DATA SECURITY IN CLOUD COMPUTING Introduction: Cloud computing has prompted a movement in how individuals consider IT frameworks structural engineering. Numerous associations today are either executing cloud-based services, or assessing which cloud-based measures they will be portraying later on. As indicated by Gartner Inc. distributed computing is "no less compelling than e-business". This sprocess in building design from an undertaking normal server-based framework to a cloud-based framework will have related expenses of passage and dangers, yet it can bring about inconceivable advantages in reserve funds and in IT and business deftness.
However, with the convenience of cloud storage come real risks. Cloud storage is quite attractive, given the advantages previously stated, but there are still great concerns, including reliability and security. Organizations relying on cloud computing must ensure that the third party they’ve entrusted to store their data can guarantee that they can access their information at any time and that their information is safe from the threat of hackers (Berman, 2008, p. ).
Cloud computing is a type of computing, instead of having local servers or personal devices to handle applications it trusts on sharing computing resources. Cloud data storage has many advantages over local data storage. This paper mainly focuses on security concerned privacy data enhancement in the cloud environment. This would serve as the promising analysis to ken about the reinforcing approach utilized for resolving the privacy issues and the security threats occurred in the cloud resources. This paper describes different problems associated to privacy while saving user’s data on third party service providers, which is more generally called as cloud service. There is a lot of investigation being made to spot out the issues with these cloud service providers and cloud security in general. This would serve as the promising analysis to know about the strengthening approach used for resolving the privacy issues and the security threats occurred in the cloud resources. The Major problem in Cloud Computing is a Data security. Data is accessed anywhere without retaining local copy of data in cloud storage. The data is not secured with others as cloud provider cannot be trusted. Thus, enabling public audibility for cloud storage is of critical importance so that users can resort to a TPA to check the integrity of outsourced data.
From the viewpoint of data security, which has always been an important form of quality of service, Cloud computing surely poses new challenging security threats for number of reasons. Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be straight accepted due to users loss control of data under cloud computing. Therefore, verification of correct data storage in the cloud must be attended without accurate knowledge of the whole data. Considering different kind of data for every user stored in the cloud and the requirement of long term continuous security of their data safety, the problem of checking correctness of data storage in the cloud becomes even more challenging.[1]
Cloud computing helps in bringing together complex IT documents in a small number of places, which can be managed easily. Although cloud computing has its advantages such as simplicity and cost, there are certain security concerns which have been brought about by users, as it involves storing important, and critical data in a shared and public environment. The issues on security concerns can be explained as follows:
Cloud Computing is an advanced paradigm with a lot of advantages, but its distinct features also create privacy and security issues. Cloud computing provides service model which is more efficient technology for business support. Cloud computing is in fact a service based approach which has changed almost every aspect of computing technologies. There are many threats to the cloud computing including security vulnerabilities and privacy issues.
Usage of remote servers via internet to store, manage and process data instead of using a personal computer is known as Cloud computing. It’s a set of Information Technology services with the ability to scale up or down their service requirements. Most of the cloud services are provided by a third party service provider. In cloud computing, organizations can utilize IT services without in advance investment. Despite its benefits obtained from the cloud computing, the organizations are slow in accepting it due to security issues and challenges. Security is one of the major problems which hinder the growth of cloud. It’s not wise to handing over the important data to another company; such that clients need to be vigilant in understanding the risks of data infringement in this new environment. This paper discusses a detailed analysis of the cloud computing security issues and challenges. (Ayoleke)
The motivation behind choosing this topic is the many advantages of Computing of encrypted data and homomorphic encryption (HE) like Delegation which is when a client can delegate the process of data to the powerful third party (server) while still maintaining data privacy. To this end, the client could send the server an encryption of the data, created employing an HE scheme. The server is able to run processes over the encrypted data, and return an output to the client; the client needs only to decrypt to receive the processed answer. The server here can actually be a collection of computing devices (cloud).
The question arises whether our data and the way it is managed are safe and trustworthy in cloud data centres.
Cloud computing is becoming very popular amongst private users as well as business sectors due to its benefits of availability, time saving and cheaper. However, one of the biggest factors which hold back the users is Security and Reliability of the data. The report briefly describes cloud computing, its characteristics, and its three major categories. It discusses about the reliability of data in cloud computing. The report also discusses about the NoSQL database of the Cloud Service Provider giants like Google, Amazon, and Apache and how they ensure reliability of the data in their services. Finally, the report discusses about the data security in the cloud computing infrastructure. It throws light on the security of data at various levels like Network Transport Security, Data Storage Security, and Data Management Security.
People have always concerned about the security of their important documents as well as information. The Roman Empire military delivered sensitive and secure messages on parchments that could be dissolved in water after getting the information. But nowadays, what most of us use to store our documents in the cloud. Cloud computing is one of the common words in this modern world, the 21st century, the practice of using the network to control the servers that hosted on the internet to store, manage, and process data rather than a local server or a personal computer. The security in information technology is considered as the biggest challenge
While reading this paper, the authors are discussing the security worries with in cloud computing and its challenges. In the information technology area, cloud computing has become one of the fastest-growing parts of the industry. As a result of the vast movement of cloud computing some concerns of security issues have appeared. The issues come from the idea that data is stored remotely from the user’s location. The beauty of cloud computing is that data can be stored in any location. Users concern about their privacy and security risk has lowered overall, however regarding cloud computing users do not feel comfortable because data is stored in a cloud (the network of computers used for remote storage and maintenance) and not
In current paper we will go through current solution that are used to secure a cloud and get an idea where it is headed. We will start with the basic encryption techniques to complex and understand the infrastructure of who encryption is used to secure the cloud environment.
Abstract - Cloud computing is architecture for providing computing service via the internet on demand and pay per user access to a pool of shared resources namely networks, storage, servers, services and applications, without physically acquiring them. So it saves managing cost and time for organizations. Cloud security is becoming a key differentiator and competitive edge between cloud providers.
Data security has systematically been a major issue in IT. Data security becomes particularly serious in the cloud computing environment, because data are scattered in different machines and storage devices including servers, PCs, and various mobile devices such as wireless sensor networks and smart phones. Data security in the cloud computing is more complicated than data security in the traditional data systems.