You are on page 1of 10

Cloud Architecture & Services

Data Security and Storage

Sandhiya S
III-BCA(A)
18UCA037
Data Security
• Users store their data in the cloud and no longer possess the data
locally, hence the availability and correctness data must be
guaranteed.
• Cloud computing moves the application software and databases to
the large data centers where the data security is not trustworthy.
• Data security of such cloud service includes:

*Secure Channels
*Access Controls
*Encryption
For the security of data, we must consider the confidentiality, Integrity
and availability of data.
Threats faced by cloud data storage
• Security threats faced by cloud data storage can come from
two different sources.
• 1.CSP(Cloud Service Provider) can be self-interested,
untrusted and possibly malicious.
• 2.There may also exist an economically motivated adversary,
who has the capability to compromise a number of cloud
data storage servers in different time intervals and
subsequently is able to modify or delete users data while
remaining undetected by CSPs for a certain period.
Weak Adversary

• This adversary is interested in corrupting the users data files


stored on individual servers.

• Once a server is compromised, an adversary can pollute the


original data files by modifying or introducing its own
fraudulent data to prevent the original data form being
retrieved by the user.
Strong Adversary

• This is the worst case scenario, in which we assume that the


adversary can compromise all the storage servers so that he
can intentionally modify the data files as long as they are
internally consistent.

• This is the equivalent to the case where all servers are


colluding together to hide a data loss or corruption incident.
Storage
• Storage is made up of many distributed resources, but still
acts as one- often refferd to as federated storage.
• Highly fault tolerant through redundancy and distribution
of data.
• Highly durable through the creation of versioned copies.
• Eventually consistent with regard to data replicas.
Storage Architecture
• A representative network architecture for cloud data storage
comprises of three entities,
*Users
*Cloud Service Provider(CSP)
*Third Party Auditor
Users:
Who have the data to be stored in the cloud and rely on cloud
for data computation.
Cloud Service Provider(CSP):
Who has significant resources & expertise in building &
managing distributed cloud servers, owns and operates cloud
computing system.

Third Party Auditor:


Who has expertise and capabilities that users may not have.
Storage Architecture Diagram

You might also like