SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 81
SECURITY IN MULTI-CLOUD DATA STORAGE WITH SIC
ARCHITECTURE
Kalyani.M.Borse1
, Ankita.G.Deshpande2
, Ashlesha.A.Deshpande3
, Ms.Juily.S.Hardas4
1, 2, 3, 4
Student, Computer Engineering Department, GES R.H.S.COE, Maharashtra, India
Abstract
Cloud computing is becoming an important thing to deal with, in many organizations around the world. It provides many benefits like
1. cost, 2.Reliability and 3.Ease in retrieval of data. Security in cloud computing is gaining more and more importance as
organizations often store sensitive data and important data on the cloud. Security of data in cloud is an issue which should be focused
carefully. Customers do not want to lose their sensitive data due to malicious insiders and hackers in the cloud. In addition, the loss
of service availability has caused many problems for a large number of recently. Data intrusion technique create many problems for
the users of cloud computing. The other issues such as data theft, data lost should be overcome to provide better services to the
customers. It is observed that the research into the use of intercloud providers to maintain security has received less attention from the
research community than has the use of single clouds. Multi-cloud environment has ability to reduce the security risks as well as it
can ensure the security and reliability. The system aim to provide a framework to deploy a secure cloud database that will guarantee
to avoid security risks facing the cloud computing community This paper suggests new architecture for cloud environment which will
help in reducing the security threats. The efficient and secure use of cloud computing will provide many benefit to the organizations in
terms of money and ease in access to the data.
Keywords: Cloud computing, single cloud, multi-clouds, cloud Storage, data integrity, data intrusion, service
availability, Performance, cost-reduction.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Cloud Computing is a technology that uses the internet and
remotely located servers to store the data of the users and for
running the application programs. Cloud computing allows
business organizations to use applications without access their
personal files at any computer with internet access and
installation Cloud computing can be defined as a pool of
virtualized computing resources that allows users to gain
access to applications and data in a web-based environment on
demand.[10] . As use of cloud computing is growing rapidly
in every for m of organization, to provide security to the data
in cloud computing is the main issue to deal with.[1] Some
security issues like data loss and malicious insiders are reasons
to fear for customers using cloud computing services. In a
cloud computing environment, individuals and businesses
work with applications and data stored and/or maintained on
shared machines in a internet environment rather than
physically located in the home of a user or as corporate [1]
environment. Vulnerabilities in a particular cloud service or
cloud computing environment can potentially be exploited by
criminals and actors with malicious intent [4].
Traditional approach of using single cloud server, may also
lead in slowing down the retrieval of data. Dealing with single
cloud providers is becoming less favorable with customers due
to commonly occurring problems such as service availability
failure and the possibility that there are malicious insiders or
hackers in the single cloud. In recent years, there has been a
move towards multi-clouds, intercloud or cloud-of-clouds. [1]
This paper is focusing on using the multi cloud architecture to
deal with the security issues raised while using the single
cloud. In cloud computing organizations private data is given
to the third party, they want to avoid an untrusted cloud
provider.
2.”SINGLE” CLOUD SERVICE PROVIDERS
Privacy preservation and data integrity are the two main issues
faced by ”single” Cloud service providers. In his/her own
organization one can ensure strong security policies. But in
case of cloud computing one has to trust completely on his
service provider. [3] Also there is an overhead of managing
huge amount of data on a single server. It is easier for
malicious outsider to penetrate through security if the data is
not actually stored by organization itself; instead they are
trusting on third party for taking care of their data.
Disadvantage:
• Need High cost for cloud maintains process
• Data losses accrued.
• Can fail in ensuring the complete security from
possible threats
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 82
3. OBJECTIVES OF MULTI-COULD
ARCHITECTURE
3.1 Security
In multi cloud data Storage, Data and Information will be
