Survey on Data Integrity and Security Issues in Cloud Storage  
  Authors : Lethija J; Shyja N K

 

Cloud computing is a novel internet based network architecture that focuses on sharing of computing and resources. It is defines as enabling ubiquitous, convenient, ondemand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. In a cloud system, for data owners, computing and data are not in the places they used to be in. It relieves the user from the burden of local storage and maintanence. With cloud storage data is stored to a set of concurrently running distributed servers. Since the data owner no more possess the data it may have to suffer both internal and external threats at cloud service provider.The risks of compromised security and privacy may be lower overall, however, with cloud computing than they would be if the data were to be stored on individual machines instead of in a so called "cloud" (the network of computers used for remote storage and maintenance).This paper reviews various security threats and data integrity issues and briefs some solutions for them.

 

Published In : IJCAT Journal Volume 1, Issue 6

Date of Publication : 31 July 2014

Pages : 227 - 232

Figures : 01

Tables : --

Publication Link : Survey on Data Integrity and Security Issues in Cloud Storage

 

 

 

Lethija J, : Department of Computer Science and Engineering Malabar College of Engineering and Technology, Thrissur.

Shyja N K : Department of Computer Science and Engineering Malabar College of Engineering and Technology, Thrissur.

 

 

 

 

 

 

 

Cloud computing

Integrity

Security

Doubtless, Cloud computing helps IT enterprises use various techniques to optimize and secure application performance in a cost-effective manner. But this suggestive way for decentralized application and access every time and everywhere to data, occasion and introduce new set of challenges and security problems that must consider before transfer data to a cloud environment. Additionally, just because the software can run in a Virtual machine does not mean that it performs well in cloud environment necessarily. Thereupon, in cloud there are risks and hidden costs in managing cloud compliance. The key to successful cloud computing initiatives is achieving a balance between the business benefits and the hidden potential risks which can impact efficiency. Cloud providers often have several powerful servers and resources in order to provide appropriate services for their users but cloud is at risk similar to other Internet-based technology.

 

 

 

 

 

 

 

 

 

[1] S. Roschke, et aI., "Intrusion Detection in the Cloud," presented at the Eighth IEEE International Conference on Dependable, AutonomIc and Secure Computing, Chengdu, China, 2009.

[2] C. Almond, "A Practical Guide to Cloud Computing Security," 27 August 2009

[3] http://cloudsecurity.trendmicro.com/

[4] T. Mather. (2011). Data Leakage Prevention and Cloud Computing.Available: http://www.kpmg.com/Globa1/Pages/default.aspx

[5] N. Mead, et ai, "Security quality requirements engineering(SQUARE) methodolgy," Carnegie Mellon Software Engineering Institute.

[6] Security Management in the Cloud. Availablehttp://mscerts.net/programming/Security% 20Management%20in%20the%20Cloud.aspx

[7] z. Zorz, "Top 7 threats to cloud computing," 2010.

[8] G. Ateniese, et al., "Provable data possession at untrusted stores," presented at the Proceedings of the 14th ACM conference on Computer and communications security, Alexandria, Virginia, USA, 2007.

[9] D. Boneh, et al., "Aggregate and VerifiablyEncrypted Signatures from Bilinear MapsAdvances in Cryptology — EUROCRYPT 2003." vol.2656, E. Biham, Ed., ed: Springer Berlin /Heidelberg, 2003, pp. 641-641.

[10] E. Mykletun, et al., "Authentication and integrity in outsourced databases," Trans. Storage, vol. 2, pp. 107-138, 2006.

[11] Juels and J. Burton S. Kaliski, "Pors: proofs of retrievability for large files," presented at the Proceedings of the 14th ACM conference on Computer and communications security, Alexandria, Virginia, USA, 2007.

[12] G. Ateniese, et al., "Scalable and efficient provable data possession," presented at the Proceedings of the 4th international conference on Security and privacy in communication netowrks, Istanbul, Turkey, 2008.

[13] Erway, et al., "Dynamic provable data possession," presented at the Proceedings of the 16th ACM conference on Computer and communications security, Chicago, Illinois, USA, 2009.

[14] K. D. Bowers, et al., "HAIL: a high-availability and integrity layer for cloud storage," presented at the Proceedings of the 16th ACM conference on Computer and communications security, Chicago, Illinois, USA, 2009

[15] K. D. Bowers, et al., "Proofs of retrievability: theory and implementation," presented at the Proceedings of the 2009 ACM workshop on Cloud computing security, Chicago, Illinois, USA, 2009.

[16] Y. Dodis, et al., "Proofs of Retrievability via Hardness Amplification, Theory of Cryptography, ." vol. 5444, O. Reingold, Ed., ed: Springer Berlin / Heidelberg, 2009, pp. 109-127.

[17] Q. Zheng and S. Xu, "Fair and dynamic proofs of retrievability," presented at the Proceedings of the first ACM conference on Data and application security and privacy, San Antonio, TX, USA, 2011.

[18] E. Stefanov, et al., "Iris: A Scalable Cloud File System with Efficient Integrity Checks."

[19] Q. Wang, et al., "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing; Computer Security – ESORICS 2009." vol. 5789, M. Backes and P. Ning, Eds., ed: Springer Berlin / Heidelberg, 2009, pp. 355-370.