Professional Documents
Culture Documents
ABSTRACT: Cloud computing is one of the major point users can store their critical data in servers and can access
of discussion in IT industries. The Cloud provides their data anywhere they can with the Internet and do not
service to the user on demand basis. The trend of using need to worry about system breakdown or disk faults, etc.
cloud environments is growing for storage and data Also, different users in one system can share their
processing needs. Data security is one of the major information and work, as well as play games together.
issues in cloud environment. The data owner has not Different Reputed companies such as Amazon, Google,
control over the data after it is uploaded on cloud. For IBM, Microsoft, and Yahoo provide the various cloud
data security we have to trust on security mechanism computing services.. Basically there are mainly three types
provided by third party. We proposed a scheme in this of clouds: Internal clouds, External clouds and hybrid
the original data get sliced into different slices. The data clouds [2]. Internal clouds: internal cloud is also called
in each slice can be encrypted by using different Private clouds; these are the private networks that offer
cryptographic algorithms and encryption key before enormous cloud computing services for a very restrictive set
storing them in the Cloud. The objective of this of users within internal network. For example, some
technique is to store data in a proper secure and safe colleges, companies and universities can use their internal
manner in order to avoid intrusions and data attacks networks to provide cloud computing services for their own
meanwhile it will reduce the cost and time to store the users. These centralized storage of data in clouds offer the
encrypted data in the Cloud Storage. highest level of security and control, but they require the
company to still purchase and maintain all the software and
Keywords: Cloud Security, Authentication, Encryption, infrastructure, which reduces the cost savings. External
Decryption , Cloud storage., intrusion detection, attacks, Slice. clouds: It is refer as public cloud. It is use for the public
users such as enterprises that provide cloud computing
services. Hybrid clouds these are the clouds that is
I INTRODUCTION combination of various multiple private and/or public
clouds [4]. Providing security in a private cloud and a public
cloud computing is a computing environment in which large cloud is easier, comparing with a hybrid cloud since
group of remote servers are networked which allows the commonly a private cloud or a public cloud only has one
central storage of data and it provides online access to service provider in the cloud. To access the various cloud
computer resources or services. This computing services user should have it’s own identity. This unique
environment allows enormous customer of cloud and digital identity authenticate user to access different services
service it allows it users to access this applications without from different clouds.
installation it provides services ex- sending various files at
any machine connected in a network with internet access.
By centralized data storage processing and bandwidth
provides more efficient computing. This is one of the new
trends for IT enterprises. Cloud computing environments is
a network of computers, connected via internet, exchanging
,sharing the various resources provided by Cloud providers
satisfying the need like scalability, usability, resource
requirements. The various problems like sharing computing
resources, users can easily solve their problems with the Fig 1: Cloud Computing Types
resources provided. By using cloud computing service,
IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO)2015
The three widely referenced cloud computing service Security, cloud has lot of difficulties. The provider’s must
models are illustrated as follows: make sure that the client does not face any problem such as
1. Software as a Service (SaaS): It refers to services that is data loss or data theft. There is also a possibility where a
provided to the users by giving users’ the efficacy to malicious user can penetrate the cloud by impersonating a
access services of cloud by running on a simple software legitimate user and there by infecting the entire cloud thus
like a browse. Examples: Gmail, Google Groups. This affecting many customers who are sharing the infected
model is also known as Application Service Provider or cloud.
ASP model.
2. Platform as a Service (Paas): This service allows the The various problems faced by the cloud computing can be
users’ to develop applications and deploy them. Examples: classified as:
Google App Engine allows developers to create customized
apps. 1. Infected Application: Vendor should have the complete
3. Infrastructure as a Service (IaaS): This service allows access to the server for monitoring and maintenance, thus
users’ to access the servers’ computational and storage preventing any malicious user from uploading any infected
infrastructure in a centralized service [2] [3] [6]. Say for an application onto the cloud which will severely affect the
example, we have Amazon Web Services. It allows remote customer. The applications are available as a service on
access to Amazon.com’s computing services. cloud , Cloud providers ensure that services to users and
secure these application by implementing testing and
acceptance procedures for outsourced or packaged
application code. It also requires application security
measures (application level firewalls) be in place in the
production environment.