shared with external users, therefore cloud computing users
want to avoid important information from attackers or
malicious insider is of critical importance. In Iaas, users are
responsible for protecting operating system and cloud
providers must provide protection for users data. Resources in
the cloud are accessed through the Internet, frequently even if
the cloud provider concentrates on security in the cloud
infrastructure; the data is still transmitted to the users through
networks which may be insecure.
1. Data integrity 2. Data intrusion 3. Service availability these
are the three Security factors.
3.1.1 Data Integrity
The data stored in the cloud may lost from damage while
transferring from one place to another. Examples: Of the
threats of attacks from both inside and outside the cloud
provider.
3.1.2 Data Intrusion
Another security risk that may occur with cloud provider, such
as the any particular cloud service is hacked password. If
someone gains access to that cloud service password, they will
be able to access all of the accounts instance and resources.
Thus the stolen password permits the hacker to erase and to
modify all the data inside any virtual machine instance for the
stolen user account, or even disable its services. There is a
possibility for the users email (Amazon user name) to be
hacked for a discussion of the potential risks of email.
3.1.3 Service Availability
There is possibility that the service may be unavailable from
time to time. If any users files break the cloud storage policy,
the users web service may terminate for any reason at any
time. . Therefore Cloud provider maintain the backup and data
authentication which assures that returned data is same as
stored data is extremely important.
3.2 Performance
In single architecture, there is one main cloud server which
will process and response the request from the users. If more
than expected no of clients will requested for data/service to
the single server then the performance will slow down
Each user will have to wait more for accessing his/her data. In
case of overload, the server may hang sometime. In multi
cloud we have more than one cloud server to process the users
request So this divides the responsibility of handling requests
among several servers. So ultimately we can provide better
solution to our providers.
3.3 Cost-Reduction
Secured storage and data availability can be provided to the
customers in the market of economical distribution of
information in all the available service providers. In model
customer decide his data among their several SPs available in
the market. Also we provide decision for the customer, to
which SPs he must choose to access data and quality of
service offered by service provider.
4. ARCHITECTURE OF MULTI-CLOUD SYSTEM
Fig 1: SIC Architecture
SIC - Secure Inter-Cloud Architecture. The proposed
architecture is the 3 tier architecture. In our architecture, there
is one CSP i.e. cloud service provider. This is the main central
server which keeps the data about clients. Client in the
diagram represents any cloud service user. Clients/users does
not have any idea about where exactly the data/files has been
stored. Data is stored in cloud server. The servers may reside
in different physical locations. The CSP decides the servers to
store the data depending upon available spaces. We can use
load balancing algorithms for making the decision, on which
server we should actually store the data. The CSP will also
keep track about the files stored on each server. The cloud
servers will only store the data, but they will not have any
records about the user accounts, their passwords or encryption
and decryption keys.
CSP is central server, it must be well configured. Care should
be taken for protection of CSP. Cloud service provider acts as
an effective bridge between the user and cloud server. Cloud
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 83
users, who have data to be stored in the cloud and rely on the
cloud for data computation, consist of both individual
consumers and organizations.
5. USE OF DATA ENCRYPTION TECHNIQUES
For ensuring more security in cloud environment, we can use
data encryption. If the data is distributed in multi cloud
environment as well as it is encrypted, we can protect our data
in even better way. The data which is uploaded by the user,
can be encrypted first and then we can store it on the cloud
server. This will be helpful in providing two-way security to
the customer’s data. To store the data in multicloud
environment The symmetric key or secret key algorithms are
the best choice for such applications. Symmetric key
algorithm is also known as the secret key encryption. It is a
cryptographic technique in which both the sender and receiver
