Cloud storage has been employed to provide online storage services for various kind of users having different requirements. It provides great flexibility in the sense that users can take advantage of the services from any location just with the availability of the internet connection. The data backup and storage facilities provided by cloud computing allow the users to store their information in the cloud, thus providing them the benefits of easy access, protection and reliability (as data is stored in multiple sites). However, the users are unsure and unaware about where their data is specifically stored and who all can have access to their data stored in the cloud. This makes the security and privacy of users’ data critical. In this project we aim at doing an analysis of the security schemes employed by different cloud vendors to avoid the security and privacy intrusion of the user 's information stored in their respective backup services. Different providers of the cloud storage services address the problem of security and privacy in their cloud through various ways and may come up with different schemes. There have been various studies catering to the individual scenarios and past security and privacy breaches in the cloud. However, this project aims to study the various techniques to provide a holistic view of the various threats to this technology and analyzed the following cloud storage services in terms of the cryptographic schemes employed for the data
A company allows its staffs in the same groupor department to store and share files in the cloud. By utilizing the cloud, the staffs can be completely released from the troublesome local data storage and maintenance.However, it also poses a significant risk to the confidentialityof those stored files. Specifically, the cloud serversmanaged by cloud providers are not fully trusted by userswhile the data files stored in the cloud may be sensitive andconfidential, such as business plans. To preserve dataprivacy, a basic solution is to encrypt data files, and thenupload the encrypted data into the cloud. Unfortunately,designing an efficient and secure data sharing scheme forgroups in the cloud is not an easy task due to the followingchallenging issues.First, identity privacy is one of the most significantobstacles for the wide
This research paper clearly explains the concepts of what is cloud computing and its evolution and components of clouds in which it categorizes. Models are included in the cloud computing these are also explained in the paper and also more benefits occurs in cloud computing. Security is very important when the sensitive data is lying in cloud and the risks to the cloud are enormous. The important points to be considered when a corporate organization is planning to move its data and applications to the cloud computing are Restricted user access, Regulatory compliance, Data Position, Data Separation, Recovery, Support, Long-term viability. Some Future aspects are also discussed in order to manipulate the present environment.
Organizations use the Cloud in a variety of different service models (SaaS, PaaS, IaaS) and deployment models (Private, Public, Hybrid). There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software-, platform-, or infrastructure-as-a-service via the cloud) and security issues faced by their customers.In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.
We would like to provide the benefits of cloud computing without any troubles to propel in the direction it is designed for. This is to be achieved by preventing the owner's data from all risks associated and providing a cloud model that is more secure and efficient. The proposed model shall overcome the security risks defined by the security functions over cloud computing, as follows in (Passent M. et al., 2015):
The main issue that slows down the growth of cloud computing is security. No matter how many security management tools are released or assurances of reliability are made, complications with data privacy and data protection continue to plague the market. Covering all potential security issues in this article is simply impossible. This is because of the fact that we 're still discovering many of the security issues which challenges cloud computing as it is still a work-in-progress. Cloud Computing is rapidly evolving and hence what we see today may quickly become irrelevant.
DATA SECURITY IN CLOUD COMPUTING Introduction: Cloud computing has prompted a movement in how individuals consider IT frameworks structural engineering. Numerous associations today are either executing cloud-based services, or assessing which cloud-based measures they will be portraying later on. As indicated by Gartner Inc. distributed computing is "no less compelling than e-business". This sprocess in building design from an undertaking normal server-based framework to a cloud-based framework will have related expenses of passage and dangers, yet it can bring about inconceivable advantages in reserve funds and in IT and business deftness.
One of the major issues slowing cloud computing growth is security. No matter how many security management tools are released or assurances of reliability are made, complications with data privacy and data protection continue to plague the market.
The evidence gathered in this research reveal that soon after iCloud was presented by Steve Jobs to the users, several experts of computing companies and Institute of Technologies have investigated the cloud service and tested its operational options, security and vulnerability. Their independent research reports have the common idea: cloud storage is not a safe service yet. Many of its options should be improved. iCloud is not advisable service to use as it stores all private information online from the devices even they are locked. The process of information backup occurs in a way users do not notice. The fact that three years later after the introduction of iCloud the service has been hacked means that even the best experts cannot control cloud storage and users cannot have an expectation of privacy with regard to cloud storage.
The reason for the author selecting to look at literature regarding cloud security within this review is because of how it ties in with a Computing Science degree currently being worked towards at Staffordshire University. One of the modules being studied involves the creation of a database system, with the client formally requesting a cloud-based data centre as part of their system. Therefore, it would interesting to take an in-depth look at the security concerns surrounding what is a technology that is still within its infancy stage.
From the viewpoint of data security, which has always been an important form of quality of service, Cloud computing surely poses new challenging security threats for number of reasons. Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be straight accepted due to users loss control of data under cloud computing. Therefore, verification of correct data storage in the cloud must be attended without accurate knowledge of the whole data. Considering different kind of data for every user stored in the cloud and the requirement of long term continuous security of their data safety, the problem of checking correctness of data storage in the cloud becomes even more challenging.[1]
Many researchers have been conducting research to test the privacy and security in cloud storage. There are different models of data storage in cloud and researches targeted most common cloud storage services like dropbox, unity e.t.c as these are more vulnerable to attacks by malicious parties. With the grown internet usage, the file sharing through internet has been increased in recent years leading to increase in the number of attacks.
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
Imagine you are going to a technology conference in japan that your company spent thousands of dollars to get you to and you have been given the privilege of speaking at. You fly all the way there and of course your luggage with all of your files including your whole presentation and speech, computer, and not to mention your clothes is left back at Orlando International airport. Just a few years ago this would have been detrimental. You would have had no way to get to your documents that are trapped in your suitcase behind the scenes of the baggage claim in Orlando. On the other hand, today you can just buy a new cheap business outfit, and log into your cloud where all of your important documents would be sitting
Cloud computing has become so famous; there is much widespread news about the cloud these days. This is mainly because of the exponential shift of the business applications from traditional models of software towards the Internet, and now through mobile devices. Cloud computing is a model that uses the network of remote servers that has been hosted on the internet rather than on a specific hardware. This would enable a better shared pool for storing, accessing and processing of data. With the huge information being available in the internet, the security for cloud computing has been challenging and this paper would elucidates the security threats of cloud computing also stating the possible countermeasures for them.
Cloud storage system is a service model in which data are managed , maintained, and backuped remotely on the cloud side, and simultaneously keeps data available to the users over a network. Mobile Cloud Storage (MCS) [1], [2] represents a family of increasingly popular on-line services, and even is used as primary file storage for the mobile devices [3]. MCS helps the mobile device users to store and retrieve files or data on the cloud through wireless communication, which improves the data availability and facilitates the file sharing process without drawing off the local mobile device resources [4].