Privacy and Security Aware Cryptographic Algorithm for Secure Cloud Data Storage

Author(s):  
B. Muthulakshmi ◽  
M. Venkatesulu
Author(s):  
Chandu Thota ◽  
Gunasekaran Manogaran ◽  
Daphne Lopez ◽  
Vijayakumar V.

The rapid development of data generation sources such as digital sensors, networks, and smart devices along with their extensive use is leading to create huge database and coins the term Big Data. Cloud Computing enables computing resources such as hardware, storage space and computing tools to be provided as IT services in a pay-as-you-go fashion with high efficiency and effectiveness. Cloud-based technologies with advantages over traditional platforms are rapidly utilized as potential hosts for big data. However, privacy and security is one of major issue in cloud computing due to its availability with very limited user-side control. This chapter proposes security architecture to prevent and secure the data and application being deployed in cloud environment with big data technology. This chapter discuss the security issues for big data in cloud computing and proposes Meta Cloud Data Storage architecture to protect big data in cloud computing environment.


Web Services ◽  
2019 ◽  
pp. 240-257
Author(s):  
Chandu Thota ◽  
Gunasekaran Manogaran ◽  
Daphne Lopez ◽  
Vijayakumar V.

The rapid development of data generation sources such as digital sensors, networks, and smart devices along with their extensive use is leading to create huge database and coins the term Big Data. Cloud Computing enables computing resources such as hardware, storage space and computing tools to be provided as IT services in a pay-as-you-go fashion with high efficiency and effectiveness. Cloud-based technologies with advantages over traditional platforms are rapidly utilized as potential hosts for big data. However, privacy and security is one of major issue in cloud computing due to its availability with very limited user-side control. This chapter proposes security architecture to prevent and secure the data and application being deployed in cloud environment with big data technology. This chapter discuss the security issues for big data in cloud computing and proposes Meta Cloud Data Storage architecture to protect big data in cloud computing environment.


2018 ◽  
pp. 589-607 ◽  
Author(s):  
Chandu Thota ◽  
Gunasekaran Manogaran ◽  
Daphne Lopez ◽  
Vijayakumar V.

The rapid development of data generation sources such as digital sensors, networks, and smart devices along with their extensive use is leading to create huge database and coins the term Big Data. Cloud Computing enables computing resources such as hardware, storage space and computing tools to be provided as IT services in a pay-as-you-go fashion with high efficiency and effectiveness. Cloud-based technologies with advantages over traditional platforms are rapidly utilized as potential hosts for big data. However, privacy and security is one of major issue in cloud computing due to its availability with very limited user-side control. This chapter proposes security architecture to prevent and secure the data and application being deployed in cloud environment with big data technology. This chapter discuss the security issues for big data in cloud computing and proposes Meta Cloud Data Storage architecture to protect big data in cloud computing environment.


Symmetry ◽  
2021 ◽  
Vol 13 (3) ◽  
pp. 492
Author(s):  
Salah T. Alshammari ◽  
Aiiad Albeshri ◽  
Khalid Alsubhi

Cloud data storage is revolutionary because it eliminates the need for additional hardware, which is often costly, inconvenient, and requires additional space. Cloud data storage allows data owners to store large amounts of data in a flexible way and at low cost. The number of online cloud storage services and their consumers has therefore increased dramatically. However, ensuring the privacy and security of data on a digital platform is often a challenge. A cryptographic task-role-based access control (T-RBAC) approach can be used to protect data privacy. This approach ensures the accessibility of data for authorized consumers and keeps it safe from unauthorized consumers. However, this type of cryptographic approach does not address the issue of trust. In this paper, we propose a comprehensive trust model integrated with a cryptographic T-RBAC to enhance the privacy and security of data stored in cloud storage systems, and suggests that trust models involve inheritance and hierarchy in the roles and tasks of trustworthiness evaluation, where this study aims to identify the most feasible solution for the trust issue in T-RBAC approaches. Risk evaluations regarding other possible flaws of the design are also performed. The proposed design can decrease risk by providing high security for cloud storage systems and improve the quality of decisions of cloud operators and data owners.


Author(s):  
Umesh Banodha ◽  
Praveen Kumar Kataria

Cloud is an emerging technology that stores the necessary data and electronic form of data is produced in gigantic quantity. It is vital to maintain the efficacy of this data the need of data recovery services is highly essential. Cloud computing is anticipated as the vital foundation for the creation of IT enterprise and it is an impeccable solution to move databases and application software to big data centers where managing data and services is not completely reliable. Our focus will be on the cloud data storage security which is a vital feature when it comes to giving quality service. It should also be noted that cloud environment comprises of extremely dynamic and heterogeneous environment and because of high scale physical data and resources, the failure of data centre nodes is completely normal.Therefore, cloud environment needs effective adaptive management of data replication to handle the indispensable characteristic of the cloud environment. Disaster recovery using cloud resources is an attractive approach and data replication strategy which attentively helps to choose the data files for replication and the strategy proposed tells dynamically about the number of replicas and effective data nodes for replication. Thus, the objective of future algorithm is useful to help users together the information from a remote location where network connectivity is absent and secondly to recover files in case it gets deleted or wrecked because of any reason. Even, time oriented problems are getting resolved so in less time recovery process is executed.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


2019 ◽  
Vol 1 (1) ◽  
pp. 9-14
Author(s):  
Leonid Berezko ◽  
◽  
V. Tatianchuk

Sign in / Sign up

Export Citation Format

Share Document