SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021)
1
A Study of Data Storage Security Issues in Cloud Computing
Tushar Bobade1,
Chandani Patel2
1
(Department of MCA, Viva School Of MCA/ University of Mumbai, India)
2
(Department of MCA, Viva School Of MCA/ University of Mumbai, India)
Abstract :
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices
providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan
accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata
storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais
correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare
usedforsecuredatastorageoncloud.
Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for
consumers. Cloud computing offers standardized applications to users online and in a manner that can be
accessed regularly. Such applications can be accessed by as many persons as permitted within an organization
without bothering about the maintenance of such application. The Cloud also provides a channel to design and
deploy user applications including its storage space and database without bothering about the underlying
operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud
makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core
activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
Keywords - Cloud computing, Cloud storage server, Data storage , Functional paradigm , Storage space.
I. INTRODUCTION
Cloud computing is the combination of many pre- existingtechnologiesthathavematuredatdifferent
rates and in the different contexts. The goal of cloud computing is to allow users to take benefit of all
thesetechnologies.Manyorganizationsaremoving into cloud because it allows users to storetheir data on clouds
and can access at anytime from anywhere. Data breaching is possible in cloud environment, since data from
various users and business organizations lie together in cloud. By sending data to the cloud, the data owners
transfer the control of their data to third person that may raise security problems. Sometimes the Cloud Service
Provider(CSP) itself will use/corrupt the dataillegally.Cloud storage is important aspect of today’s
life.[3][5]Security and privacy stands as major obstacle on cloud computing i.e. preserving confidentiality,
integrityandavailabilityofdata.Asimplesolutionis toencryptthedatabeforeuploadingitontocloud. This approach
ensures that the data are not visibletoexternalusersandcloudadministratorsbut has the limitation that plain text
based searching algorithm are not applicable. In this paper, we discuss the security flaws in data storage and
mechanisms to overcomeit.[1][2]
II. CLOUD STORAGE
Cloud storage is one of primary use of cloud computing.Wecandefinecloudstorageasstorageof
thedataonlineinthecloud.Acloudstoragesystem is considered as a distributed data centres, which typically use
cloud-computing technologies & offers some kind of interface for storing and accessing data. When storing data
on cloud, it appearsasifthedataisstoredinaparticularplace with specificname.[6]
Therearefourmaintypesofcloudstorage:
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021)
2
2.1 Personal CloudStorage:
Itisalsoknownasmobilecloudstorage.Inthistype storage,individual'sdataisstoredinthecloud,and
he/shemayaccessthedatafromanywhere.[7]
2.2 Public Cloud Storage:
In Public cloud storage the enterprise and storage service provider are separate and there aren't any
cloud resources stored in the enterprise's data center. The cloud storage provider fully manages enterprise's
public cloud storage.[7]
2.3 Private Cloud Storage:
In Private Cloud Storage the enterprise and cloud storage provider are integrated in the enterprise's data
center. In private cloud storage, the storage provider has infrastructure in enterprise's data center that is
typically managed by the storage provider. Private cloud storage helps resolve the potential for security and
performance concerns while still offering the advantages of cloud storage.[7]
2.4 Hybrid cloud storage:
It is a combination of public and private cloud storage where some critical data resides in the
enterprise's private cloud while other data isstored andaccessiblefromapubliccloudstorageprovider.[7]
III. CHARACTERISTICS OF CLOUD COMPUTING
There are five characteristics of cloud computing. The first one is on-demand self-service, where a
consumer of services is provided the needed resources without human intervention and interaction with cloud
provider. The second characteristicisbroadnetworkaccess,whichmeans resources can accessed from anywhere
through a standardmechanismbythinorthickclientplatforms such mobile phone, laptop, and desktop computer.
Resource pooling is another characteristic, which means resources are pooled in order for multi- tenants to
share the resources. In the multi-tenant model, resources are assigned dynamically to a
consumerandafterconsumerfinishesit,itcanbe assignedtoanotheronetorespondtohighresource demand. Fig.1.
Even if the resources are assignedto customersondemand,theydonotknowthelocation of these assignedresources.
