Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Cloud Computing and Protected Storage Services Technique

Print
PDF
IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies
© 2012 by IJCA Journal
ICNICT - Number 4
Year of Publication: 2012
Authors:
Neha Chaudhary
Vineet Sharma

Neha Chaudhary and Vineet Sharma. Article: Cloud Computing and Protected Storage Services Technique. IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies ICNICT(4):24-27, November 2012. Full text available. BibTeX

@article{key:article,
	author = {Neha Chaudhary and Vineet Sharma},
	title = {Article: Cloud Computing and Protected Storage Services Technique},
	journal = {IJCA Special Issue on Issues and Challenges in Networking, Intelligence and Computing Technologies},
	year = {2012},
	volume = {ICNICT},
	number = {4},
	pages = {24-27},
	month = {November},
	note = {Full text available}
}

Abstract

Cloud Computing is the Shared pool of resources, which can be requested on-demand to enjoy the services and application. The data owner remotely store their data services and application which can be retrieved when required. The clients save their data on the storage services and gets free from the burden of maintaining the data. But some of the incidences in the history of cloud computing shows that they are not reliable at times Ex: Gmail disaster, Amazon S3 downfall. Some of the major challenging issues of the cloud computing are availability of service, data lock in, Data confidentiality and Auditability, Data transfer Bottleneck etc. The data outsourcing makes the owner free from data storage, physical organization and security, which is the need of both enterprises and individuals with high service level requirements. In order to smooth the progress of rapid deployment of cloud data storage service and regain security assurances with outsourced data dependability, efficient methods that enable on-demand data correctness verification on behalf of cloud data owners have to be designed. While public audit ability, we can have a trusted third audit party who have knowledge and capability to evaluate the danger of outsourced data whenever demanded. This is a cost effective method for data owners to believe on the cloud. We have challenges that need to be resolved for publicly auditable secure cloud storage services to become a reality.

References

  • P. Mell and T. Grance, "Draft NIST Working Definition of Cloud Computing," 2009; http://csrc. nist. gov/groups/SNS/cloud-computing/index. html
  • M. Armbrust et al. , "Above the Clouds: A Berkeley View of Cloud Computing," Univ. California, Berkeley, Tech. Rep. UCBEECS-2009-28, Feb. 2009.
  • Janakiram MSV "Demystifying the Cloud, introduction to Cloud Computing" Version 1. 1, 2010.
  • A. Juels, J. Burton, and S. Kaliski, "PORs: Proofs of Retrievability for Large Files," Proc. ACM CCS '07, Oct. 2007, pp. 584–97.
  • G. Ateniese et al. , "Provable Data Possession at Untrusted Stores," Proc. ACM
  • Mehul A. Shah, Mary Baker, Jeffrey C. Mogul, Ram Swaminathan, "Auditing To Keep Online Services Honest"; http://www. hpl. hp. com/personal/Mehul_Shah/papers/hotos11_2007_shah. pdf.
  • Cong Wang, Qian Wang, and Kui Ren, "Ensuring data storage security in cloud computing", Dept of ECE Illinois Institute of Technology; http://ece. wpi. edu/~wjlou/publication/IWQoS09_Wang. pdf
  • Amazon. com, "Amazon s3 Availability Event: July 20, 2008," July 2008; http://status. aws. amazon. com/s3-20080720. html
  • M. Arrington, "Gmail Disaster: Reports of Mass Email Deletions," Dec. 2006; http://www. techcrunch. com/2006/12/28/gmail-disaster-reports-of-massemail- deletions/
  • G. Ateniese et al. , "Scalable and Efficient Provable Data Possession," Proc. SecureComm '08, Sept. 2008
  • C. Wang et al. ,"Ensuring Data Storage Security in Cloud Computing," Proc. IWQoS '09, July 2009, pp. 1–9.
  • William stallings,2007 "Cryptography and Network Security, Principles and Practices",Volume, Prentis Hall.

Keywords