of data use the same key for the purpose of encryption and
decryption of data. Symmetric key algorithms are suitable for
storing data in cloud multi cloud, as user should be able to
access his data easily.
Secret-key encryption algorithms use a same secret key to
encrypt and decrypt data. You must protect the key from
access by unauthorized agents, because anyone that has the
key can use it to decrypt your data or encrypt their own data,
claiming it originated from you. Secret-key encryption is also
referred to as symmetric encryption because the same key is
used for encryption and decryption. Secret-key encryption
algorithms are very fast (compared with public key
algorithms) and are well suited for performing cryptographic
transformations on large streams of data.[6]
Fig 2: Symmetric Encryption
6. FUTURE WORKS
In future, we aim to provide more secure cloud environment to
avoid the security risks. Cloud computing should not end with
only single cloud. The new concepts like multi-cloud, sky
computing should be adopted by the cloud service providers
for ensuring better security to customer’s data. Here the key
factor to focus is to increase the performance and scalability of
the cloud servers in multi-cloud environment. One should also
try to increase the level of security by using new and better
data encryption techniques. Also, the cloud service provider
(CSP) in the above architecture should be more secure, as it
stores the sensitive data like user accounts and encryption
keys. Our aim is that Clients would be able to access their
applications and data from anywhere at any time. They could
access the cloud computing system using any computer linked
to the Internet. Data wouldn’t be confined to a hard drive on
one user’s computer or even a corporation’s internal network.
One more challenge is to successfully implement the load
balancing algorithms for distributing the data among the cloud
servers. Providing the extra layers of security may result into
increase in the time to provide data access to the user. We
should also take care that user should able to gain easy and
timely access to his data, without any hurdle. Both the terms
security and ease in access to the data should go hands in
hands.
CONCLUSIONS
Even if the use of cloud computing have increased rapidly
during last decade, the security in the cloud environment is the
main issue to be focused on .it is the responsibility of a good
cloud service provider to ensure secure storage of data on the
cloud to his customer. In this paper, we proposed a secured
multi-cloud architecture in cloud computing, which seeks to
provide each customer secure environment to store his data
and he should be able to access his data without any failure or
delay. We are trying to provide two way security to the data,
by encrypting the data and by storing data on the multiple
servers. Also, the responsibility of storing the sensitive data
about the user accounts is taken by different central server
(CSP), which will help in securing the data from attacks. We
support the migration to multi-clouds due to its ability to
decrease security risks that affect the cloud computing user.
REFERENCES
[1]. Thom, ”Cloud computing security: From Single to
Multi-clouds”, Department of Computer Science and
Computer Engineering, La Trobe University, Bundoora 3086,
Australia. Mohammed A. AlZain, Eric Pardede, Ben Soh,
James A.
[2]. ” Data integrity proofs in cloud storage”, Infosys
Technologies Ltd Hyderabad, India. Sravan Kumar R,
Ashutosh Saxena,
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 84
[3]. ”Using Multi Shares for Ensuring Privacy in Database-as-
a-Service”, 44th Hawaii Intl. Conf. on System Sciences
(HICSS),2011, pp. 1-9. M.A. AlZain and E. Pardede
[4]. ”Towards Of Secured Cost Effective Multi Cloud Storage
In Cloud Computing” , Communication Systems, Bannari
Amman Institute of Technology. K.RAJASEKAR1 and C.
KAMALANATHAN2
[5]. October3,2006. Amazon, Amazon Web Services. Web
services licensing agreement,
[6]. Tony Northrup, Microsoft .NET Framework Application
Development Fondation 2nd edition, Training Kit.
[7]. ”DepSky: dependable and secure storage in a cloud-of-
clouds”, EuroSys’11:Proc. 6thConf. On Computer systems,
2011, pp. 31-46. ] A. Bessani, M. Correia, B. Quaresma, F.
Andr and P. Sousa,
[8]. ”Toward a cloud computing research agenda”, SIGACT
News,40, 2009, pp. 68-80. K. Birman, G. Chockler and R.
van Renesse
[9]. Pratap Reddy Institute of Technology Hyderabad, India
”Security for Effective Data Storage in Multi Clouds”.
T.NEETHA Kommuri, CH.SUSHMA,Kommuri
[10]. Kim-Kwang Raymond Choo ”Cloud computing:
Challenges and future directions”.
BIOGRAPHIES
Ms. Kalyani Manik Borse
Ms. Ankita Govind .Deshpande
Ms. Ashlesha Amrut .Deshpande
Ms. Juily Shripad Hardas