Following figures will show the characteristics of cloud computing .[8][10]
Fig. 1: Cloud environment architecture
Sometimes they know the location at a high-level abstraction,suchascountry,state,anddatacentre.
Storage, processing, memory, and network arethe kindofresourcesareassigned.Rapidelasticityis another
characteristic, which means thatresources are dynamically increasedwhen neededand decreased when there is no
need. Also, one of characteristics that a consumer needs ismeasured
serviceinordertoknowhowmuchisconsumed.[1]
IV. ENCRYPTED DATA STORAGE FOR CLOUD
Since data in the cloud is placed anywhere, it is important that data be encrypted. We are using secure
co-processor as part of the cloud infrastructure to enable efficient encrypted storage of sensitive data. By
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021)
3
embedding a secure co-processor (SCP) intocloud infrastructure, the system can handle encrypted
dataefficiently. Parts of the proposed instrument (see Figure 2). Basically, SCP is tamper-resistant hardware
capable of limited general-purpose computation. For example, IBM 4758 Cryptographic Coprocessor (IBM) is a
single- board computer consisting of a CPU, memory and special-purpose cryptographic hardware contained in
a tamper-resistant shell, certified to level 4 under FIPS PUB 140-1.[14] When installed on the server, it is
capable of performing local computations that completely hidden from the server. If tampering is detected, then
secure co-processor clears the internal memory. Since the secure coprocessor is tamper-resistant, one could be
tempted to run entire sensitive data storage server on the secure coprocessor. Pushing the entire data storage
functionality into a secure co-processor is not feasible due to many reasons. First of all, due to tamper-resistant
shell, secure co-processors have usually limited memory (only a few megabytes of RAM and
a few kilobytes of non-volatile memory) and computational power (Smith, 1999). Performance will improve
over time, but problems such as heat dissipation/power (which must be controlled to avoid disclosing
processing) will force a gap between general purposes and secure computing. Another issue is that software
running on the SCP must be totally trusted and verified. This security requirement implies that software running
on the SCP should be kept as simple as possible. We can encrypt the sensitive data sets using random private
keys and to alleviate risk of key disclosure, we can use tamper-resistant hardware to store some of
encryption/decryption keys (i.e., a master key that encrypts all other keys).[13][11]. It is basically very
important to encrypt the data in cloud storage. Fig.2.
Fig. 2:Parts of the proposed instrument
V. SECURITY AND PRIVATE ISSUES IN DATA STORAGE
Cloud Computing allows the users to store their data on storage location maintained by a third party.
Once the data is uploaded into cloud, the user loses its control over the data and the attackers can tamper the
data. The attacker may be an internal(CSP) or external. Unauthorized access is also a common practice due to
weak access control. The protection of information arises the following challenges:
The security and privacy issues related to data storage are confidentiality, integrity and availability. [2]
This changes are important to tackle the security issues in cloud computing.
5.1 Confidentiality
The major dispute in cloud computing is confidentiality. Data confidentiality means accessing data
only by authorized users and is strongly related to authentication.In another
way,confidentialitymeanskeepingusersdatasecretinthe cloudsystems.Aswearestoringthedataonaremote server
and transferring control over the data to theproviderherearisesthequestionssuchas:
For ensuring confidentiality, cryptographic encryption algorithms and strong authentication
mechanismscanbeused.Encryptionistheprocessof converting data into a form called cipher text
thatcanbeunderstoodonlybyauthorizedusers. Fig.3. Encryption is an efficient technique for protecting the
data but have the obstacle that data will belost once the encryption key is stealed. algorithms.
Blowfishisafatandsimpleencryptionalgorithm. Formally the algorithm is based n confidentiality.[13]
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021)
4
Fig. 3:Symmetric encryption
Theaboveencryptiontechniqueshavethelimitation that for searching data from the file, the entire file
has to be decrypted. Fig. 4. It is a time consuming process and thus searchable encryption was introduced.
Searchable encryption allows build an index for file containing the keywords and is encrypted and stored
along with file, so that while searching the data only thekeywords are decrypted rather than the entire file and
search is made on it. Everything based on cloud computing defined in confidentiality area.[5]
Fig. 4:Asymmetric encryption
5.2 Integrity
Anotherseriousproblemfacedbycloudcomputingis integrity. Integrity of data means to make sure that
