scholarly journals Secure Enterprise and Read Performance Enhancement in Data Deduplication for Secondary Storage

With the tremendous growth of available digital data, the use of Cloud Service Providers (CSPs) are gaining more popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking advantage of a new set of benefits and savings offered by cloud technologies in terms of computational, storage, bandwidth, and transmission costs. we propose solutions for different data types (text, image and video) for secure data de-duplication in cloud environments. Our schemes allow users to upload their data in a secure and efficient manner such that neither a semi-honest CSP nor a malicious user can access or compromise the security of the data. Moreover, we propose proof of storage protocols including Proof of Retrievability (POR) and Proof of Ownership (POW) so that users of cloud storage services are able to ensure that their data has been saved in the cloud without tampering or manipulation. Experimental results are provided to validate the effectiveness of the proposed schemes. proposes a method to improve the read performance by investigating the recently accessed chunks and their locality in the backup set (data stream). Based on this study of the distribution of chunks in the data stream, few chunks are identified that need to be accumulated and stored to serve the future read requests better. This identification and accumulation happen on cached chunks. By this a small degree of duplication of the de-duplicated data is introduced, but by later caching them together during the restore of the same data stream, the read performance is improved. Finally the read performance results obtained through experiments with trace datasets are presented and analyzed to evaluate the design.

2021 ◽  
Author(s):  
Fatema Rashid

With the tremendous growth of available digital data, the use of Cloud Service Providers (CSPs) are gaining more popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking advantage of a new set of benefits and savings offered by cloud technologies in terms of computational, storage, bandwidth, and transmission costs. In order to achieve savings in storage, CSPs often employ data dedplication techniques to eliminate duplicated data. However, benefits gained through these techniques have to balanced against users' privacy concerns, as these techniques typically require full access to data. In this thesis, we propose solutions for different data types (text, image and video) for secure data deduplication in cloud environments. Our schemes allow users to upload their data in a secure and efficient manner such that neither a semi-honest CSP nor a malicious user can access or compromise the security of the data. We use different image and video processing techniques, such as data compression, in order to further improve the efficiency of our proposed schemes. The security of the deduplication schemes is provided by applying suitable encryption schemes and error correcting codes. Moreover, we propose proof of storage protocols including Proof of Retrievability (POR) and Proof of Ownership (POW) so that users of cloud storage services are able to ensure that their data has been saved in the cloud without tampering or manipulation. Experimental results are provided to validate the effectiveness of the proposed schemes.


2021 ◽  
Author(s):  
Fatema Rashid

With the tremendous growth of available digital data, the use of Cloud Service Providers (CSPs) are gaining more popularity, since these types of services promise to provide convenient and efficient storage services to end-users by taking advantage of a new set of benefits and savings offered by cloud technologies in terms of computational, storage, bandwidth, and transmission costs. In order to achieve savings in storage, CSPs often employ data dedplication techniques to eliminate duplicated data. However, benefits gained through these techniques have to balanced against users' privacy concerns, as these techniques typically require full access to data. In this thesis, we propose solutions for different data types (text, image and video) for secure data deduplication in cloud environments. Our schemes allow users to upload their data in a secure and efficient manner such that neither a semi-honest CSP nor a malicious user can access or compromise the security of the data. We use different image and video processing techniques, such as data compression, in order to further improve the efficiency of our proposed schemes. The security of the deduplication schemes is provided by applying suitable encryption schemes and error correcting codes. Moreover, we propose proof of storage protocols including Proof of Retrievability (POR) and Proof of Ownership (POW) so that users of cloud storage services are able to ensure that their data has been saved in the cloud without tampering or manipulation. Experimental results are provided to validate the effectiveness of the proposed schemes.