More Related Content

What's hot (17)

PDF
Security and privacy approach of cloud computing
Jahangeer Qadiree
 
PDF
A survey on cloud security issues and techniques
ijcsa
 
PDF
Improving Cloud Security Using Data Mining
IOSR Journals
 
PDF
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
PDF
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
PDF
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
PDF
A Study of Data Storage Security Issues in Cloud Computing
vivatechijri
 
PDF
Kp3419221926
IJERA Editor
 
PDF
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
 
PDF
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
pharmaindexing
 
PDF
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
 
PDF
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Hossam Al-Ansary
 
PDF
Paper id 212014106
IJRAT
 
PPT
Unit 3 -Data storage and cloud computing
MonishaNehkal
 
PPTX
A study on security issues in cloud based e learning
Manimaran A
 
PDF
Enhanced security framework to ensure data security
eSAT Publishing House
 
PDF
Measurable, safe and secure data management for sensitive users in cloud comp...
eSAT Publishing House
 
Security and privacy approach of cloud computing
Jahangeer Qadiree
 
A survey on cloud security issues and techniques
ijcsa
 
Improving Cloud Security Using Data Mining
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
A Study of Data Storage Security Issues in Cloud Computing
vivatechijri
 
Kp3419221926
IJERA Editor
 
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
pharmaindexing
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Hossam Al-Ansary
 
Paper id 212014106
IJRAT
 
Unit 3 -Data storage and cloud computing
MonishaNehkal
 
A study on security issues in cloud based e learning
Manimaran A
 
Enhanced security framework to ensure data security
eSAT Publishing House
 
Measurable, safe and secure data management for sensitive users in cloud comp...
eSAT Publishing House
 

Viewers also liked (20)

PDF
Design and development of mechanical power amplifier
eSAT Publishing House
 
PDF
Implementation of embedded bluetooth data broadcast system
eSAT Publishing House
 
PDF
A brawny multicolor lane detection method to indian scenarios
eSAT Publishing House
 
PDF
Next generation engine immobiliser
eSAT Publishing House
 
PDF
An enhanced adaptive scoring job scheduling algorithm with replication strate...
eSAT Publishing House
 
PDF
Smart digital and analogue ambience control and
eSAT Publishing House
 
PDF
Test case prioritization using hyperlink rankinga
eSAT Publishing House
 
PDF
On preemptive resume versus non preemtive disciplines relevant to monopoly se...
eSAT Publishing House
 
PDF
Architecture and implementation issues of multi core processors and caching –...
eSAT Publishing House
 
PDF
Seasonal variation in greywater quality for a real life system
eSAT Publishing House
 
PDF
Achieving operational excellence by implementing an erp (enterprise resource ...
eSAT Publishing House
 
PDF
Comparison of glass fiber reinforced concrete &
eSAT Publishing House
 
PDF
Web application based file transfer in customized cloud
eSAT Publishing House
 
PDF
Effectiveness of multilayer coated tool in turning of aisi 430 f steel
eSAT Publishing House
 
PDF
Static stiffness analysis of high frequency milling spindle
eSAT Publishing House
 
PDF
Tools description for product development process management in food industries
eSAT Publishing House
 
PDF
Scalable and efficient cluster based framework for
eSAT Publishing House
 
PDF
Green cast demonstration of innovative lightweight construction components ma...
eSAT Publishing House
 
PDF
Pounding problems in urban areas
eSAT Publishing House
 
PDF
Index and engineering properties of spent wash blended soils a comparative s...
eSAT Publishing House
 
Design and development of mechanical power amplifier
eSAT Publishing House
 
Implementation of embedded bluetooth data broadcast system
eSAT Publishing House
 
A brawny multicolor lane detection method to indian scenarios
eSAT Publishing House
 
Next generation engine immobiliser
eSAT Publishing House
 
An enhanced adaptive scoring job scheduling algorithm with replication strate...
eSAT Publishing House
 
Smart digital and analogue ambience control and
eSAT Publishing House
 
Test case prioritization using hyperlink rankinga
eSAT Publishing House
 
On preemptive resume versus non preemtive disciplines relevant to monopoly se...
eSAT Publishing House
 
