Sie sind auf Seite 1von 4

International Journal for Science and Emerging ISSN No.

(Online):2250-3641
Technologies with Latest Trends 5(1): 24-27 (2013) ISSN No. (Print): 2277-8136
Data Location in Cloud Computing
Puneet Kumar* and Harwant Singh Arri**
Lovely Professional University
Jalandhar, Punjab
(Received 28 January 2013 Accepted 5 February 2013)
Abstract-I n these days cloud computing is a most popular and widespread technology of the world. Cloud
computing provides the services which reduce the cost of infrastructure, hardware and storage. Those
services are infrastructure as a service (I aaS), software as a service (SaaS), platform as a service (PaaS)
and data storage as a service (DaaS). Which users are using data storage as a service is facing the
problem of data location. Users are hesitating to share their sensitive data on cloud. Reason of this, is
data location. User is not knows that where is data storing and who is accessing that data. The techniques
of storing data on cloud are data location, multi-location data, in border data etc. Which one is best
technique for storing data on cloud for user among them? I t will help to make trust of user or client to
store the data on cloud.
Keywords-Data location, Data relocation, Data recovery, Data multi-location, Sensitive and Non-
sensitive.

1. INTRODUCTION
Cloud computing is such type of computing
which is accessible in world everywhere and
anytime. It provides pay per use services.
Definition of cloud computing is On demand
service, Broad network access, Resource
pooling, Flexible resource allocation and Pay per
Use services [1]. Cloud computing architecture
basically has different layers. Those layers are
Platform as a Service (PaaS), Infrastructure as a
Service (IaaS), Software as a Service (SaaS),
Data Storage as a service (DaaS). Each layer
provides its own service [11].
1.1 Cloud computing used data storing
techniques:-
When data mobility is at a high level then the
risks and issues increase many folds especially
when data is transferred to another country with
different regulatory framework [2]. Users cannot
control cloud infrastructure managing their data,
which causes threats to the data [3].
Data location: Cloud Computing offers a high
degree of data mobility. Consumers do not
always know the location of their data. In most
cases, this does not matter. For example, emails
and photographs uploaded to Facebook can
reside anywhere in the world and Facebook
members are generally not concerned. However,
when an enterprise has some sensitive data that
is kept on a storage device in the Cloud, they
may want to know the location of it. They may
also wish to specify a preferred location (e.g.
data to be kept in the UK) then requires a
contractual agreement between the Cloud
service provider and the consumer that data
should stay in a particular location or reside on a
given known server [2].
Data Relocation: Another issue is the
movement of data from one location to another.
Data is initially stored at an appropriate location
decide by the Cloud provider. However, it is
often moved from one place to another. Cloud
providers have contracts with each other and
they use each others resources. Consumers do
not always know this and often it does not
matter [2].
Data recovery: An incident such as a server
breakdown may cause damage or loss to users
data. To avoid this, data should be backed up to
be recovered in future. Cloud users can keep a
backup of critical data on a local computer. [3]
Multi location issues: It is rather dangerous, if
the business stores its private data in the third
partys device. In this sense, the businesses
private data are sitting in someone elses
computer and in someone elses facility. Then,
many things can go wrong. Firstly, the Cloud
service provider may go out of business.
Secondly, the Cloud service provider may
decide to hold the data as hostage if there is a
dispute. Thirdly, it is rather important for a
company to understand in which country its
data will be hosted. Thats because the location
of the data directly affects the choice of the law
that will be applied on its private data. [4]

