Sie sind auf Seite 1von 17

Sonali Jain

14CSP051
Cloud computing is Internet-based
computing, whereby shared resource,
software, and information are provided to
computers and other devices on demand,
like the electricity grid .

Cloud Computing has been envisioned as the


next generation architecture of IT Enterprise.
ADVANTAGES DISADVANTAGES

Improved performance. Requires a constant


Lower computer costs. Internet connection.
Reduced software costs. Does not work well with
Instant software updates. low-speed connections.
Improved document Features might be
format limited.
compatibility. Can be slow.
Unlimited storage Stored data might not be
capacity.
Increased data reliability. secure.
Universal document Stored data can be lost.
access.
Latest version
availability.
Device independence.
Cloud storage is:
Made up of many distributed resources, but still
acts as one - often referred to as federated storage
clouds
Highly fault tolerant through redundancy and
distribution of data
Highly durable through the creation of versioned
copies
Eventually consistent with regard to data replicas
A representative network architecture for cloud
data storage comprises of three entities,
identified as :
1. Users : who have the data to be stored in the
cloud and rely on cloud for data computation
2. Cloud Service Provider (CSP) : who has
significant resources & expertise in building &
managing distributed cloud servers , owns and
operates cloud computing system
3. Third Party Auditor (TPA) : who has expertise
and capabilities that users may not have
Users store their data in the cloud and no longer
possess the data locally, hence the availability and
correctness data must be guaranteed.
Cloud computing moves the application software and
databases to the large data centers where the data
security is not trustworthy.
Data security of such cloud service includes :
Secure channels
Access controls
Encryption
For the security of data , we must consider the
Confidentiality , Integrity and Availability of data
Security threats faced by cloud data storage can come
from two different sources.

1. CSP can be self-interested, untrusted and possibly


malicious.

2. Secondly , there may also exist an economically


motivated adversary, who has the capability to
compromise a number of cloud data storage servers
in different time intervals and subsequently is able to
modify or delete users 'data while remaining
undetected by CSPs for a certain period.
Weak Adversary:
The adversary is interested in corrupting the users data
files stored on individual servers.
Once a server is compromised, an adversary can pollute
the original data files by modifying or introducing its
own fraudulent data to prevent the original data from
being retrieved by the user.
Strong Adversary:
This is the worst case scenario, in which we assume that
the adversary can compromise all the storage servers so
that he can intentionally modify the data files as long as
they are internally consistent.
This is equivalent to the case where all servers are
colluding together to hide a data loss or corruption
incident.
From the perspective of data security Cloud Computing
inevitably poses new challenging security threats for
number of reasons.

o Firstly, traditional cryptographic primitives for the


purpose of data security protection can not be directly
adopted due to the users loss control of data under
Cloud Computing.

o Secondly, Cloud Computing is not just a third party


data warehouse. The data stored in the cloud may be
frequently updated by the users, including insertion,
deletion, modification, appending, reordering, etc.
To ensure the security and dependability for cloud data
storage under the aforementioned adversary model, this
paper aim to design efficient mechanisms for dynamic
data verification and operation and achieve the
following goals:

1. Storage correctness
2. Fast localization
3. Dynamic data support
4. Dependability
5. Light weight
By utilizing distributed verification protocol
using Sobol Sequence
By utilizing the Homomorphic token with
distributed verification of erasure-coded
data, the scheme achieves :

the integration of storage correctness insurance


and ;
data error localization, i.e., the identification of
misbehaving server.
Cloud computing provides a supercomputing
power. i.e. it extends beyond a single
company or enterprise.
To ensure the correctness of users data in
cloud data storage, we proposed an effective
and flexible distributed scheme with explicit
dynamic data support, including block
update, delete, and append.
We believe that data storage security in Cloud
Computing, an area full of challenges.
Cong Wang Ian Wang , Wenjing Lou, Ensuring
Data Storage Security in Cloud Computing
P.Shyam Kumar ,R.Subramaniam ,D.Thamizh
Selvam, Ensuring Data Storage Security in
Cloud Computing using Sobol Sequence.
D.Kanchana , Dr. S.Dhandapani A novel
method for storage security in cloud
computing

Das könnte Ihnen auch gefallen