DATA STORAGE SECURITY IN CLOUD COMPUTING USING THIRD PARTY AUDITOR (TPA)
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 5, Issue 7
Abstract
Cloud Computing is evolving and considered next generation architecture for computing. Typically cloud computing is a combination of computing recourses accessible via internet. Historically the client or organisations store data in data centres with firewall and other security techniques used to protect data against intrudes to access the data. Since the data was confined to data centres in limits of organisation, the control over the data was more and well defined procedures could be used for accessing its own data. However in cloud computing, since the data is stored anywhere across the globe, the client organisations have less control over the stored data. To built the trust for the growth of cloud computing the cloud providers must protect the user data from unauthorised access and disclosure. One technique could be encrypting the data on client side before storing it in cloud storage, however this technique has too much burden from client perspective in terms of key management, maintainence perspective etc. Other way could be this kind of security service like computing hash of data and verifying integrity of data, encryption/decryption service if provided by same cloud storage provider, the data compromise cannot be ruled out since same provider has access to both storage and security service. Divide and rule can be one of the techniques, meaning dividing the responsibilities amongst different cloud services providers can benefit the client. A trusted 3rd party cloud provider be used to provide security services, while the other cloud provider would be data storage provider. The trusted 3rd party security service provider would not store any data at its end, and its only confined to providing security service. The application or software will provide data integrity verification by using hashing algorithm like SHA-1,provide encryption/decryption using symmetric algorithm like ES, and defining band of people who can access the shared data securely can be achieved by defining access list. The Software is only resonsible for encryption/decryption, computing/verifying the hash of the data and does not store any data in trusted 3rd party security system server. The encrypted data along and original data hash are stored in Separate Cloud (Security Cloud), therefore even if the storage cloud system administrator has access user data, since the data is encrypted it will be difficult for the system administrator to understand the encrypted data. While the user downloads the data from Storage Cloud, it is decrypted first and then new hash is calculated which is then compared with hash of original data stored in Security Cloud. Finally, this software/application provides the user with the ability to store the encrypted data in Storage cloud and hash and encryption/decryption keys in security cloud service, and no single cloud service provider has access to both. Other benefit of delegating responsibility to trusted 3rd party is that it reliefs the client from any kind of key management or over head is maintainance of any key information related to data on it device, because of which it allows the client to use any browser enabled devices to access such service.
Authors and Affiliations
Rahul K. Morghade
DETECTION OF COMPUTER VIRUSES USING WELM_MA
Computer viruses are big threat for our society .The expansion of various new viruses of varying forms make the prevention quite tuff. Here we proposed WELM_MA to detect computer viruses. The proposed method efficientl...
Effectually Global Position Finding Of Accident Detection Using Wireless Sensor Network
This paper describes an original idea to detects accidents. The idea has been developed keeping in mind the considerations of cost and compatibility with existing system. The Short Message Service or SMS as it is...
Treatment of Automotive Gas Oil (Ago) - Contaminated Water Using Activated Carbon from Indian Bamboo
This study investigated the ability of activated carbon extracted from Nigerian-grown Indian bamboo, to absorb hydrocarbon from automotive gas oil -contaminated water. The water was polluted in the ratio of 3:1 (that is...
Studies on Controlled Release Fertilizer on Roselle and Amaranthus Plants
India needs to raise its food grains targets at a rate of more than 4 million tons per annum. Scope for increase in area under cultivation is negligible. Due to rapid increase of population as well as the drop in...
INFLUENCES OF BRACING SYSTEM IN RC STRUCTURE ON SLOPING GROUND UNDER WIND LOADS
In this work effect of wind velocity on building with and without bracing resting on a sloping ground has been studied, bracing with a frame structure resist a lateral load generate from wind and earthquake loads...