III. BACKGROUND AND RELATED WORK Block tag authentication is made to handle the data from the
cloud storage efficiently. For the data that is stored in the
cloud database, there is need for remote data integrity check
An overview of different data security issues related to which assurers the cloud users with a sense of security
cloud computing provided by Joshi et al. in 2010, [8] This regarding their data. The third party audit ting has to be
piece of work focuses on how to achieve the security in made available in such a way that no additional burden is
cloud computing and which are various ways to enhance the introduced to the cloud users. A single Third Party Auditor
secure trustworthy cloud environment. on the basis of is capable of handling multiple auditing tasks, which is
various issues identifies Farzad Sabahi [9], proposed a achieved with the bilinear aggregate signature technique.
system that deals with the problem of ensuring the integrity The author Arjun Kumar specifies a method in 2012 [1]
of data storage in cloud with the help of a Third Party that allows user to store and access the data securely from
Auditor. Data integrity is achieved through the public the cloud storage. It also guarantees that no one except the
auditing that is carried out on the users data by the Third authenticated user can access the data neither the cloud
Party Auditor. storage provider. This method ensures the security and
In 2011, Ashish Agarwal et al. [10], This paper talks about privacy of data stored on cloud. A further advantage of this
security issues concerned with cloud computing. It has method is that if there is security breach at the cloud
revealed many about many serious security threats that provider, the user’s data will continue to be secure since all
prevails this field. Kui Ren [13], proposed the publicly data is encrypted. Users also need not to worry about cloud
auditable cloud data storage which is able to help the cloud providers gaining access to their data illegally.
economy become fully established. This auditing service In 2013 ,the author Mr. Prashant Rewagad , Ms.Yogita
helps the data owners’ to maintain their data effectively that Pawar [2] focuses on the idea of security and authentication
is present in the cloud storage. The proposed system His piece of work makes use of a combination of
accounts the users regarding the usage of their data by both authentication technique and key exchange algorithm
the user himself and the TPA. Services for the legacy users blended with an encryption algorithm. This combination is
is made available, who may not only access but also modify referred to as “Three way mechanism” because it ensures all
the data in the cloud. the three protection scheme of authentication, data security
The author Prashant Rewagad et al. [2] propose an and verification, at the same time.
architecture for providing security in cloud network. These The author S. Kamara and K. Lauter [3][2] in this paper,
systems architecture uses the combination of digital make use of digital signature and Diffie Hellman key
signature algorithm of Diffie Hellman and AES encryption. exchange blended with (AES) Advanced Encryption
The author Ashutosh Kumar et al.[11] highlights on Standard encryption algorithm to protect confidentiality of
providing a secure architectural framework for data data stored in cloud. Even if the keyin transmission is
gathering and sharing. This spectacular work of this project hacked, the facility of Diffie Hellman key exchange render
of this work is that the authors have made a permission it useless, since key in transit is of no use without user’s
hierarchy at different levels. private key, which is confined only to the legitimate user.
The authors have focused on security but with view of use Author Mohamed Nabeel, Elisa Bertino Fellow in this
hierarchy. M.Venkatesh et al .In 2012, [12] proposes paper, focused on the utilization of encrypted cloud data
RSASS system for data security. The scheme uses RSA with practical system usability and high-level user searching
algorithm for encrypting large files and storing the data. The experience. Focus on encryption of data using RSA
system can be used for storing large databases. But the use algorithm. [4]
of linear methods compromises with the data retrieval The author Sushmita Ruj, Milos Stojmenovic, Amiya
speed. Hence, this system is good for static data. Farzad Naya[5]in this paper an approach, based on two layers of
Sabahi [9] explains about the scope of various enterprises encryption, the data owner performs a coarse-grained
migrating to cloud. The author explains how migration to encryption, whereas the cloud performs a fine-grained
cloud can benefit various enterprises. Cloud computing encryption on top of the owner encrypted data.
migration involves considering the gravity of issue of The author Xueli Huang and Xiaojiang Du [6] “Efficiently
security. Secure Data Privacy on Hybrid cloud” This present a
Aderemi A. Atayero [7], proposed an auditing system which privacy preserving access control scheme for clouds. This
is carried out in such a way that the Third Party Auditor paper not only provides fine-grained access control but also
does its job without demanding the copy of user’s data. Also authenticates users who store information in the cloud. The
the Third Party Auditor is not capable of deriving the user’s cloud however does not know the identity of the user who
data while performing the auditing task. To verify the stores information, but only verify the user’s credentials.
correctness of the cloud data on demand from the cloud Key distribution is done in a decentralized way. One
users the Third Party Auditor is used, who without limitation is that the cloud knows the access policy for each
retrieving a copy of the whole data or introducing additional record stored in the cloud.
online burden to the cloud users performs the auditing.
IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO)2015
The author Orner K. Jasim Mohammad, Safia Abbas, EI- converted into ciphertext. This various encryption algorithm
Sayed M. EI-Horbaty : In this Paper[7] The sensitive data is provide more security than using single encryption
separated from non-sensitive data, and only the non- algorithm to encrypt the data. The technique works in
sensitive data is outsourced to public cloud. following manner.