datahasnotbeenchangedbyanunauthorized personorinanunauthorizedway.Itisamethodfor ensuring that the data
is real, accurate and safeguarded from unauthorized users. As cloud computing supports resource sharing,
there is a possibility of data being corrupted by unauthorized users.DigitalSignaturescanbeusedforpreserving
integrity of data.Fig. 5. Integrity is very important point in cloud computing. The simple way for providing
integrity is using Message Authentication Code(MAC).[9]
Fig. 5:Remote auditing mechanism
5.3 Availability
Availabilityreferstobeingavailableandaccessibleto authorizedusersondemand.Theaimofavailability inthe
cloudcomputingsystemsistoensurethatitsusers canusethematanyplaceandatanytime.[9]
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021)
5
VI. CONCLUSION
Cloudcomputingenablesuserstostoretheirdatain remotestoragelocation.Butdatasecurityisthe major
threat in cloud computing. Due to this many organizations are not willing to move into the cloud environment.
To overcome this, confidentiality, integrity, availability should be encapsulated in a CSP’s Service- Level
Agreement (SLA) to its customers. Otherwise ensure that any sensitive information is not put into a public
cloud and if any it is to be stored in the encrypted form. Effective
auditingmechanismsalsocanbeusedforproviding dataintegrity. But there are other challenges cloud computing
must overcome. People are very skeptical about whether their data is secure and private. There are no standards
or regulations worldwide provided data through the cloud computing. Europe has data protection laws but the
US, being one of the most technological advance nation, does not have any data protection laws. Users also
worry about who can disclose their data and have ownership of their data. But once, there are standards and
regulation worldwide, cloud computing will revolutionize the future.
REFERENCES
[1] V.Nirmala, R.K.Sivanandhan, Dr.R.Shanmuga Lakshmi, “Data Confidentiality and Integrity Verification usingUser
Authenticator scheme in cloud”, Proceedings of 2013 International Conference on Green High Performance Computing
(ICGHPC 2013). March 14-15, 2013,India.
[2] ArjunKumar,ByungGookLee,HoonJaeLee, Anu Kumari, “Secure Storage and Access of Data in Cloud Computing”,
2012International Conference on ICT Convergence (ICTC),15-17 Oct.2012.
[3] M.R.Tribhuwan, V.A.Bhuyar, Shabana Pirzade, “Ensuring Data Storage Security in Cloud Computing through Two-way
Handshake based on Token Management”, 2010 International Conference on Advances in Recent Technologies in
Communication and Computing.
[4] Mr. Prashant Rewagad, Ms.Yogita Pawar, “Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption
Algorithm to Enhance Data Security in Cloud Computing”, 2013 International Conference on Communication Systems and
Network Technologies.
UmaSomani,KanikaLakhani,ManishMundra, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the
Data Security of Cloud in Cloud Computing”, 1st International Conference on Parallel, Distributed and Grid Computing
(PDGC - 2010).
[5] M. AlZain, E. Pardede, B. Soh, and J. Thom, “Cloud computing security: From single to multi-
clouds,”inSystemScience(HICSS),2012 45th Hawaii International Conference on, Jan 2012, pp.5490–5499.
[6] M. Sookhak, H. Talebian, E. Ahmed, A.Gani, and M. K. Khan, “A review on remote data
auditinginsinglecloudserver:Taxonomyand openissues,”JournalofNetworkandComputer Applications,vol.43,pp.121–141,2014.
[7] E. Aguiar, Y. Zhang, and M. Blanton, “An overviewofissuesandrecentdevelopmentsin
cloudcomputingandstoragesecurity,”inHigh PerformanceCloudAuditingandApplications. Springer, 2014, pp.3–33.
[8] I. Gul, M. Islam et al., “Cloud computing security auditing,” in Next Generation Information Technology (ICNIT), 2011 The
2ndInternationalConferenceon.IEEE,2011, pp.143–148.
[9] E.M.Mohamed,H.S.Abdelkader,andS.El- Etriby, “Enhanced data security model for cloudcomputing,”inInformaticsandSystems
(INFOS), 2012 8th International Conference on.IEEE,2012,pp.CC–12.
[10] S.Ramgovind,M.M.Eloff,andE.Smith,“The management of security in cloud computing,” in Information Security for South
Africa (ISSA),2010.IEEE,2010,pp.1–7.
[11] F. Sabahi, “Cloud computing security threats and responses,” in Communication Software and Networks (ICCSN), 2011 IEEE
3rd International Conference on. IEEE, 2011, pp. 245–249.
[12] X. Wang, B. Wang, and J. Huang, “Cloud computing and its key techniques,” in Computer Science and Automation
Engineering(CSAE),2011IEEEInternational Conferenceon,vol.2.IEEE,2011,pp.404–410
[13] Sultan Aldossary, William Allen, “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues andCurrent
Solutions”, in International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 4, 2016
[14] Latifur Khan and Bhavani Thuraisingham, “Security Issues for Cloud Computing”, in Technical Report UTDCS-02-10,
February 2010.
[15] T. Sookhak, H. Talebian, E. Ahmed, A.Gani, and M. K. Khan, “A review on remote data
auditinginsinglecloudserver:Taxonomyand openissues,”JournalofNetworkandComputer Applications,vol.43,pp.121–141,2014.