Architecture and implementation issues of multi core processors and caching –...
eSAT Publishing House
 
Seasonal variation in greywater quality for a real life system
eSAT Publishing House
 
Achieving operational excellence by implementing an erp (enterprise resource ...
eSAT Publishing House
 
Comparison of glass fiber reinforced concrete &
eSAT Publishing House
 
Web application based file transfer in customized cloud
eSAT Publishing House
 
Effectiveness of multilayer coated tool in turning of aisi 430 f steel
eSAT Publishing House
 
Static stiffness analysis of high frequency milling spindle
eSAT Publishing House
 
Tools description for product development process management in food industries
eSAT Publishing House
 
Scalable and efficient cluster based framework for
eSAT Publishing House
 
Green cast demonstration of innovative lightweight construction components ma...
eSAT Publishing House
 
Pounding problems in urban areas
eSAT Publishing House
 
Index and engineering properties of spent wash blended soils a comparative s...
eSAT Publishing House
 
Ad

Similar to Security in multi cloud data storage with sic (20)

PDF
Cloud computing and its security aspects
eSAT Publishing House
 
PDF
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
PDF
Issues of cloud security and its implications
eSAT Publishing House
 
PDF
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
PDF
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
 
PDF
Privacy preserving external auditing for data storage security in cloud
eSAT Publishing House
 
PDF
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
DOCX
Fog doc
priyanka reddy
 
DOCX
fog computing provide security to the data in cloud
priyanka reddy
 
PDF
Enforcing multi user access policies in cloud computing
IAEME Publication
 
DOCX
Fog computing document
sravya raju
 
PDF
Crypto multi tenant an environment of secure computing using cloud sql
ijdpsjournal
 
PDF
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
PDF
H017155360
IOSR Journals
 
PDF
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
PDF
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
IJNSA Journal
 
PDF
Solutions of cloud computing security issues
Jahangeer Qadiree
 
PDF
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
 
PDF
Survey on securing outsourced storages in cloud
eSAT Publishing House
 
PDF
Survey on securing outsourced storages in cloud
eSAT Journals
 
Cloud computing and its security aspects
eSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
eSAT Journals
 
Issues of cloud security and its implications
eSAT Publishing House
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
 
Dynamic Resource Allocation and Data Security for Cloud
AM Publications
 
Privacy preserving external auditing for data storage security in cloud
eSAT Publishing House
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
Fog doc
priyanka reddy
 
fog computing provide security to the data in cloud
priyanka reddy
 
Enforcing multi user access policies in cloud computing
IAEME Publication
 
Fog computing document
sravya raju
 
Crypto multi tenant an environment of secure computing using cloud sql
ijdpsjournal
 
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
H017155360
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
IJNSA Journal
 
Solutions of cloud computing security issues
Jahangeer Qadiree
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
 
Survey on securing outsourced storages in cloud
eSAT Publishing House
 
Survey on securing outsourced storages in cloud
eSAT Journals
 
Ad

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
PDF
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
PDF
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
PDF
Risk analysis and environmental hazard management
eSAT Publishing House
 
PDF
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
PDF
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
PDF
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

Recently uploaded (20)

PDF
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
PDF
Zilliz Cloud Demo for performance and scale
Zilliz
 
PPTX
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
PDF
Design Thinking basics for Engineers.pdf
CMR University
 
PDF
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PDF
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
PPT
PPT2_Metal formingMECHANICALENGINEEIRNG .ppt
Praveen Kumar
 
PPTX
Element 7. CHEMICAL AND BIOLOGICAL AGENT.pptx
merrandomohandas
 
PDF
GTU Civil Engineering All Semester Syllabus.pdf
Vimal Bhojani
 
PPTX
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
PPTX
Day2 B2 Best.pptx
helenjenefa1
 
PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
PPTX
Snet+Pro+Service+Software_SNET+Pro+2+Instructions.pptx
jenilsatikuvar1
 
PDF
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
PPTX
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
PDF
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
PDF
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
Zilliz Cloud Demo for performance and scale
Zilliz
 