2. RELATED WORK

According to Zaigham Mahmood, 2011 if
Cloud technologies used appropriately, it can
help to reduce costs, reduce management
responsibilities and increase agility and
efficiency of organizations. Advantages are
many but there are also challenges and issues.
These challenges related to data governance,
service management, process monitoring,
infrastructure reliability, information security,
data integrity and business continuity. This
paper focuses on and discusses the data issues
related to its storage location, cost, availability
and security [2].
Pengfei You, 2012 discussed the security issues
related to cloud computing, including data
security, application security and virtualization
technologies security issues. Data security is
required to protect users data from leakage,
damage or loss, while application security is
required to protect applications in cloud from
attack by a hacker. In addition, as the core
technologies in cloud, virtualization
technologies are also confronted with many
security threats. In this paper analyzed some
solutions aimed at these security issues. Some
security requirements of cloud computing to
develop a secure cloud computing system are
also discussed in this paper. With the
development in cloud computing there are more
security issues. To make a secure cloud needs a
deep study on security issues [3]. According to
Minqi Zhou, 2010 with the development and
popularity of Cloud Computing, security and
privacy issues are imposing strong barrier for
users adoption of Cloud systems and Cloud
services. More security strategies should be
deployed in the Cloud environment to achieve
the 5 goals (i.e. availability, confidentiality, data
integrity, control and audit) as well as privacy
acts should be changed to adapt a new
relationship between users and providers in the
Cloud literature [4].
Ali Noman, 2012 proposed the DLAS for cloud
computing environments which facilitates users
to give their data location preference in the
following way: Keep/ do not keep my data in
region (e.g. region can be a country or
continent); later, users will receive provable
assurance of their data location from the CSP
(Cloud Service Provider) with respect to their
data location verification request. Thus it
reduces the risk of any damage to the data even
if it was kept in wrong place since a user
could detect it early [5].
Ziyuan Wang, 2011 analyze the major security
concerns and privacy concerns in the Cloud
Computing. In order to handle such concerns,
introduce and propose four effective methods
dealing with key security and privacy concerns.
These methods can only deal with one or two
aspects of Cloud Computing problems, so in
order to provide a more secure, privacy-
preserving and effective Cloud, some more
efficient methods and mechanism have to be
proposed [6].
Shubhashis Sengupta, 2011 has tried to
categorize the key concerns and discuss the
related technical implications and research
issues, including some advanced security issues
specific to the cloud. This paper discussed some
issues regarding security related regulatory
compliance in the cloud. In this paper also
presented a few high-level steps towards a
security assessment framework. In this paper
they made several observations in current cloud
security landscape. Firstly, the security
standardization activities, Proliferation of open
community based identity management solutions
also makes cloud identity management and
integration difficult. Second, quick provisioning
of the users in cloud and mapping of their roles
between enterprise and cloud has become
somewhat complicated. Third, Data
anonymization and privacy preserving
techniques will increasingly assume greater
importance and more mainstream research is
required in this area. Fourth, migrating generic
in house software code to public cloud require
thorough understanding of potential security
risks. Finally, adherence to the regulatory
compliance by the cloud providers and better
disclosure norms from them is imperative for
commercial success of cloud. On the other hand,
the virtualization related security risks are not
specific to cloud, but risks related to open source
shared application server, DB and middleware
components definitely and a Trusted Computing
Platform to execute isolate client runtimes in
cloud will definitely help. This survey though
short, provides a broad level overview of
25 Kumar and Arri


