scholarly journals Secure Auditing and Intelligent Compression in Cloud

As the cloud computing technology develops throughout the decennary, externalising data to store using cloud resource becomes a trend, which is benefited in heavy data management and maintenance. Notwithstanding, since the externalized cloud depository is not fully reliable, while achieving integrity auditing it elevate security treat on how to realize single instance storage in cloud. In this work, we study the problem of integrity auditing and secure intelligent compression on cloud data. Peculiarly, directing at attaining both eliminating duplicate copies of repeating data i.e., secure deduplication and integrity of data in cloud, we propose an auditing entity with a perpetuation of a MapReduce cloud, which helps audit the integrity as well as uploading of data after clients generate data tags having been collected in cloud.

2019 ◽  
pp. 889-902
Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Mehedi Masud

One of the main challenges in cloud computing is to build a healthy and efficient storage for securely managing and preserving data. This means a cloud service provider needs to make sure that its clients' outsourced data are stored securely and, data queries and retrievals are executed correctly and privately. On the other hand, it may also mean businesses are willing to outsource their data to a third party only if they trust their data are not accessible and visible to the service provider and other non-authorized parties. However, one of the major obstacles faced here for ensuring data reliability and security is Byzantine faults. While Byzantine fault tolerance (BFT) has received growing attention from the academic research community, the research done is generally from the distributed computing point of view, and hence finds little practical use in cloud computing. To that end, the focus of this paper is to discuss how these faults can be tolerated with the authors' proposed conceptualization of Byzantine data faults and fault-tolerant architecture in cloud data management.


2016 ◽  
pp. 1205-1222
Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Eric Pardede

Cloud computing is a phenomenal distributed computing paradigm that provides flexible, low-cost on-demand data management to businesses. However, this so-called outsourcing of computing resources causes business data security and privacy concerns. Although various methods have been proposed to deal with these concerns, none of these relates to multi-clouds. This paper presents a practical data management model in a public and private multi-cloud environment. The proposed model BFT-MCDB incorporates Shamir's Secret Sharing approach and Quantum Byzantine Agreement protocol to improve trustworthiness and security of business data storage, without compromising performance. The performance evaluation is carried out using a cloud computing simulator called CloudSim. The experimental results show significantly better performance in terms of data storage and data retrieval compared to other common cloud cryptographic based models. The performance evaluation based on CloudSim experiments demonstrates the feasibility of the proposed multi-cloud data management model.


2016 ◽  
Vol 7 (3) ◽  
pp. 86-98 ◽  
Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Mehedi Masud

One of the main challenges in cloud computing is to build a healthy and efficient storage for securely managing and preserving data. This means a cloud service provider needs to make sure that its clients' outsourced data are stored securely and, data queries and retrievals are executed correctly and privately. On the other hand, it may also mean businesses are willing to outsource their data to a third party only if they trust their data are not accessible and visible to the service provider and other non-authorized parties. However, one of the major obstacles faced here for ensuring data reliability and security is Byzantine faults. While Byzantine fault tolerance (BFT) has received growing attention from the academic research community, the research done is generally from the distributed computing point of view, and hence finds little practical use in cloud computing. To that end, the focus of this paper is to discuss how these faults can be tolerated with the authors' proposed conceptualization of Byzantine data faults and fault-tolerant architecture in cloud data management.


Cloud Computing is a robust, less cost, and an effective platform for providing services. Nowadays, it is applied in various services such as consumer business or Information Technology (IT) carried over the Internet. This cloud computing has some risks of security because, the services which are required for its effective compilation is outsources often by the third party providers. This makes the cloud computing more hard to maintain and monitor the security and privacy of data and also its support. This sudden change in the process of storing data towards the cloud computing technology improved the concerns about different issues in security and also the various threats present in this cloud storage. In the concept of security in cloud storage, various threats and challenges are noted by recent researchers. Hence, an effective framework of providing security is required. The main aim of this paper is to analyze various issues in securing the cloud data threats present in the cloud storage and to propose a novel methodology to secure it. This paper also identifies the most crucial components that can be incorporated in the already existing security measures while designing the storage systems based on cloud. This study also provides us to identify all the available solutions for the challenges of security and privacy in cloud storage.


Author(s):  
Shantanu Pal

Cloud computing has leaped ahead as one of the biggest technological advances of the present time. In cloud, users can upload or retrieve their desired data from anywhere in the world at anytime, making this the most important and primary function in cloud computing technology. While this technology reduces the geographical barriers and improves the scalability in the way we compute, keeping data in a Cloud Data Center (CDC) faces numerous challenges from unauthorized users and hackers within the system. Creating proper Service Level Agreements (SLA) and providing high-end storage security is the biggest barrier being developed for better Quality of Service (QoS) and implementation of a safer cloud computing environment for the Cloud Service Users (CSU) as well as for the Cloud Service Providers (CSP). Therefore, cloud applications need to have increased QoS and effective security measures and policies set in place to provide better services and to decline unauthorized access. The purpose of this chapter is to examine the cloud computing technology behind innovative business approaches and establishing SLA in cloud computing applications. This chapter provides a clear understanding of different cloud computing security challenges, risks, attacks, and solutions that exist in the present heterogeneous cloud computing environment. Storage security, different cloud infrastructures, the many advantages, and limitations are also discussed.


