• No results found

Secure the Cloud Storage and Recovery of Security Risks and Problems in Single Cloud.

N/A
N/A
Protected

Academic year: 2022

Share "Secure the Cloud Storage and Recovery of Security Risks and Problems in Single Cloud."

Copied!
7
0
0

Loading.... (view fulltext now)

Full text

(1)

Sireesha Chekuri,IJRIT 289 International Journal of Research in Information Technology (IJRIT)

www.ijrit.com ISSN 2001-5569

Secure the Cloud Storage and Recovery of Security Risks and Problems in Single Cloud.

Sireesha Chekuri, Seelam Satyanarayana Reddy

1PG Scholar, Computer Science and Engineering, Lakki Reddy Balli Reddy College of Engineering Mylavaram, Andhra Pradesh, India

Ch.sireesha504@gmail.com

Professor, Computer Science and Engineering, Lakki Reddy Balli Reddy College of Engineering 2Mylavaram, Andhra Pradesh, India

Saisn90@gmail.com

Abstract

Now a day‟s rapidly increased use of cloud computing in the many organization and IT industries and provides new software with low cost . Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers but these providers may be untrusted. Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. In this paper, we will comprehensively survey the concepts and architecture of cloud computing, as well as its security and privacy issues. Dealing with “single cloud”

providers is predicted to become less popular with customers due to risks of service availability failure and the possibility of malicious insiders in the single cloud. A movement towards “multi-clouds”, or in other words interclouds or cloud-of-clouds has emerged recently. In this paper, we provide solutions for secure cloud storage in multi cloud based system. In this paper we have represented the survey on different issues related to data storage security on single cloud as well as multi cloud and fault tolerance . This work aims to promote the use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user. This paper surveys to many running research related paper to single cloud and multi clouds security using Shamir‟s Secret Sharing algorithm

Keywords— Cloud computing, single cloud, multi-cloud, data privacy, models, data integrity, cloud storage, data intrusion, service availability.

1. INTRODUCTION

Cloud computing is the next generation in the Internet's technology which provides the user everything in terms of services like computing power to computing infrastructure, applications, business processes as per the need of user over the internet. Cloud providers should address privacy and security issues as a matter of high and urgent priority. Dealing with “single cloud” providers is becoming less popular with customers due to potential problems such as service availability failure and the possibility that there are malicious insiders in the single cloud.

Cloud computing is quickly becoming one of the most popular and trendy phrases being tossed around in today’s technology world. According to The Economist in a 2008 article, it will have huge impacts on the information technology industry, and also profoundly change the way people use computers [2]. ].

Cloud computing resources can be quickly extracted and effortlessly scaled with all the processes, services and applications provisioned on demand service despite the consequences of the user location or device.

(2)

Sireesha Chekuri,IJRIT 290 Hence, the opportunity for an organization to enhance their service deliverance efficiencies is achieved through cloud computing.

This paper focuses on the issues related to the data security aspect of cloud computing. As data and information will be shared with a third party, cloud computing users want to avoid an untrusted cloud provider. Protecting private and important Cloud providers should address privacy and security issues as a matter of high and urgent priority. Dealing with “single cloud” providers is becoming less popular with customers due to potential problems such as service availability failure and the possibility that there are malicious insiders in the single cloud. In recent years, there has been a move towards

“multiclouds”, “intercloud” or “cloud-of-clouds”.

In order to define cloud computing, it is first necessary to explain what is referenced by the phrase

“The Cloud”. The first reference to “The Cloud” originated from the telephone in-dustry in the early 1990s, when Virtual Pri-vate Network (VPN) service was first offered.

Aim of the paper the data security aspect of cloud computing, data and information will be shared personal and important documents such as debit/credit cards details or medical report from hackers or malicious insiders is the importance. It supply secure cloud database that will prevent security risks.

Cloud computing has four main features: elasticity, self-service of provisioning and need base usage payment.

a. Deployment Models

There are Four different deployment models of cloud computing.

1. Public Cloud:

Public or external cloud is one of type of cloud in which user can use the recourses as per the need and pay for usage. This type of cloud also has various service providers who provide traditional cloud computing services to users and charged for it.

2. Private Cloud:

Private cloud is the type of cloud in which the cloud is operated in only one organization or developed for one organization and managed by them or third party service provides. Basically this type of cloud is for the internal purpose of organization which is operated in geographically distributed.