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
Design Thinking basics for Engineers.pdf
CMR University
 
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
PPT2_Metal formingMECHANICALENGINEEIRNG .ppt
Praveen Kumar
 
Element 7. CHEMICAL AND BIOLOGICAL AGENT.pptx
merrandomohandas
 
GTU Civil Engineering All Semester Syllabus.pdf
Vimal Bhojani
 
The Role of Information Technology in Environmental Protectio....pptx
nallamillisriram
 
Day2 B2 Best.pptx
helenjenefa1
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
Snet+Pro+Service+Software_SNET+Pro+2+Instructions.pptx
jenilsatikuvar1
 
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 

Security in multi cloud data storage with sic

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 81 SECURITY IN MULTI-CLOUD DATA STORAGE WITH SIC ARCHITECTURE Kalyani.M.Borse1 , Ankita.G.Deshpande2 , Ashlesha.A.Deshpande3 , Ms.Juily.S.Hardas4 1, 2, 3, 4 Student, Computer Engineering Department, GES R.H.S.COE, Maharashtra, India Abstract Cloud computing is becoming an important thing to deal with, in many organizations around the world. It provides many benefits like 1. cost, 2.Reliability and 3.Ease in retrieval of data. Security in cloud computing is gaining more and more importance as organizations often store sensitive data and important data on the cloud. Security of data in cloud is an issue which should be focused carefully. Customers do not want to lose their sensitive data due to malicious insiders and hackers in the cloud. In addition, the loss of service availability has caused many problems for a large number of recently. Data intrusion technique create many problems for the users of cloud computing. The other issues such as data theft, data lost should be overcome to provide better services to the customers. It is observed that the research into the use of intercloud providers to maintain security has received less attention from the research community than has the use of single clouds. Multi-cloud environment has ability to reduce the security risks as well as it can ensure the security and reliability. The system aim to provide a framework to deploy a secure cloud database that will guarantee to avoid security risks facing the cloud computing community This paper suggests new architecture for cloud environment which will help in reducing the security threats. The efficient and secure use of cloud computing will provide many benefit to the organizations in terms of money and ease in access to the data. Keywords: Cloud computing, single cloud, multi-clouds, cloud Storage, data integrity, data intrusion, service availability, Performance, cost-reduction. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Cloud Computing is a technology that uses the internet and remotely located servers to store the data of the users and for running the application programs. Cloud computing allows business organizations to use applications without access their personal files at any computer with internet access and installation Cloud computing can be defined as a pool of virtualized computing resources that allows users to gain access to applications and data in a web-based environment on demand.[10] . As use of cloud computing is growing rapidly in every for m of organization, to provide security to the data in cloud computing is the main issue to deal with.[1] Some security issues like data loss and malicious insiders are reasons to fear for customers using cloud computing services. In a cloud computing environment, individuals and businesses work with applications and data stored and/or maintained on shared machines in a internet environment rather than physically located in the home of a user or as corporate [1] environment. Vulnerabilities in a particular cloud service or cloud computing environment can potentially be exploited by criminals and actors with malicious intent [4]. Traditional approach of using single cloud server, may also lead in slowing down the retrieval of data. Dealing with single cloud providers is becoming less favorable with customers due to commonly occurring problems such as service availability failure and the possibility that there are malicious insiders or hackers in the single cloud. In recent years, there has been a move towards multi-clouds, intercloud or cloud-of-clouds. [1] This paper is focusing on using the multi cloud architecture to deal with the security issues raised while using the single cloud. In cloud computing organizations private data is given to the third party, they want to avoid an untrusted cloud provider. 2.”SINGLE” CLOUD SERVICE PROVIDERS Privacy preservation and data integrity are the two main issues faced by ”single” Cloud service providers. In his/her own organization one can ensure strong security policies. But in case of cloud computing one has to trust completely on his service provider. [3] Also there is an overhead of managing huge amount of data on a single server. It is easier for malicious outsider to penetrate through security if the data is not actually stored by organization itself; instead they are trusting on third party for taking care of their data. Disadvantage: • Need High cost for cloud maintains process • Data losses accrued. • Can fail in ensuring the complete security from possible threats