Más contenido relacionado

La actualidad más candente

Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
 
An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingIAEME Publication
 
data storage security technique for cloud computing
data storage security technique for cloud computingdata storage security technique for cloud computing
data storage security technique for cloud computinghasimshah
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniquesijcsa
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha TukeAnusha Chavan
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computingGopinath Muthusamy
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 

La actualidad más candente (16)

Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
An approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computingAn approach for secured data transmission at client end in cloud computing
An approach for secured data transmission at client end in cloud computing
 
data storage security technique for cloud computing
data storage security technique for cloud computingdata storage security technique for cloud computing
data storage security technique for cloud computing
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
G033030035
G033030035G033030035
G033030035
 
A survey on cloud security issues and techniques
A survey on cloud security issues and techniquesA survey on cloud security issues and techniques
A survey on cloud security issues and techniques
 
Ensuring data security in cloud computing. - Anusha Tuke
Ensuring data security in  cloud computing. - Anusha TukeEnsuring data security in  cloud computing. - Anusha Tuke
Ensuring data security in cloud computing. - Anusha Tuke
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computing
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 

Similar a A Study of Data Storage Security Issues in Cloud Computing

SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTUREcscpconf
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...IRJET Journal
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityEditor IJCATR
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Editor IJARCET
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms IJECEIAES
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 
IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED
 

Similar a A Study of Data Storage Security Issues in Cloud Computing (20)

C017421624
C017421624C017421624
C017421624
 
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURESECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTURE
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
6 7
6 76 7
6 7
 
F017414853
F017414853F017414853
F017414853
 
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...IRJET-  	  Analysis of Cloud Security and Performance for Leakage of Critical...
IRJET- Analysis of Cloud Security and Performance for Leakage of Critical...
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and SecurityFragmentation of Data in Large-Scale System For Ideal Performance and Security
Fragmentation of Data in Large-Scale System For Ideal Performance and Security
 
Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
489 493
489 493489 493
489 493
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
J0423066069
J0423066069J0423066069
J0423066069
 
V5 i7 0169
V5 i7 0169V5 i7 0169
V5 i7 0169
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 
IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED-V2I1P2
IJSRED-V2I1P2
 

Más de vivatechijri

Understanding the Impact and Challenges of Corona Crisis on Education Sector...
Understanding the Impact and Challenges of Corona Crisis on  Education Sector...Understanding the Impact and Challenges of Corona Crisis on  Education Sector...
Understanding the Impact and Challenges of Corona Crisis on Education Sector...vivatechijri
 
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT  LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT vivatechijri
 
A study on solving Assignment Problem
A study on solving Assignment ProblemA study on solving Assignment Problem
A study on solving Assignment Problemvivatechijri
 