3. Hybrid Cloud:

Hybrid Cloud can be made up with the combination of two type of cloud like private and public cloud or the combination of cloud virtualization server with physical hardware. This type of cloud is much cost expensive compare to public cloud.

4. Community Cloud:

If several organizations have similar kind of requirement, they can share the cloud then this type of cloud establishment is made possible in market. This cloud is also costly in compare to public cloud but provides high level security.

1.deployment models

.

(3)

Sireesha Chekuri,IJRIT 291

B.Services of Cloud Computing

Cloud computing is offered in different forms: public clouds, private clouds, and hybrid clouds, which combine both public and private [3].

1. Cloud Software as a Service (SaaS) :

Software as a Service provides software or application which can be used over the internet and user does not have not aware of any information regarding operating system, physical hardware. This type of application can be access via internet and through browser at user side. User can have only some of control setting for application. 2.

Cloud Platform as a Service (PaaS) :

Platform as a Service provide the setup of client’s software packages and other tools which set up on service providers’ physical hardware over the internet. So whole establishment is take place on service providers’ environment and user can access that software after authentication process passes successfully. This user can free from the hardware failure problem by adopting this service.

3. Cloud Infrastructure as a Service (IaaS) :

In this type of cloud, user can have whole virtual server and user can access it as he can access it local like start, needs them.

2.Cloud Services

C. Benefits of Cloud Computing

1. Reduction in capital expenditure on hardware and software deployment.

2. Location independence, as long as there is access to the Internet.

3. Increased flexibility and market agility as the quick deployment model of cloud computing increases the ability to re-provision rapidly as required.

4. Allows the enterprise to focus on its core business.

5. Increased competitive advantage.

6. Increased security at a much lesser cost as compared to traditional standalone applications due to centralization of data and increased security-focused resources.

7. Easy to maintain as they don't have to be installed on each user's computer.

The cloud services that are implemented or those that will be implemented will always be accompanied by several threats. Knowledge about these threats shall prove to be the first step to prevent them. Hence security is the chief concern of several clients who desire to leverage cloud services. In all types of cloud, security issues arrive in many ways in different phases such as user’s authentication, open source provision, virtual infrastructure, SLA, data storage and resource request[5]. Out of

(4)

Sireesha Chekuri,IJRIT 292 these, Cloud based data storage systems have many complexities regarding critical/confidential/sensitive data of client. The trust required on Cloud storage is so far far had been limited by users [6]. The survey of related research work done on the cloud data storage security is discussed in the paper. The discussion spans the security challenges with respect to the type of deployment, service and common network issues.

2. Cloud architecture

NIST [1] describes cloud computing as “a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction”.The cloud computing model consists of five characteristics, three delivery models, and four deployment models [1]. The five key characteristics of cloud computing are: location- independent resource pooling, on-demand self-service, rapid elasticity, broad network access, and measured

service [51]. These five characteristics represent the first layer in the cloud environment architecture Cloud deployment models include public, private, community, and hybrid clouds. A

cloud environment that is accessible for multi-tenants and is available to the public is called a public cloud,and private cloud is available for a particular group, while a community cloud is modified for a specific group of customers. Hybrid cloud infrastructure is a composition of two or more clouds (private, community, or public cloud) [51]. This model represents the third layer in the cloud environment architecture.

Cloud service providers should ensure the security of their customers’ data and should be responsible if any security risk affects their customers’ service infrastructure. A cloud provider offers many services that can benefit its customers, such as fast access to their data from any location, scalability, pay-for-use, data storage, data recovery, protection against hackers, on-demand security controls, and use of the network and infrastructure facilities [49].

3. Cloud computing architecture

(5)

Sireesha Chekuri,IJRIT 293

3. Cloud Computing-security risks

According to Amazon [46], their EC2 addresses security control in relation to physical, environmental, and virtualization security, whereas, the users remain responsible for addressing security control of the IT system including the operating systems, applications and data.

According to Tabakiet al. [51], the way the responsibility for privacy and security in a cloud computing environment is shared between consumers and cloud service providers differs between delivery models.

In SaaS, cloud providers are more responsible for the security and privacy of application services than the users. This responsibility is more relevant to the public than the private cloud environment because the clients need more strict security requirements in the public cloud. In PaaS, users are responsible for taking care of the applications that they build and run on the platform, while cloud providers are responsible for protecting one user’s applications from others. In IaaS, users are responsible for protecting operating systems and applications, whereas cloud providers must provide protection for the users’ data [51].