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 82 3. OBJECTIVES OF MULTI-COULD ARCHITECTURE 3.1 Security In multi cloud data Storage, Data and Information will be shared with external users, therefore cloud computing users want to avoid important information from attackers or malicious insider is of critical importance. In Iaas, users are responsible for protecting operating system and cloud providers must provide protection for users data. Resources in the cloud are accessed through the Internet, frequently even if the cloud provider concentrates on security in the cloud infrastructure; the data is still transmitted to the users through networks which may be insecure. 1. Data integrity 2. Data intrusion 3. Service availability these are the three Security factors. 3.1.1 Data Integrity The data stored in the cloud may lost from damage while transferring from one place to another. Examples: Of the threats of attacks from both inside and outside the cloud provider. 3.1.2 Data Intrusion Another security risk that may occur with cloud provider, such as the any particular cloud service is hacked password. If someone gains access to that cloud service password, they will be able to access all of the accounts instance and resources. Thus the stolen password permits the hacker to erase and to modify all the data inside any virtual machine instance for the stolen user account, or even disable its services. There is a possibility for the users email (Amazon user name) to be hacked for a discussion of the potential risks of email. 3.1.3 Service Availability There is possibility that the service may be unavailable from time to time. If any users files break the cloud storage policy, the users web service may terminate for any reason at any time. . Therefore Cloud provider maintain the backup and data authentication which assures that returned data is same as stored data is extremely important. 3.2 Performance In single architecture, there is one main cloud server which will process and response the request from the users. If more than expected no of clients will requested for data/service to the single server then the performance will slow down Each user will have to wait more for accessing his/her data. In case of overload, the server may hang sometime. In multi cloud we have more than one cloud server to process the users request So this divides the responsibility of handling requests among several servers. So ultimately we can provide better solution to our providers. 3.3 Cost-Reduction Secured storage and data availability can be provided to the customers in the market of economical distribution of information in all the available service providers. In model customer decide his data among their several SPs available in the market. Also we provide decision for the customer, to which SPs he must choose to access data and quality of service offered by service provider. 4. ARCHITECTURE OF MULTI-CLOUD SYSTEM Fig 1: SIC Architecture SIC - Secure Inter-Cloud Architecture. The proposed architecture is the 3 tier architecture. In our architecture, there is one CSP i.e. cloud service provider. This is the main central server which keeps the data about clients. Client in the diagram represents any cloud service user. Clients/users does not have any idea about where exactly the data/files has been stored. Data is stored in cloud server. The servers may reside in different physical locations. The CSP decides the servers to store the data depending upon available spaces. We can use load balancing algorithms for making the decision, on which server we should actually store the data. The CSP will also keep track about the files stored on each server. The cloud servers will only store the data, but they will not have any records about the user accounts, their passwords or encryption and decryption keys. CSP is central server, it must be well configured. Care should be taken for protection of CSP. Cloud service provider acts as an effective bridge between the user and cloud server. Cloud