2021 ◽  
Vol 18 (4) ◽  
pp. 1270-1274
Author(s):  
J. Prassanna ◽  
V. Neelanarayanan

Cloud computing is a most popular technology that has huge response in markets. Cloud computing has the potential to access applications and their related data via the Internet anywhere. Most companies already pay for the use of cloud resources for storage purposes and ultimately reduce the costs of infrastructure spending. They can make use of this technology for accessing to company applications like pay-as-you-go approach. One of the major obstacles associated with cloud computing technology is to better optimization of resource allocation. Assigning of workloads to the servers using load balancing techniques is used to achieve less response time and better resource optimization across the server. Resource control and balance of load are the major conflicts in the cloud environment, which is why there are different load balancing algorithms, each with its own advantages and disadvantage. In order to achieve a better economy and mutual benefit, efficient algorithms can be derived simultaneously by optimizing servers, green computing and better utilization of resources. The objective of this paper is to analyze and enhance existing load balancing algorithms.


2015 ◽  
Vol 5 (3) ◽  
pp. 35-52 ◽  
Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Eric Pardede

Cloud computing is a phenomenal distributed computing paradigm that provides flexible, low-cost on-demand data management to businesses. However, this so-called outsourcing of computing resources causes business data security and privacy concerns. Although various methods have been proposed to deal with these concerns, none of these relates to multi-clouds. This paper presents a practical data management model in a public and private multi-cloud environment. The proposed model BFT-MCDB incorporates Shamir's Secret Sharing approach and Quantum Byzantine Agreement protocol to improve trustworthiness and security of business data storage, without compromising performance. The performance evaluation is carried out using a cloud computing simulator called CloudSim. The experimental results show significantly better performance in terms of data storage and data retrieval compared to other common cloud cryptographic based models. The performance evaluation based on CloudSim experiments demonstrates the feasibility of the proposed multi-cloud data management model.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
YanJiao Dong ◽  
Yang Zhang

The traditional architecture of e-commerce data management needs to adapt to the new and more complex environment, which needs to provide massive data management, compatibility of different types of data, and better user experience. Cloud computing technology is a synthesis of parallel, distributed, and grid computing and is one of the future directions of information technology development. In this paper, we use cloud computing data management technology to study the data management of e-commerce. It is hoped that the current e-commerce data management can be improved with the help of cloud computing technology. This paper starts from analyzing the current e-commerce representatives Taobao.com and Jingdong Mall to find out the data characteristics of these two enterprises, analyze the existing data problems, and find the aspects that can be improved. Using this open-source cloud computing implementation solution, we solve the storage problem of large files and unstructured small files in the e-commerce system.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 307
Author(s):  
K Ruth Ramya ◽  
D N.V.Saikrishna ◽  
T Sravya Nandini ◽  
R Tanmai Gayatri

Cloud computing the most emerging data storage and processing technology. Today many organizations are using cloud-based data storage because of their complex data management. Even though cloud is attracting many users towards using it but there is a requirement of security concerns to be taken care of because cloud is untrusted, the data which individual stores on cloud will be transparent to cloud administrator also which may be confidential. So, while using cloud security is the primary concern. In this paper, we proposed a scheme to encrypt cloud data using user attribute-based encryption. Which is a public key crypto technique in which key will be based on the attributes of user. The attributes we used are biometrics of user who is going to upload the data.  


Kybernetes ◽  
2022 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ahmad Latifian

PurposeBig data has posed problems for businesses, the Information Technology (IT) sector and the science community. The problems posed by big data can be effectively addressed using cloud computing and associated distributed computing technology. Cloud computing and big data are two significant past-year problems that allow high-efficiency and competitive computing tools to be delivered as IT services. The paper aims to examine the role of the cloud as a tool for managing big data in various aspects to help businesses.Design/methodology/approachThis paper delivers solutions in the cloud for storing, compressing, analyzing and processing big data. Hence, articles were divided into four categories: articles on big data storage, articles on big data processing, articles on analyzing and finally, articles on data compression in cloud computing. This article is based on a systematic literature review. Also, it is based on a review of 19 published papers on big data.FindingsFrom the results, it can be inferred that cloud computing technology has features that can be useful for big data management. Challenging issues are raised in each section. For example, in storing big data, privacy and security issues are challenging.Research limitations/implicationsThere were limitations to this systematic review. The first limitation is that only English articles were reviewed. Also, articles that matched the keywords were used. Finally, in this review, authoritative articles were reviewed, and slides and tutorials were avoided.Practical implicationsThe research presents new insight into the business value of cloud computing in interfirm collaborations.Originality/valuePrevious research has often examined other aspects of big data in the cloud. This article takes a new approach to the subject. It allows big data researchers to comprehend the various aspects of big data management in the cloud. In addition, setting an agenda for future research saves time and effort for readers searching for topics within big data.


Sign in / Sign up

Export Citation Format

Share Document