2020 ◽  
Vol 3 (7) ◽  
pp. 43-62
Author(s):  
Tetyana Smirnova ◽  
Liudmyla Polishchuk ◽  
Oleksii Smirnov ◽  
Kostiantyn Buravchenko ◽  
Andrii Makevnin

In order to determine the basic conditions for further research to identify threats to cloud technologies and measures for their counteraction, the article provides an extended analysis of cloud computing as a service. Among the above services, the basic services IaaS, SaaS, PaaS are selected, which are the basis for the existence of more unified services (CaaS, MCaS, DaaS, FaaS, IPaaS, MBaaS, NaaS, SeCaa, DBaaS, MaaS, DBaaS, MaaS, DBaaS, MaaS that increase the scope. Listed are possible service providers, including Ukrainian. It is determined that in order to transfer the work of systems of engineering calculations and computer-aided design (CAD) systems to a cloud platform, a rather new promising service CAEaaS (Cоmputеr Аidеd Еnginееrіng аs а Sеrvіcе) – computer engineering systems as a service. The most popular SAEs are used in the following industries: mechanical engineering and machine tools, defense and aerospace, energy, shipbuilding, semiconductor production, telecommunications, chemical, pharmaceutical and medical industry, construction, production of heating, air conditioning, ventilation. The success of a project decision depends on the awareness of responsible choice in the very first stage. Unfortunately, in support of the CAEaaS cloud service, Ukraine is only making the first steps and can provide the technological needs of enterprises, provided the involvement of foreign suppliers. According to the authors of the article, the future of the Ukrainian industry according to the cloud service SAEaS. Because CAE helps reduce the cost and time of product development, improve product quality and durability. Design decisions can be made based on their impact on performance. Designs can be evaluated and refined using computer modeling rather than physical prototype testing, saving money and time. This article is the basis for further research on the identification of threats to cloud technologies and their response.


Author(s):  
V. Gevko ◽  
O. Vivchar ◽  
V. Sharko ◽  
О. Radchenko ◽  
M. Budiaiev ◽  
...  

Abstract. The modern world is in the phase of active implementation of digitalization of most processes, including cloud technologies, which is also associated with the introduction of quarantine measures in most countries. Over the past decade, the average annual growth of the cloud services market has expanded by about 50% to more than $ 220 billion. This figure is projected to exceed $ 500 billion in the near future. Currently, a large number of cloud service companies are concentrated in the market. All companies can be classified into national, operating within one country, and international, operating in many countries simultaneously. In Ukraine, the leader is the high-tech company De Novo, which provides services in the segment of corporate clients based on VMware, EMC, Microsoft Azure solutions. Competitors are well-known foreign IT giants, namely: Oracle, IBM, Google, Microsoft, Amazon, HP and others. The Ministry of Digital Transformation of Ukraine plays an important role in this area. The latter signed an agreement with Microsoft to implement the Azure Expansion Program and accelerate Ukraine's digital transformation, including the development of Azure cloud services for the sum of more than $ 500 million. The transition from physical, outdated IT technologies to new cloud services will allow companies to significantly reduce the cost of maintaining their own staff of IT professionals and engineers, reduce dependence on IT equipment suppliers and increase productivity and efficiency of the decisions made. The management of the enterprise can choose one of the offered models from the companies-providers: IaaS, PaaS, SaaS. The choice will depend on the immediate management needs and financial capabilities of the enterprise. In Ukraine, the biggest share of users of cloud services belongs to large utility companies and state enterprises, namely: Dija, Ministry of Internal Affairs, Kyiv Municipal Enterprise "Informatics", Prozorro, Ukrposhta, E-Health (National Health Center of Ukraine), Naftogaz and several other organizations. Thus, the introduction of cloud services involves digital business transformations, namely: optimization of business processes, acceleration of innovation, cost reduction and so on. Key words: IT technologies, cloud technologies, cloud service providers, management, business. JEL Classification L86, M15 Formulas: 0; fig.: 1; tabl.: 2; bibl.: 21.