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...vivatechijri
 
Theoretical study of two dimensional Nano sheet for gas sensing application
Theoretical study of two dimensional Nano sheet for gas sensing  applicationTheoretical study of two dimensional Nano sheet for gas sensing  application
Theoretical study of two dimensional Nano sheet for gas sensing applicationvivatechijri
 
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOODMETHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOODvivatechijri
 
The Business Development Ethics
The Business Development EthicsThe Business Development Ethics
The Business Development Ethicsvivatechijri
 
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEAn Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEvivatechijri
 
Enhancing The Capability of Chatbots
Enhancing The Capability of ChatbotsEnhancing The Capability of Chatbots
Enhancing The Capability of Chatbotsvivatechijri
 
Smart Glasses Technology
Smart Glasses TechnologySmart Glasses Technology
Smart Glasses Technologyvivatechijri
 
Future Applications of Smart Iot Devices
Future Applications of Smart Iot DevicesFuture Applications of Smart Iot Devices
Future Applications of Smart Iot Devicesvivatechijri
 
Cross Platform Development Using Flutter
Cross Platform Development Using FlutterCross Platform Development Using Flutter
Cross Platform Development Using Fluttervivatechijri
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systemsvivatechijri
 
Light Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking TechnologyLight Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking Technologyvivatechijri
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacyvivatechijri
 
THE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCETHE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCEvivatechijri
 
Google File System
Google File SystemGoogle File System
Google File Systemvivatechijri
 
A Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain TechnologyA Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain Technologyvivatechijri
 

Más de vivatechijri (20)

Understanding the Impact and Challenges of Corona Crisis on Education Sector...
Understanding the Impact and Challenges of Corona Crisis on  Education Sector...Understanding the Impact and Challenges of Corona Crisis on  Education Sector...
Understanding the Impact and Challenges of Corona Crisis on Education Sector...
 
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT  LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
 
A study on solving Assignment Problem
A study on solving Assignment ProblemA study on solving Assignment Problem
A study on solving Assignment Problem
 
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
 
Theoretical study of two dimensional Nano sheet for gas sensing application
Theoretical study of two dimensional Nano sheet for gas sensing  applicationTheoretical study of two dimensional Nano sheet for gas sensing  application
Theoretical study of two dimensional Nano sheet for gas sensing application
 
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOODMETHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
 
The Business Development Ethics
The Business Development EthicsThe Business Development Ethics
The Business Development Ethics
 
Digital Wellbeing
Digital WellbeingDigital Wellbeing
Digital Wellbeing
 
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEAn Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
 
Enhancing The Capability of Chatbots
Enhancing The Capability of ChatbotsEnhancing The Capability of Chatbots
Enhancing The Capability of Chatbots
 
Smart Glasses Technology
Smart Glasses TechnologySmart Glasses Technology
Smart Glasses Technology
 
Future Applications of Smart Iot Devices
Future Applications of Smart Iot DevicesFuture Applications of Smart Iot Devices
Future Applications of Smart Iot Devices
 
Cross Platform Development Using Flutter
Cross Platform Development Using FlutterCross Platform Development Using Flutter
Cross Platform Development Using Flutter
 
3D INTERNET
3D INTERNET3D INTERNET
3D INTERNET
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
 
Light Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking TechnologyLight Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking Technology
 
Social media platform and Our right to privacy
Social media platform and Our right to privacySocial media platform and Our right to privacy
Social media platform and Our right to privacy
 
THE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCETHE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCE
 
Google File System
Google File SystemGoogle File System
Google File System
 
A Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain TechnologyA Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain Technology
 

Último

Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stageAbc194748
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 

Último (20)

Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 

A Study of Data Storage Security Issues in Cloud Computing

  • 1. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021) 1 A Study of Data Storage Security Issues in Cloud Computing Tushar Bobade1, Chandani Patel2 1 (Department of MCA, Viva School Of MCA/ University of Mumbai, India) 2 (Department of MCA, Viva School Of MCA/ University of Mumbai, India) Abstract : Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations. Keywords - Cloud computing, Cloud storage server, Data storage , Functional paradigm , Storage space. I. INTRODUCTION Cloud computing is the combination of many pre- existingtechnologiesthathavematuredatdifferent rates and in the different contexts. The goal of cloud computing is to allow users to take benefit of all thesetechnologies.Manyorganizationsaremoving into cloud because it allows users to storetheir data on clouds and can access at anytime from anywhere. Data breaching is possible in cloud environment, since data from various users and business organizations lie together in cloud. By sending data to the cloud, the data owners transfer the control of their data to third person that may raise security problems. Sometimes the Cloud Service Provider(CSP) itself will use/corrupt the dataillegally.Cloud storage is important aspect of today’s life.[3][5]Security and privacy stands as major obstacle on cloud computing i.e. preserving confidentiality, integrityandavailabilityofdata.Asimplesolutionis toencryptthedatabeforeuploadingitontocloud. This approach ensures that the data are not visibletoexternalusersandcloudadministratorsbut has the limitation that plain text based searching algorithm are not applicable. In this paper, we discuss the security flaws in data storage and mechanisms to overcomeit.[1][2] II. CLOUD STORAGE Cloud storage is one of primary use of cloud computing.Wecandefinecloudstorageasstorageof thedataonlineinthecloud.Acloudstoragesystem is considered as a distributed data centres, which typically use cloud-computing technologies & offers some kind of interface for storing and accessing data. When storing data on cloud, it appearsasifthedataisstoredinaparticularplace with specificname.[6] Therearefourmaintypesofcloudstorage:
  • 2. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021) 2 2.1 Personal CloudStorage: Itisalsoknownasmobilecloudstorage.Inthistype storage,individual'sdataisstoredinthecloud,and he/shemayaccessthedatafromanywhere.[7] 2.2 Public Cloud Storage: In Public cloud storage the enterprise and storage service provider are separate and there aren't any cloud resources stored in the enterprise's data center. The cloud storage provider fully manages enterprise's public cloud storage.[7] 2.3 Private Cloud Storage: In Private Cloud Storage the enterprise and cloud storage provider are integrated in the enterprise's data center. In private cloud storage, the storage provider has infrastructure in enterprise's data center that is typically managed by the storage provider. Private cloud storage helps resolve the potential for security and performance concerns while still offering the advantages of cloud storage.[7] 2.4 Hybrid cloud storage: It is a combination of public and private cloud storage where some critical data resides in the enterprise's private cloud while other data isstored andaccessiblefromapubliccloudstorageprovider.[7] III. CHARACTERISTICS OF CLOUD COMPUTING There are five characteristics of cloud computing. The first one is on-demand self-service, where a consumer of services is provided the needed resources without human intervention and interaction with cloud provider. The second characteristicisbroadnetworkaccess,whichmeans resources can accessed from anywhere through a standardmechanismbythinorthickclientplatforms such mobile phone, laptop, and desktop computer. Resource pooling is another characteristic, which means resources are pooled in order for multi- tenants to share the resources. In the multi-tenant model, resources are assigned dynamically to a consumerandafterconsumerfinishesit,itcanbe assignedtoanotheronetorespondtohighresource demand. Fig.1. Even if the resources are assignedto customersondemand,theydonotknowthelocation of these assignedresources. Following figures will show the characteristics of cloud computing .[8][10] Fig. 1: Cloud environment architecture Sometimes they know the location at a high-level abstraction,suchascountry,state,anddatacentre. Storage, processing, memory, and network arethe kindofresourcesareassigned.Rapidelasticityis another characteristic, which means thatresources are dynamically increasedwhen neededand decreased when there is no need. Also, one of characteristics that a consumer needs ismeasured serviceinordertoknowhowmuchisconsumed.[1] IV. ENCRYPTED DATA STORAGE FOR CLOUD Since data in the cloud is placed anywhere, it is important that data be encrypted. We are using secure co-processor as part of the cloud infrastructure to enable efficient encrypted storage of sensitive data. By
