Study of Efficient Cloud Storage Architectures for the Security Environment

Authors

DOI:

https://doi.org/10.31642/JoKMC/2018/100108

Keywords:

Cloud computing , Cloud storage, Architecture, Security environment, Data security

Abstract

Lately, cloud computing has acquired notoriety. Data storage is an essential and beneficial area of concentrate in cloud computing. The term "cloud data storage" describes the process of transferring data to an external, up-to-date storage system. You store data to a far-off database instead of your PC's hard plate or another nearby storage gadget. Your PC and the database are associated over the web. The user's requirements for hardware and software are reduced via cloud storage. The security issues associated with accessing and storing data on cloud storage render the cloud information inconsistent and untrustworthy. Through the internet, the cloud computing provides service with dynamically scalable resources. Users gain from cloud computing services in terms of cost and usability. Security issues must be addressed by cloud computing services when sending sensitive data and important applications to shared and public cloud environments. For the needs of data processing and storage, cloud environments are expanding up significantly. The use of cloud computing has a number of benefits as well as drawbacks for service users' data security. The primary security concerns that exist in cloud computing systems are highlighted in this study. The essential security worries with cloud computing are examined in this paper, alongside a straightforward, secure, and protection saving architecture for between cloud data sharing that depends on an encryption/unscrambling calculation that expects to shield data put away in the cloud from unapproved access.

Downloads

Download data is not yet available.

References

Aditham, S., &Ranganathan, N. (2017). A System Architecture for the Detection of Insider Attacks in Big Data Systems. IEEE Transactions on Dependable and Secure Computing, 1–1. doi:10.1109/tdsc.2017.2768533 DOI: https://doi.org/10.1109/TDSC.2017.2768533

B. Waters, D. Balfanz, G. Durfee, and D. Smetters, “Building an encrypted and searchable audit log,” in ISOC Network and Distributed System Security Symposium (NDSS 2004). Citeseer, 2004.

BhavaniBai, B. (2014) Ensuring Security at Data Level in Cloud Using Multi-Cloud Architecture. International Journal of Science and Technology.

Daemen, J., & Rijmen, V. (2013). The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media.

H. Takabi, J. B. D. Joshi and G. Ahn, Security and privacy challenges in cloud computing environments, Security & Privacy, IEEE, Vol. 8, no. 6, pp. 24–31,(2010). DOI: https://doi.org/10.1109/MSP.2010.186

Jose, N. and Kamani, C. (2013) A Data Security Model Enhancement in Cloud Environment. Journal of Computer Science and Engineering, 10, 1-6. DOI: https://doi.org/10.9790/0661-01020106

L. Arockiam, S. Monikandan « Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm » International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 8, August 2013

L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, A.V. Vasilakos, Security and privacy for storage and computation in cloud computing, Inform. Sci. 258 (2014) 371–386. DOI: https://doi.org/10.1016/j.ins.2013.04.028

Mounica, D. and Rani, R. (2013) Optimized Multi-Clouds Using Shamir Shares. International Journal for Computer Science & Technology Development, 1, 83-87.

News Briefs, Amazon’s Massive Cloud Hosting Site Crashes, Journal of IEEE Computer, Vol. 44, pp. 18-20,(2011). DOI: https://doi.org/10.1109/MC.2011.288

Sathana, V. and Shanthini, J. (2014) Automated Security Providence for Dynamic Group in Cloud. International Journal of Innovative Research in CE, 2.

Shalu Mall, Sushil Kumar Saroj (2018), A New Security Framework for Cloud Data, Procedia Computer Science, 143, 765-775 DOI: https://doi.org/10.1016/j.procs.2018.10.397

M. Ellappan and S. Abirami, "Dynamic Prime Chunking Algorithm for Data Deduplication in Cloud Storage," KSII Transactions on Internet and Information Systems (TIIS), vol. 15, no. 4, pp. 1342-1359, 2021, http://doi.org/10.3837/tiis.2021.04.009. DOI: https://doi.org/10.3837/tiis.2021.04.009

P. Anitha, R. Dhanushram, D. H. Sudhan, and T. Indhresh, "Security Aware High Scalable paradigm for Data Deduplication in Big Data cloud computing Environments," in Journal of Physics: Conference

P. Arora, R. C. Wadhawan, and E. S. P. Ahuja, « Cloud Computing Security Issues in Infrastructure as a Service,» Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 2, no 1, 2012.

Papri Ghosh, Vishal Thakor, Dr. Pravin Bhathawala (2017). “Data Security and Privacy in Cloud Computing Using Different Encryption Algorithms” International Journal of Advanced Research in Computer Science and Software Engineering 7(5), May, pp. 469-471. DOI: https://doi.org/10.23956/ijarcsse/V7I5/0109

R.D. Dhungana, A. Mohammad, A. Sharma, I. Schoen, Identity management framework for cloud networking infrastructure, in IEEE International Conference on Innovations in Information Technology (IIT), 2013, pp. 13–17. DOI: https://doi.org/10.1109/Innovations.2013.6544386

Z. Xu and W. Zhang, "QuickCDC: A Quick Content Defined Chunking Algorithm Based on Jumping and Dynamically Adjusting Mask Bits," in 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2021, pp. 288-299: IEEE, DOI 10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00049. DOI: https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00049

Downloads

Published

2023-03-31

How to Cite

Adhab, A. H., & Hussien, N. A. (2023). Study of Efficient Cloud Storage Architectures for the Security Environment. Journal of Kufa for Mathematics and Computer, 10(1), 63–71. https://doi.org/10.31642/JoKMC/2018/100108

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.