

Powerful Essays
Open Document
Open Document
8801 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Security
Ensuring Data Storage Security in Cloud Computing
Cong Wang, Qian Wang, and Kui Ren
Department of ECE Illinois Institute of Technology Email: {cwang, qwang, kren}@ece.iit.edu

Wenjing Lou
Department of ECE Worcester Polytechnic Institute Email: wjlou@ece.wpi.edu

Abstract—Cloud Computing has been envisioned as the nextgeneration architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users’ data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks.

I. I NTRODUCTION Several trends are opening up the era of Cloud Computing, which is an Internet-based development and use of computer technology. The ever cheaper and more powerful processors, together with the software as a service (SaaS) computing architecture, are transforming data centers into pools of computing service on a huge scale. The

You May Also Find These Documents Helpful

  • Better Essays

    Cis 500- Cloud Computing

    • 1078 Words
    • 5 Pages

    Technology has taken great leaps of advancement. Some of the new technology that companies and consumers are taking advantage of to store and process data is cloud computing. Cloud computing was derived from virtualization. Virtualization allows companies to separate business applications from hardware. Doing this gives the company the capability of assigning applications as needed. The option to manage applications is a great benefit to companies. Resulting from the virtualization error, cloud computing has emerged to provide flexible IT infrastructures. This has not only enhanced the options companies now have, but it is also proven to be more cost efficient. This has increasingly become a preferred method of companies and consumers alike. (Turban, & Volonino, 2011, p.47)…

    • 1078 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Data Security

    • 335 Words
    • 2 Pages

    7. Each of the following is a variation available in network access control (NAC) implementations except __________.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    institutions across the country. In doing so, these government agencies will be able to better…

    • 732 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    References: D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach.. Information Systems Research, 20(1), 79-98.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Along with the development speed of technology, the amount of data passing by or consumed by people around the world keeps growing rapidly. The storage devices seem to unable for storing growing data amount. In addition, maintenance and back-up of data are needed just in case of accident. To meet the needs mentioned above, the cloud computing is developed especially cloud storage which have become a necessary data storage for everyone recently. There are four competitive huge cloud storages in the IT industry – Google Drive, SkyDive, ICoud, Dropbox.…

    • 2094 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    The term Cloud Computing derives from the common depiction in most technology architecture diagrams, of the Internet or IP availability, using an illustration of a cloud. The computing resources being accessed are typically owned and operated by a third-party provider on a consolidated basis in Data Center locations. Target consumers are not concerned with the underlying technologies used to achieve the increase in server…

    • 4246 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    Secure Cloud

    • 1589 Words
    • 7 Pages

    CSQ1: Although cloud computing have the potential to deliver powerful benefits, they pose new challenges to system security and reliability. Cloud computing is indeed cloudy, and due to lack of transparency it creates so many problems. One of the major security issue is cloud computing is highly distributed. Cloud applications and application mash-ups reside in virtual libraries in large remote data centers and server mainly supplies business services and data management for multiple corporate and organizations clients.…

    • 1589 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    The Security of Cloud Computing System enabled by Trusted Computing Technology Zhidong Shen International School of Software, Wuhan University, Wuhan, China, 430079 zhidongshen@163.com Qiang Tong School of Software, Northeastern University, Shenyang, China, 110004 qiang.tong@163.com Abstract—Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application. In this paper, we pay attention to the security requirements in cloud computing environment.…

    • 3993 Words
    • 16 Pages
    Powerful Essays
  • Better Essays

    Cloud Computing

    • 898 Words
    • 3 Pages

    This term paper will discuss the concept of cloud computing, including its strengths and weaknesses.…

    • 898 Words
    • 3 Pages
    Better Essays
  • Good Essays

    With technology as advanced as it is today, most find that security in Cloud computing is more secure and better when in fact the risks are higher than ever before. What could be presumed safe, could in fact present a major vulnerability in the eyes of a hacker. When accessing the Cloud, users depend on the security, which in turn subjects them to security risks in privacy, security, and data accessibility. If users avoid these risks, it can lead to grave results that could include losing sensitive information or worse, having someone’s identity stolen. David Geer states how these vulnerabilities and risks lead to problems by saying, “While these cloud applications may offer quick resolution to specific feature needs, the risks and vulnerabilities they introduce can lead to significant costs in damages...”. Privacy, Security, and Data are risks users take today when depending fully on the security Cloud has to offer. (Geer, 2013, par 21).…