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 83 users, who have data to be stored in the cloud and rely on the cloud for data computation, consist of both individual consumers and organizations. 5. USE OF DATA ENCRYPTION TECHNIQUES For ensuring more security in cloud environment, we can use data encryption. If the data is distributed in multi cloud environment as well as it is encrypted, we can protect our data in even better way. The data which is uploaded by the user, can be encrypted first and then we can store it on the cloud server. This will be helpful in providing two-way security to the customer’s data. To store the data in multicloud environment The symmetric key or secret key algorithms are the best choice for such applications. Symmetric key algorithm is also known as the secret key encryption. It is a cryptographic technique in which both the sender and receiver of data use the same key for the purpose of encryption and decryption of data. Symmetric key algorithms are suitable for storing data in cloud multi cloud, as user should be able to access his data easily. Secret-key encryption algorithms use a same secret key to encrypt and decrypt data. You must protect the key from access by unauthorized agents, because anyone that has the key can use it to decrypt your data or encrypt their own data, claiming it originated from you. Secret-key encryption is also referred to as symmetric encryption because the same key is used for encryption and decryption. Secret-key encryption algorithms are very fast (compared with public key algorithms) and are well suited for performing cryptographic transformations on large streams of data.[6] Fig 2: Symmetric Encryption 6. FUTURE WORKS In future, we aim to provide more secure cloud environment to avoid the security risks. Cloud computing should not end with only single cloud. The new concepts like multi-cloud, sky computing should be adopted by the cloud service providers for ensuring better security to customer’s data. Here the key factor to focus is to increase the performance and scalability of the cloud servers in multi-cloud environment. One should also try to increase the level of security by using new and better data encryption techniques. Also, the cloud service provider (CSP) in the above architecture should be more secure, as it stores the sensitive data like user accounts and encryption keys. Our aim is that Clients would be able to access their applications and data from anywhere at any time. They could access the cloud computing system using any computer linked to the Internet. Data wouldn’t be confined to a hard drive on one user’s computer or even a corporation’s internal network. One more challenge is to successfully implement the load balancing algorithms for distributing the data among the cloud servers. Providing the extra layers of security may result into increase in the time to provide data access to the user. We should also take care that user should able to gain easy and timely access to his data, without any hurdle. Both the terms security and ease in access to the data should go hands in hands. CONCLUSIONS Even if the use of cloud computing have increased rapidly during last decade, the security in the cloud environment is the main issue to be focused on .it is the responsibility of a good cloud service provider to ensure secure storage of data on the cloud to his customer. In this paper, we proposed a secured multi-cloud architecture in cloud computing, which seeks to provide each customer secure environment to store his data and he should be able to access his data without any failure or delay. We are trying to provide two way security to the data, by encrypting the data and by storing data on the multiple servers. Also, the responsibility of storing the sensitive data about the user accounts is taken by different central server (CSP), which will help in securing the data from attacks. We support the migration to multi-clouds due to its ability to decrease security risks that affect the cloud computing user. REFERENCES [1]. Thom, ”Cloud computing security: From Single to Multi-clouds”, Department of Computer Science and Computer Engineering, La Trobe University, Bundoora 3086, Australia. Mohammed A. AlZain, Eric Pardede, Ben Soh, James A. [2]. ” Data integrity proofs in cloud storage”, Infosys Technologies Ltd Hyderabad, India. Sravan Kumar R, Ashutosh Saxena,
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 84 [3]. ”Using Multi Shares for Ensuring Privacy in Database-as- a-Service”, 44th Hawaii Intl. Conf. on System Sciences (HICSS),2011, pp. 1-9. M.A. AlZain and E. Pardede [4]. ”Towards Of Secured Cost Effective Multi Cloud Storage In Cloud Computing” , Communication Systems, Bannari Amman Institute of Technology. K.RAJASEKAR1 and C. KAMALANATHAN2 [5]. October3,2006. Amazon, Amazon Web Services. Web services licensing agreement, [6]. Tony Northrup, Microsoft .NET Framework Application Development Fondation 2nd edition, Training Kit. [7]. ”DepSky: dependable and secure storage in a cloud-of- clouds”, EuroSys’11:Proc. 6thConf. On Computer systems, 2011, pp. 31-46. ] A. Bessani, M. Correia, B. Quaresma, F. Andr and P. Sousa, [8]. ”Toward a cloud computing research agenda”, SIGACT News,40, 2009, pp. 68-80. K. Birman, G. Chockler and R. van Renesse [9]. Pratap Reddy Institute of Technology Hyderabad, India ”Security for Effective Data Storage in Multi Clouds”. T.NEETHA Kommuri, CH.SUSHMA,Kommuri [10]. Kim-Kwang Raymond Choo ”Cloud computing: Challenges and future directions”. BIOGRAPHIES Ms. Kalyani Manik Borse Ms. Ankita Govind .Deshpande Ms. Ashlesha Amrut .Deshpande Ms. Juily Shripad Hardas