Author(s):  
Alexander Herzfeldt ◽  
Sebastian Floerecke ◽  
Christoph Ertl ◽  
Helmut Krcmar

With the increasing maturity of cloud technologies and the growing demand from customers, the cloud computing ecosystem has been expanding continuously with both incumbents and new entrants, whereby it has become more distributed and less transparent. For cloud service providers previously focusing on growth strategies, it is now necessary to shift the attention to providing service efficiently, as well as profitably. Based on 14 explorative interviews with cloud service experts, the relationship between cloud service provider profitability and value facilitation, which stands for the capability to build up resources in advance of future customer engagements, is investigated. The results indicate a positive relationship between cloud service profitability and value facilitation and deliver valuable insights for both researchers and practitioners. In particular, guidelines on how to design profitable cloud service offerings are discussed.


Author(s):  
Alexander Herzfeldt ◽  
Sebastian Floerecke ◽  
Christoph Ertl ◽  
Helmut Krcmar

With the increasing maturity of cloud technologies and the growing demand from customers, the cloud computing ecosystem has been expanding continuously with both incumbents and new entrants, whereby it has become more distributed and less transparent. For cloud service providers previously focusing on growth strategies, it is now necessary to shift the attention to providing service efficiently, as well as profitably. Based on 14 explorative interviews with cloud service experts, the relationship between cloud service provider profitability and value facilitation, which stands for the capability to build up resources in advance of future customer engagements, is investigated. The results indicate a positive relationship between cloud service profitability and value facilitation and deliver valuable insights for both researchers and practitioners. In particular, guidelines on how to design profitable cloud service offerings are discussed.


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


Cloud computing is an emerging computing environment which facilitates on demand services. As it contributes a large pool of computing resources, scheduling of tasks in an efficient manner is one of the main problems. Poor allocation of tasks affects the performance of the whole system. Hence it is very important to schedule the tasks for better utilization of resources by allocating them properly to particular resources in particular time. Efficient scheduling algorithms fulfill the user requirements and also satisfy the needs of the cloud service providers without affecting the performance of the environment. Execution Time based Sufferage Algorithm (ETSA), Cost and Completion Time based Sufferage Algorithm (CCTSA) and Modified Artificial Fish Swarm(MAFSA) Algorithm are efficient task scheduling approaches developed in cloud environment. These algorithms considered the parameters such as makespan, cost and resource utilization while scheduling the tasks and produced better performance. This paper presents a scheduling framework which converts the above said algorithms in to services and deployed in the cloud. Depends on the user’s requirements, the services will be delivered.


The widespread adoption of multi-cloud in enterprises is one of the root causes of cost-effectiveness. Cloud service providers reduce storage costs through advanced data de-duplication, which also provides vulnerabilities for attackers. Traditional approaches to authentication and data security for a single cloud need to be upgraded to be best suitable for cloud-to-cloud data migration security in order to mitigate the impact of dictionary and template attacks on authentication and data integrity, respectively. This paper proposes a scheme of user layer authentication along with lightweight cryptography. The proposed simulates its mathematical model to analyze the behavioral pattern of time-complexity of data security along with user auth protection. The performance pattern validates the model for scalability and reliability against both authentication and data integrity.


Cloud storage is one of the key features of cloud computing, which helps cloud users outsource large numbers of data without upgrading their devices. However, Cloud Service Providers (CSPs) data storage faces problems with data redundancy. The data deduplication technique aims at eliminating redundant information segments and maintains one single instance of the data set, even if any number of users own similar data set. Since blocks of data are spread on many servers, each block of the file has to be downloaded before restoring the file to decrease system output. We suggest a cloud storage server data recovery module to improve file access efficiency and reduce time spent on network bandwidth. Device coding is used in the suggested method to store blocks in distributed cloud storage, and for data integrity, MD5 (Message Digest 5) is used. Running recovery algorithm helps the user to retrieve a file directly from the cloud servers without downloading every block. The scheme proposed improves system time efficiency and the ability to access the stored data quickly. This reduces bandwidth consumption and reduces overhead user processing while downloading the data file.


Sign in / Sign up

Export Citation Format

Share Document