important current and emerging security
concerns in cloud and delineates main research
challenges. As a subsequent work a more
elaborate survey can be undertaken. Also plan to
flesh out the assessment framework further,
supported by tools - to aid migration of
enterprise applications to cloud [7].
According to Xue jing, 2010 with the
continuous promotion of cloud computing,
security has become one of the core issues.
Cloud computing platform need to provide some
reliable security technology to prevent security
attacks, as well as the destruction of
infrastructure and services. In this paper, a new
security model is proposed, which based on the
characteristics and system architecture of cloud
computing. And the availability of the model
were verified by experiment, that can provide
the basis for the deeper research on security
deployment of cloud computing [8].
Meiko Jensen, 2009 presented a selection of
issues of Cloud Computing security. He
investigated ongoing issues with application of
XML Signature and the Web Services security
frameworks (attacking the Cloud Computing
system itself), discussed the importance and
capabilities of browser security in the Cloud
Computing context (SaaS), raised concerns
about Cloud service integrity and binding issues
(PaaS), and sketched the threat of flooding
attacks on Cloud systems (IaaS). As showed in
paper the threats to Cloud Computing security
are numerous, and each of them requires an in
depth analysis on their potential impact and
relevance to real world Cloud Computing
scenarios. As can be derived from observations,
a first good starting point for improving Cloud
Computing security consists in strengthening the
security capabilities of both Web browsers and
Web Service frameworks, at best integrating the
latter into the first. Thus, ongoing work will
continue to harden the foundations of Cloud
Computing security which is laid by the
underlying tools, specifications, and protocols
employed in the Cloud Computing scenario [9].
Balachandra Reddy Kandukuri, 2009 the
present Service Level Agreement (SLA) discuss
only about the services provided and the waivers
given if the services not met the agreement, but
this waivers dont really help the customers
fulfilling their losses. The waivers have to be
made according to the type of business done by
the customers. Besides the waivers the SLA has
to discuss about many other issues like security
policies, methods and their implementations. It
also has to discuss what legal actions are taken if
the services are misused by the customer [10].

3. PROBLEM FORMULATION

Cloud computing is an advance technology for
computing. Million people are using it and
storing their data on cloud. But there is an issue
with storing the data on cloud that is while
storing data on cloud user is feeling insecure.
User doesnt know on which location or where
data is storing and who is accessing that data.
Techniques for storing the data used are store
data at multi-locations, store data in border, store
the data in limited kilometers, store data
geographically and store the data according to
distances. Now, here issue is that which one is
best technique for user which helps to make
users trust on cloud. Which way should be need
to follow to keep the data on server. And which
one is best from in concerns.

4. PROPOSED WORK

So many people are accessing cloud server in
these days. Data location of stored data on cloud
is a very big issue from the point view of
clients trust and security of data. About the data
location of clouds stored data it can be
prioritized according to users wish or
requirement. Data will be defined by user which
data of user is sensitive and non-sensitive.
Provide an interface to user during the data
storage which contains the checks of data
sensitivity level and store the data according to
users data sensitivity wish.

5. CONCLUSION AND FUTURE
WORK

This paper provides the information of data
location techniques for storing data and also
giving an idea to solve the issue of data location.
Future research can be done by using the
prioritizing data with the issue of clients
budget.

Acknowledgement

In all humility and with much fervor, I owe my
deep and sincere gratitude to my revered guide
and mentor Assistance Prof. Sami Anand of
CSE, LPU, Jalandhar India for his enlightened
Kumar and Arri 26


guidance, continuous encouragement, estimated
supervision and paternal affection throughout
the period of this research. Key improvements in
the proposed research work would not be
possible without the valuable suggestion and
feedback of my guide.

References

[1]. Microsoft, 2010 Forecast: Improved
economy in the cloud (An introduction to cloud
computing in government).
[2]. Zaigham Mahmood, 2011 Data Location
and Security Issues in Cloud Computing.
[3]. Pengfei You, 2012 Security Issues and
Solutions in Cloud Computing.
[4]. Minqi Zhou, 2010 Security and Privacy in
Cloud Computing: A Survey.
[5]. Ali Noman, 2012 DLAS: Data Location
Assurance Service for Cloud Computing
Environments.
[6]. Ziyuan Wang, 2011 Security and privacy
issues within the Cloud Computing.
[7]. Shubhashis Sengupta, 2011 Cloud
Computing Security - Trends and Research
Directions.
[8]. Xue Jing, 2010 A Brief Survey on the
Security Model of Cloud Computing.
[9]. Meiko Jensen, 2009 On Technical Security
Issues in Cloud Computing.
[10]. Balachandra Reddy Kandukuri, 2009
Cloud Security Issues.
[11]. SNIA, 2010 Implementing, Serving and
Using Cloud Storage. Cloud storage initiative.
27 Kumar and Arri

Das könnte Ihnen auch gefallen