You are on page 1of 6


Lecturer/IT, Jayam college of Engineering & Technology,Dharmapuri.

ABSTRACT features, Opposing to its predecessors. By

Cloud Computing has been utilizing the homomorphism token with

envisioned as the next generation distributed verification of ensure-coded

architecture of IT Enterprise. In contrast data, our scheme achieves the integration

to traditional solutions, where the IT of storage correctness insurance and data

services are under proper physical, logical error localization, i.e., the identification of

and personnel controls, Cloud Computing misbehaving server(s).

moves the application software and
databases to the large data centers, where
Cloud computing is a term used to
the management of the data and services
describe both a platform and type of
may not be fully trustworthy. This unique
application. A cloud computing platform
attribute, however, poses many new
dynamically provisions, configures,
security challenges which have not been
reconfigures, and deprovisions servers as
well understood. In this article, we focus
needed. Servers in the cloud can be
on cloud data storage security, which has
physical machines or virtual machines.
always been an important aspect of
Advanced clouds typically include other
quality of service. To ensure the
computing resources such as storage area
correctness of users’ data in the cloud, we
networks (SANs), network equipment,
propose an effective and flexible
firewall and other security devices. Cloud
distributed scheme with two salient


Cloud require their data to be hosted buy or lease computing describes a new supplement. virtualized computer resources.A cloud is a pool of direct hardware management. ordering. DATA STORAGE Cloud computing is not a third party data ware house. rather than being hosted on services. Cloud Storage is a are extended to be accessible through the model of networked computer data Internet. the resource may span across have to care about the complexities of multiple servers. virtualize typically involves over-the-Internet the resources according to the provision of dynamically scalable and requirements of the customer and expose often virtualized resources. The data stored in cloud may frequently updated by the user by insertion. convenience to users since they don’t Physically. These cloud applications use storage where data is stored on multiple large data centers and powerful servers virtual servers. Hosting companies connection and a standard browser can operate large data centers.computing also describes applications that appending. and people who access a cloud application. which the into the cloud offers great customers can themselves manage. 2 . in the background. Anyone with a suitable Internet dedicated servers.Moving data them as virtual servers. and delivery model for IT their storage needs. The data center services based on the Internet. modification. generally hosted by third that host Web applications and Web parties. deletion. storage capacity from them and use it for consumption. and it operators.

Allow workloads to be deployed and storage systems are small operations. user-facing applications store all forms of digital data. A cloud can: Some have a very specific focus..g. A client (e. Host a variety of different workloads. a computer user 4. which then records the support grid computing by quickly information. When the client wishes to providing physical and virtual. self-recovering. and monitoring. 1. systems are called data centers. At its highly scalable programming models that most basic level. Support redundant. scaled-out quickly through the rapid while others are so large that the physical provisioning of virtual machines or equipment can fill up an entire warehouse. Some cloud 2. such as storing Web e-mail messages or including batch-style back-end jobs and digital pictures. reimaging. a cloud storage system allow workloads to recover from many needs just one data server connected to the unavoidable hardware/software failures Internet. physical machines The facilities that house cloud storage 3. A cloud is 3 . change requests. more than a collection of computer resources because a Cloud provides a mechanism to manage those resources. deprovisioning. Management includes provisioning. Others are available to interactive. workload rebalancing. Monitor resource use in real time to subscribing to a cloud storage service) enable rebalancing of allocations when sends copies of files over the Internet to needed Cloud computing environments the data server.

Without redundancy. Because which only provide binary results about computers occasionally require the storage state across the distributed maintenance or repair. 1. it's important to servers. Cloud storage systems generally . We rely on modification attack. the new scheme could access their information at any supports secure and efficient dynamic given time. This construction based interface. operations on data blocks. distribution preparation to provide 4 . PROPOSED SYSTEM 3. including: update. The server then either drastically reduces the communication sends the files back to the client or allows and storage overhead as compared to the the client to access and manipulate the traditional replication-based file files on the server itself. of data error. delete and append. malicious data users’ data in the cloud. Compared to many of its predecessors. rely on hundreds of data servers. dependability. and even server erasure correcting code in the file colluding attacks. he or she redundancies and guarantee the data accesses the data server through a Web. Unlike most prior works for ensuring system couldn't ensure clients that they remote data integrity. This is called redundancy.retrieve the information. a cloud storage 2. Extensive security and performance It is an effective and flexible analysis shows that the proposed scheme distributed scheme with explicit dynamic is highly efficient and resilient against data support to ensure the correctness of Byzantine failure. the challenge-response protocol in store the same information on multiple our work further provides the localization machines. distribution techniques.

but also the The two biggest concerns about amount of storage each company offers to cloud storage are reliability and security. to crack encrypted information. You're probably familiar with several most hackers don't have access to providers of cloud storage services. and their storage: numbers seem to increase every day. the amount of computer though you might not think of them in that 5 . To secure data. a user needs the System. allowing doctors to access health encryption key. To decode the Records (EHR) for the Military Health encrypted files.EXAMPLES OF CLOUD STORAGE way. Not • CONCERNS ABOUT CLOUD only are there a lot of companies STORAGE competing to provide storage. Holloway/Getty Images use a complex algorithm to These servers store Electronic Health encode information. which means they David S. Here are a few well-known There are hundreds of cloud companies that offer some form of cloud storage providers on the Web. While it's possible records of patients instantly. Clients aren't likely to entrust their data to another company without a guarantee that they'll be able to access their information whenever they want and no one else will be able to get at it. clients seems to grow regularly. including: • Encryption. most systems use a combination of techniques.

it doesn't have much of a to access information stored on the chance -. many people worry that data saved on a remote storage system is vulnerable. There's always the possibility that a hacker will find an electronic back door and access data. The other big concern. have multiple levels of authorization. which die by their reputations. Cloud storage companies live and • Authentication processes. Hackers could also attempt to steal the physical machines on which data are stored. • Authorization practices the client If a company can't meet these basic client lists the people who are authorized expectations.there are too many other options cloud system. 6 . is just as important as security. It's in each require to create a user name and company's best interests to provide the password. Many corporations available on the market. An unstable cloud storage system is a liability. reliability. processing power they would need • CONCLUSION to decrypt information. Even with these protective measures in place. most secure and reliable service possible.