Professional Documents
Culture Documents
net/publication/335825652
Article in International Journal of Computer Science and Information Security, · September 2019
CITATIONS READS
3 189
2 authors, including:
SEE PROFILE
All content following this page was uploaded by Muhib Ahmad Khan Sherwani on 15 September 2019.
545 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 4, April 2016
546 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 4, April 2016
for the stand alone in the market. These issue of we need to increase API efficiency and keep it
the date are related to the data level. Cloud users update. As the cloud emerge, it proves itself more
move their sensitive data to the cloud to make it powerful, scalable, and more optimized than
other available technologies [7]. Especially it has
secure, but if cloud fails to provide better security
the strength or power to accommodate itself to
to the data, which makes the cloud improper new upcoming variations that based on the
computing. The threats related to the data are [3]: requirements, moreover the reduction of the huge
amount of cost. There are different flaws in
1. Malicious Insiders security parameters in cloud computing which
2. Denial of Service make it unpopular. If it is unable to provide
3. Data Loss or Data Leakage maximum security to the sensitive data, the all
4. Data Scavenging other benefits of the cloud have no value, and no
5. Customer-data one will agree to use it and make a compromise
6. Manipulation on security parameter [3].
DATA STORAGE IN CLOUD
547 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 4, April 2016
accountability and all the concerns about the encryption, the author breaks the data into cipher
security. chunks. Chunks of the encrypted data are now
placed on the different cloud provider’s locations
In this paper, we suggest a more efficient way of named as SP1, SP2, and SP3. Figure 1.2 shows
more scalable as well as secure network storage the initial image of the author proposed
architecture which contains different cloud architecture, containing the host machine and the
storage providers for the improved storage of different service providers [3]. The author here
critical data. For better security, confidentiality, introduces the parity bit to restore the encrypted
reliability and availability of the cloud, firstly the data. For better availability and performance of
data of the user is encrypted and then divide the the cloud he adopt the RAID technology and
whole encrypted data into different chunks, then implement it on every server in the datacenter for
finally store it on to the different cloud services improving availability and cloud performance.
provider location. A cipher key is placed with Our suggested model is somehow same to this
every chunk of the data. Moreover, one of the methodology with little change in the distribution
special service providers contains whole strategy. According to the paper authors [3] [5]
encrypted data, but it does not contain the cipher [10], RAID 10 is more efficient than other RAID
key along with the data. If the data on any models. RAID 10 provides better availability as
particular service provider is crashed, it can well as performance than other models of RAID.
recover from this special service provider which
contains all encrypted data by using the cipher
key from the other service provider. For
improved reliability and availability of data
stored in the cloud, the Redundant Array of
Inexpensive Disks model is implemented on the
service provider side.
RELATED WORK
548 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 4, April 2016
which the user want to store on the cloud and not placed in such a way that a particular chunk
any unauthorized person or intruder gain the contains the next two keys of the cipher block as
access of the whole data. Firstly, the critical data shown in figure 1.3.
is divided into a different number of chunks
depending upon the length of the data. After Original Data (D) -> Data Blocks (A, B, C, D,
splitting the sensitive data into chunks, an E, F & G) -> Encrypted Data Blocks (A’, B’,
encryption mechanism is applied on all these C’, D’, E’, F’ and G’)
chunks [7]. Every particular chunk has its The figure 3 shows that the A’ is on SP1 and
encryption key through which the encrypted data contains the key of B. while C as K (B), K (C),
is retrieved into its original, meaningful form. As B’ is on SP2 and contains the key of C and D as
we stated earlier that every chunk of data has its K (C), K (D). C’ is on SP3 and contains the key
encryption key so as the number of the data of D and E as K (D), K (E). D’ is on SP4 and
chunks increases, the number of keys also contains the key of E and F as K (E), K (F). E’ is
increases. The conversion of the plain critical on SP5 and contains the key of F and G as K (F),
data into numbers of encrypted cipher blocks is K (G). F’ is on SP6 and contains the key of G and
to provide maximum security to the data. RAID A as K (G), K (A)and G’ is on SP7 and contains
10 model is implemented at data centers that are the key of A and B as K (A), K (B). So the key
located on the clouds services provider side to on a particular cloud is determined by the piece
provide better availability and performance [3] of chunk on the number cloud services provider
[10]. we placed:
549 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 4, April 2016
Besides cloud services provider there is also recover the data from the other cloud with is also
another scourge which is also a problem in cloud available on other clouds [10].
computing. Moreover, another threat of
unauthorized access or intruder also affects the RELIABILITY
security of the cloud computing [3] [8]. Therefore, Through the key reliability of the offered model
to ensure the security we firstly split the data and can be attained. The chunk of the data cannot be
then offer encryption strategy in our proposed deciphered without a key. Moreover, the intruder
methodology. After this, distribute all the data on did not get the whole data at once. If the particular
different clouds services provider location. chunk at the specific cloud is corrupted or lost, it
AVAILABILITY can also be recover from another cloud as well.
550 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 14, No. 4, April 2016
model ensures better security, availability as well [6]. X. Zhang, H. Du, J. Chen, Y. Lin, and L.
as reliability. Zeng,(2011) "Ensure Data Security in
Cloud Storage," Proc. International
Conference on Network Computing and
REFERENCES Information Security (NCIS 11), IEEE
[1]. Y. Singh, F. Kandah and W. Zhang,(2011) Press, pp. 284-287.
“A Secured cost effective multi-cloud [7]. P. F. Olivera, L. Lima J. Barros and M.
storage in cloud computing,” IEEE Medard, (2010)” Trusted storage over
INFOCOM Workshop on Cloud untrusted networks,” IEEE Global
Computing, pp. 619-624. Telecommunication Conference, pp. 1-5.
[2]. Qi Zhang, Lu Cheng, Raouf Boutaba [8]. W. Liu, (2012) "Research on cloud
(2010)" Cloud computing: state-of-the-art computing security problem and strategy,"
and research challenges" J Internet Serv Proc. 2nd International Conference on
Appl 1: 7–18. Consumer Electronics, Communications
[3]. Fawaz S. Al-Anzi, Jyoti (2014) et al., and Networks (CECNet 12), IEEE Press,
“Towards Robust, Scalable and Secure pp. 1216-1219.
Network Storage in Cloud Computing”. [9]. J. Sun and S.-S Yue, (2011) "The
[4]. Cloud Security Alliance (2011) Security application of Cloud Storage Technology
guidance for critical areas of focus in Cloud in SMEs," Proc. International Conference
Computing V3.0.Available: on E –Business and E –Government (ICEE
https://cloudsecurityalliance.org/ 11), IEEE Press, pp. 1-5.
guidance/csaguide. /csaguide.v3.0.pdf. [10]. P. C. Chen, C. P. Freg, T W Hou and W G
[5]. Zhao G, Liu J, Tang Y, Sun W, Zhang F, Teng,(2011) “Implementing RAID-3 on
Ye X, Tang N (2009) Cloud Computing: A cloud storage for EMR System,” IEEE
Statistics Aspect of Users. In: First International Computer Symposium, pp.
International Conference on Cloud 850-853.
Computing (CloudCom), Beijing, China.
Springer Berlin, Heidelberg, pp 347–358.
551 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
View publication stats