    • 924 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    zsdg

    • 470 Words
    • 2 Pages

    These days "cloud computing" is the buzzword used to describe the direction in which information network infrastructure seems to be leaning towards. The authors reasoned that cloud computing sprouted from grid computing, distributed computing, and parallel computing, which resonated with the works o…

    • 470 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cloud Database

    • 1496 Words
    • 6 Pages

    The cloud computing is the next generation of the computing, its advantages, advancements and research are a plenty. In recent years, the term “cloud computing” has been critical in the world of IT. Cloud computing, or the use of internet-based technologies to conduct business, is recognized as an important area for IT innovation and investment (Armbrust et al., 2010; Goscinski and Brock, 2010; Tuncay, 2010). Cloud computing has spread out through the main areas related to information systems (IS) and technologies, such as operating systems, application software, and technological solutions for firms (Armbrust et al., 2010). The promise of cloud computing is to deliver all the functionality of existing information technology services even as it dramatically reduces the upfront costs of computing that deter many organizations from deploying many cutting-edge IT services (J.Staten, 2009). Cloud computing represents a convergence of two major trends in information technology — (a) IT efficiency, whereby the power of modern computers is utilized more efficiently through highly scalable hardware and software resources and (b) business agility, whereby IT can be used as a competitive tool through rapid deployment, parallel batch processing, use of compute-intensive business analytics and mobile interactive applications that respond in real time to user requirements (W.Kim, 2009). The impetus for change right now is seen predominantly from a costs perspective, as organizations increasingly discover that their substantial capital investments in information technology are often grossly underutilized (Sean Marston et al., 2010).…

    • 1496 Words
    • 6 Pages
    Better Essays
  • Best Essays

    Cloud computing has evolved through a number of implementations. Moving data into the cloud provides great convenience to users. Cloud computing is a collection of all…

    • 3310 Words
    • 14 Pages
    Best Essays
  • Good Essays

    Cloud computing provides massive computation power and storage capacity which enable users to deploy computation and data intensive applications without infrastructure investment. Along the processing of such applications, a large volume of intermediate datasets will be generated, and often stored to save the cost of re-computing them. However, preserving the privacy of intermediate datasets becomes a challenging problem because adversaries may recover privacy-sensitive information by analyzing multiple intermediate datasets. Encrypting ALL datasets in cloud is widely adopted in existing approaches to address this challenge. But we argue that encrypting all intermediate datasets are neither efficient nor cost-effective because it is very time consuming and costly for data-intensive applications to en/decrypt datasets frequently while performing any operation on them. In this paper, we propose a novel upper-bound privacy leakage constraint based approach to identify which intermediate datasets need to be encrypted and which do not, so that privacy-preserving cost can be saved while the privacy requirements of data holders can still be satisfied. Evaluation results demonstrate that the privacy-preserving cost of intermediate datasets can be significantly reduced with our approach over existing ones where all datasets are encrypted.…

    • 895 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cloud Computing

    • 985 Words
    • 4 Pages

    Cloud computing refers to the delivery of computing and storage capacity (Gruman ,2008) as a service to a heterogeneous community of end-recipients. The name comes from the use of clouds as an abstraction for the complex infrastructure it contains in system diagrams (Gruman, 2008). Cloud computing entrusts services with a user's data, software and computation over a network. Cloud computing can be public or private or hybrid. In public cloud, applications, storage, and other resources are made available to the general public by a service provider. These services are free or offered on a pay-per-use model. Generally, public cloud service providers like Amazon AWS, Microsoft and Google own and operate the infrastructure and offer access only via Internet (direct connectivity is not offered).Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally (Ryan, 2011). Undertaking a private cloud project requires a significant level and degree of engagement to virtualize the business environment, and it will require the organization to reevaluate decisions about existing resources. When it is done right, it can have a positive impact on a business, but every one of the steps in the project raises security issues that must be addressed in order to avoid serious vulnerabilities. While Hybrid cloud is a composition of two or more clouds (private, community or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models (Ryan, 2011). As cloud computing is achieving increased popularity, also is the security security issues increasing.…

    • 985 Words
    • 4 Pages
    Better Essays