As the cloud services have been built over the Internet, any issue that is related to internet security will also affect cloud services. Resources in the cloud are accessed through the Internet; consequently even if the cloud provider focuses on security in the cloud infrastructure, the data is still transmitted to the users through networks which may be insecure. As a result, internet security problems will affect the cloud, with greater risks due to valuable resources stored within the cloud and cloud vulnerability. The technology used in the cloud is similar to the technology used in the Internet. Encryption techniques and secure protocols are not sufficient to protect data transmission in the cloud. Data intrusion of the cloud through the Internet by hackers and cybercriminals needs to be addressed and the cloud environment needs to be secure and private for clients [49].

We will address three security factors that particularly affect single clouds, namely data integrity, data intrusion, and service availability.

4. Details of Proposed Security Mechanism A. Data integrity in Multi Cloud

We provide a fast and effective mechanism for providing data integrity for user data in multi cloud.

Our mechanism is a hash based approach. The users file is split to many blocks. At any instant of time the files are stored in two different clouds. For each block hash is calculated and the hash is also maintained in the cloud. When any user requests for the cloud, the file blocks are retrieved from two cloud locations. The blocks are ideally kept in different storage servers in the cloud. The blocks are assembled to form wherever it is not corrupted. The corrupted blocks are replaced with valid block from other locations. Through the hash value of block matching with stored hash value the integrity is verified. We also keep track of number of times the files for corrupted for the user and the number of times the files are corrupted in the cloud server.

If the count of the number of times file corrupted for user are higher, then it concludes the authentication of the user has a leakage and his files are purposely corrupted by compromise of authentication parameters. In our proposed system we will keep various levels of security and different security profiles will be enabled based on the file corruption threshold parameter.

Also from the count of number of times files getting corrupted in cloud server, reputation of storage server is found. This will help the administrators to use mechanism like firewalls to improve the security of lower reputation storage servers. Based on the reputation of all servers in the cloud storage the reputation of the cloud calculated. If the reputation of cloud is lower the cloud data is backed up to other cloud and cloud is removed all the contents and that storage cloud is drooped from use for storage.

While penalizing the cloud for its lower reputation , we should also consider that compromise in user security may be due to user fault and penalizing should not be done due to this fault. The file corruption

(6)

Sireesha Chekuri,IJRIT 294 condition must be accounted in bas reputation only when highest security profile is allocated to user and still data corruption occurs.

B. Data Intrusion in Multi Cloud

To avoid data intrusion, ie user authentication is hacked and fake users login and corrupt the data we the user data is corrupted , he is move to highest security profile level starting from the lower security profile level.

In our proposed solution we provide but many levels can be provided 1. User name , password based authentication

2. Secure session id sent to user on his mobile phone for authentication 3. Biometric authentication.

The default security profile is Level 1 user name/Password based authentication. If the user files are frequently corrupted with Level 1, than provided a multi level security profile for the user. The levels of security for the user are very adaptive. If for the particular user Level 2 authentication is used. In Level 2 user has to enter his user id and get the password for access on his registered mobile number and he has to login using that password. This mechanism is more secure than Level 1. If the user file is still getting corrupted in Level 2 , the authentication is migrated to Level 2. In Level 2 biometric authentication is provided which is much more secure than Level1.

C. Service Availability in Multi cloud

Service availability is multi cloud is guaranteed with replicated file storage in two clouds. The file is replicated in the minimum of two clouds so that any point of time one cloud is always available. At each cloud , the file blocks are kept in the cloud storage , to guarantee high availability for the block. 1+1 replication for blocks are kept in servers , so that even if one of server is down the blocks can be retrieved from other server.

5. Conclusion and Enhancements

Although the use of cloud computing has rapidly increased, cloud computing security is still considered the major issue in the cloud computing environment. The main purpose of this work is to survey the recent research done on single cloud as well as on multi cloud to solve the security issues faced by the data owners. . Customers do not want to lose their private information as a result of malicious insiders in the cloud.

In addition, the loss of service availability has caused many problems for a large number of customers recently.

Furthermore, data intrusion leads to many problems for the users of cloud computing.

In this paper , we have proposed solutions for three most common security threat in cloud storage. We have proved that our mechanism performs better in reducing the security threat on cloud.

6. References

[1] (NIST), http://www.nist.gov/itl/cloud/.