  • 3. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021) 3 embedding a secure co-processor (SCP) intocloud infrastructure, the system can handle encrypted dataefficiently. Parts of the proposed instrument (see Figure 2). Basically, SCP is tamper-resistant hardware capable of limited general-purpose computation. For example, IBM 4758 Cryptographic Coprocessor (IBM) is a single- board computer consisting of a CPU, memory and special-purpose cryptographic hardware contained in a tamper-resistant shell, certified to level 4 under FIPS PUB 140-1.[14] When installed on the server, it is capable of performing local computations that completely hidden from the server. If tampering is detected, then secure co-processor clears the internal memory. Since the secure coprocessor is tamper-resistant, one could be tempted to run entire sensitive data storage server on the secure coprocessor. Pushing the entire data storage functionality into a secure co-processor is not feasible due to many reasons. First of all, due to tamper-resistant shell, secure co-processors have usually limited memory (only a few megabytes of RAM and a few kilobytes of non-volatile memory) and computational power (Smith, 1999). Performance will improve over time, but problems such as heat dissipation/power (which must be controlled to avoid disclosing processing) will force a gap between general purposes and secure computing. Another issue is that software running on the SCP must be totally trusted and verified. This security requirement implies that software running on the SCP should be kept as simple as possible. We can encrypt the sensitive data sets using random private keys and to alleviate risk of key disclosure, we can use tamper-resistant hardware to store some of encryption/decryption keys (i.e., a master key that encrypts all other keys).[13][11]. It is basically very important to encrypt the data in cloud storage. Fig.2. Fig. 2:Parts of the proposed instrument V. SECURITY AND PRIVATE ISSUES IN DATA STORAGE Cloud Computing allows the users to store their data on storage location maintained by a third party. Once the data is uploaded into cloud, the user loses its control over the data and the attackers can tamper the data. The attacker may be an internal(CSP) or external. Unauthorized access is also a common practice due to weak access control. The protection of information arises the following challenges: The security and privacy issues related to data storage are confidentiality, integrity and availability. [2] This changes are important to tackle the security issues in cloud computing. 5.1 Confidentiality The major dispute in cloud computing is confidentiality. Data confidentiality means accessing data only by authorized users and is strongly related to authentication.In another way,confidentialitymeanskeepingusersdatasecretinthe cloudsystems.Aswearestoringthedataonaremote server and transferring control over the data to theproviderherearisesthequestionssuchas: For ensuring confidentiality, cryptographic encryption algorithms and strong authentication mechanismscanbeused.Encryptionistheprocessof converting data into a form called cipher text thatcanbeunderstoodonlybyauthorizedusers. Fig.3. Encryption is an efficient technique for protecting the data but have the obstacle that data will belost once the encryption key is stealed. algorithms. Blowfishisafatandsimpleencryptionalgorithm. Formally the algorithm is based n confidentiality.[13]
  • 4. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021) 4 Fig. 3:Symmetric encryption Theaboveencryptiontechniqueshavethelimitation that for searching data from the file, the entire file has to be decrypted. Fig. 4. It is a time consuming process and thus searchable encryption was introduced. Searchable encryption allows build an index for file containing the keywords and is encrypted and stored along with file, so that while searching the data only thekeywords are decrypted rather than the entire file and search is made on it. Everything based on cloud computing defined in confidentiality area.[5] Fig. 4:Asymmetric encryption 5.2 Integrity Anotherseriousproblemfacedbycloudcomputingis integrity. Integrity of data means to make sure that datahasnotbeenchangedbyanunauthorized personorinanunauthorizedway.Itisamethodfor ensuring that the data is real, accurate and safeguarded from unauthorized users. As cloud computing supports resource sharing, there is a possibility of data being corrupted by unauthorized users.DigitalSignaturescanbeusedforpreserving integrity of data.Fig. 5. Integrity is very important point in cloud computing. The simple way for providing integrity is using Message Authentication Code(MAC).[9] Fig. 5:Remote auditing mechanism 5.3 Availability Availabilityreferstobeingavailableandaccessibleto authorizedusersondemand.Theaimofavailability inthe cloudcomputingsystemsistoensurethatitsusers canusethematanyplaceandatanytime.[9]