[2] I. Abraham, G. Chockler, I. Keidar and D. Malkhi, "Byzantine disk paxos: optimal resilience with Byzantine shared memory", Distributed Computing, 18(5), 2006, pp. 387-408.

[3] Margaret Rouse, “CLOUD APPLICATION PERFORMANCE MANAGEMENT: DOING THE JOB RIGHT“, last modified December 2010.

[4] Anju Bala, Inderveer Chana, “Fault Tolerance- Challenges, Techniques and Implementation in Cloud Computing”, in the year of January 2012.

[5] M.A. AlZain and E. Pardede, "Using Multi Shares for Ensuring Privacy in Database-as-a-Service", 44th Hawaii Intl. Conf. on System Sciences (HICSS), 2011, pp. 1-9.

[6] Amazon, Amazon Web Services. Web services licensing agreement, October3,2006.

[7] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song,

"Provable data possession at untrusted stores", Proc. 14th ACM Conf. on Computer and

(7)

Sireesha Chekuri,IJRIT 295 communications security, 2007, pp. 598-609.

[8] Gangolu Sreedevi, Prof. C. Rajendra,” ICCC: Information Correctness to the Customers in Cloud Data Storage”, in the year of June 2012.

[9] Rupali Sachin Vairagade, Nitin Ashokrao Vairagade ,” Cloud Computing Data Storage and Security Enhancement”, in the year of August 2012.

[10] K.D. Bowers, A. Juels and A. Oprea, "HAIL: A high-availability and integrity layer for cloud storage", CCS'09: Proc. 16th ACM Conf. on Computer and communications security, 2009, pp. 187-198.

[11] C. Cachin, R. Haas and M. Vukolic, "Dependable storage in the Intercloud", Research Report RZ, 3783, 2010.

[12] C. Cachin, I. Keidar and A. Shraer, "Trusting the cloud", ACM SIGACT News, 40, 2009, pp.

81-86.

[13] C. Cachin and S. Tessaro, "Optimal resilience for erasure-coded Byzantine distributed storage", DISC:Proc. 19thIntl.Conf. on Distributed Computing, 2005, pp. 497-498

[14] Amir Mohamed Talib, Rodziah Atan, Rusli Abdullah, Masrah Azrifah Azmi Murad,” Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi-Agent System Architecture”, in the year of 2012.

[15] G. Chockler, R. Guerraoui, I. Keidar and M. Vukolic, "Reliable distributed storage", Computer, 42, 2009, pp. 60-67.

[16] Clavister, "Security in the cloud", Clavister White Paper, 2008.

[17] A.J. Feldman, W.P. Zeller, M.J. Freedman and E.W. Felten, "SPORC: Group collaboration using untrusted cloud resources", OSDI, October2010, pp. 1-14.

[18] G.R. Goodson, J.J. Wylie, G.R. Ganger and M.K. Reiter, "Efficient Byzantine-tolerant erasure- coded storage",DSN'04: Proc.Intl. Conf. on Dependable Systems and Networks,2004, pp.1-22.

[19] E. Grosse, J. Howie, J. Ransome, J. Reavis and S. Schmidt, "Cloud computing roundtable", IEEE Security & Privacy, 8(6), 2010, pp. 17-23.

References

Related documents

That the data contain information on each person for 2 years after the potential point of diversion is particularly important for this sample because, unlike pre-booking diversion,

Membranipora Lacroixii and Bowerbankia imbricata were taken up as far as half a mile above Halton Quay, where the salinity range from high to low water was approximately 210/00to

I am currently studying for my EdD at the Institute of Education, University College London and am conducting a comparative analysis of the assessment of aspiring principals who

Relation to [MO13] On October 2013, we initially posted the results contained within this paper which include: a construction of a public key encryption scheme that is IND-CPA

This understanding is seen in the nature of Estonia cyber security policy and strategies, which focus on resilience and agility of Estonian cyberspace.

ACHD, adult congenital heart disease; CR, cardiac rehabilitation; CVD, cardiovascular disease; TUQ, technology usage

Comparison catalytic activity of presented catalyst with other supported oxime palladacycles such as polymer supported oxime palladacycles 1a 11 and 2a 10a and

water resistance (thickness swelling and water absorption) was obtained at wood flour/SE ratios of 5/2, 4/3, and 4/3 for PST, PMMA, or PVC composite, respectively. The