  • 5. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference onRole of Engineers in Nation Building – 2021 (NCRENB-2021) 5 VI. CONCLUSION Cloudcomputingenablesuserstostoretheirdatain remotestoragelocation.Butdatasecurityisthe major threat in cloud computing. Due to this many organizations are not willing to move into the cloud environment. To overcome this, confidentiality, integrity, availability should be encapsulated in a CSP’s Service- Level Agreement (SLA) to its customers. Otherwise ensure that any sensitive information is not put into a public cloud and if any it is to be stored in the encrypted form. Effective auditingmechanismsalsocanbeusedforproviding dataintegrity. But there are other challenges cloud computing must overcome. People are very skeptical about whether their data is secure and private. There are no standards or regulations worldwide provided data through the cloud computing. Europe has data protection laws but the US, being one of the most technological advance nation, does not have any data protection laws. Users also worry about who can disclose their data and have ownership of their data. But once, there are standards and regulation worldwide, cloud computing will revolutionize the future. REFERENCES [1] V.Nirmala, R.K.Sivanandhan, Dr.R.Shanmuga Lakshmi, “Data Confidentiality and Integrity Verification usingUser Authenticator scheme in cloud”, Proceedings of 2013 International Conference on Green High Performance Computing (ICGHPC 2013). March 14-15, 2013,India. [2] ArjunKumar,ByungGookLee,HoonJaeLee, Anu Kumari, “Secure Storage and Access of Data in Cloud Computing”, 2012International Conference on ICT Convergence (ICTC),15-17 Oct.2012. [3] M.R.Tribhuwan, V.A.Bhuyar, Shabana Pirzade, “Ensuring Data Storage Security in Cloud Computing through Two-way Handshake based on Token Management”, 2010 International Conference on Advances in Recent Technologies in Communication and Computing. [4] Mr. Prashant Rewagad, Ms.Yogita Pawar, “Use of Digital Signature with Diffie Hellman Key Exchange and AES Encryption Algorithm to Enhance Data Security in Cloud Computing”, 2013 International Conference on Communication Systems and Network Technologies. UmaSomani,KanikaLakhani,ManishMundra, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010). [5] M. AlZain, E. Pardede, B. Soh, and J. Thom, “Cloud computing security: From single to multi- clouds,”inSystemScience(HICSS),2012 45th Hawaii International Conference on, Jan 2012, pp.5490–5499. [6] M. Sookhak, H. Talebian, E. Ahmed, A.Gani, and M. K. Khan, “A review on remote data auditinginsinglecloudserver:Taxonomyand openissues,”JournalofNetworkandComputer Applications,vol.43,pp.121–141,2014. [7] E. Aguiar, Y. Zhang, and M. Blanton, “An overviewofissuesandrecentdevelopmentsin cloudcomputingandstoragesecurity,”inHigh PerformanceCloudAuditingandApplications. Springer, 2014, pp.3–33. [8] I. Gul, M. Islam et al., “Cloud computing security auditing,” in Next Generation Information Technology (ICNIT), 2011 The 2ndInternationalConferenceon.IEEE,2011, pp.143–148. [9] E.M.Mohamed,H.S.Abdelkader,andS.El- Etriby, “Enhanced data security model for cloudcomputing,”inInformaticsandSystems (INFOS), 2012 8th International Conference on.IEEE,2012,pp.CC–12. [10] S.Ramgovind,M.M.Eloff,andE.Smith,“The management of security in cloud computing,” in Information Security for South Africa (ISSA),2010.IEEE,2010,pp.1–7. [11] F. Sabahi, “Cloud computing security threats and responses,” in Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. IEEE, 2011, pp. 245–249. [12] X. Wang, B. Wang, and J. Huang, “Cloud computing and its key techniques,” in Computer Science and Automation Engineering(CSAE),2011IEEEInternational Conferenceon,vol.2.IEEE,2011,pp.404–410 [13] Sultan Aldossary, William Allen, “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues andCurrent Solutions”, in International Journal of Advanced Computer Science and Applications, Vol. 7, No. 4, 2016 [14] Latifur Khan and Bhavani Thuraisingham, “Security Issues for Cloud Computing”, in Technical Report UTDCS-02-10, February 2010. [15] T. Sookhak, H. Talebian, E. Ahmed, A.Gani, and M. K. Khan, “A review on remote data auditinginsinglecloudserver:Taxonomyand openissues,”JournalofNetworkandComputer Applications,vol.43,pp.121–141,2014.