Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2019, Journal of emerging technologies and innovative research
…
4 pages
1 file
Customers store huge proportions of tricky data on a cloud. Sharing fragile data will empower endeavors to decrease the expense of giving customer's tweaked advantages and offer some effective force included data administrations. Nevertheless, secure data sharing is dangerous. Security plays a vital role among the most troublesome errand to realize in cloud computing. Unambiguous kinds of assaults in the application side and in the hardware sections. This paper implements a framework for secure sensitive data sharing in cloud, including secure data transport, amassing, use, and obliteration on a semi-trusted in cloud condition. We show Kerberos tradition over the framework and a customer method protection system in perspective of a virtual machine screen, which offers assistance for the affirmation of structure limits.
2016
Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.
ACM Computing Surveys, 2015
In response to the revival of virtualized technology by , NIST defined cloud computing, a new paradigm in service computing infrastructures. In cloud environments, the basic security mechanism is ingrained in virtualization-that is, the execution of instructions at different privilege levels. Despite its obvious benefits, the caveat is that a crashed virtual machine (VM) is much harder to recover than a crashed workstation. When crashed, a VM is nothing but a giant corrupt binary file and quite unrecoverable by standard disk-based forensics. Therefore, VM crashes should be avoided at all costs. Security is one of the major contributors to such VM crashes. This includes compromising the hypervisor, cloud storage, images of VMs used infrequently, and remote cloud client used by the customer as well as threat from malicious insiders. Although using secure infrastructures such as private clouds alleviate several of these security problems, most cloud users end up using cheaper options such as third-party infrastructures (i.e., private clouds), thus a thorough discussion of all known security issues is pertinent. Hence, in this article, we discuss ongoing research in cloud security in order of the attack scenarios exploited most often in the cloud environment. We explore attack scenarios that call for securing the hypervisor, exploiting co-residency of VMs, VM image management, mitigating insider threats, securing storage in clouds, abusing lightweight software-as-a-service clients, and protecting data propagation in clouds. Wearing a practitioner's glasses, we explore the relevance of each attack scenario to a service company like Infosys. At the same time, we draw parallels between cloud security research and implementation of security solutions in the form of enterprise security suites for the cloud. We discuss the state of practice in the form of enterprise security suites that include cryptographic solutions, access control policies in the cloud, new techniques for attack detection, and security quality assurance in clouds.
International Journal of Engineering Research and Technology (IJERT), 2012
https://www.ijert.org/ensuring-data-storage-security-in-cloud-computing-with-effect-of-kerberos https://www.ijert.org/research/ensuring-data-storage-security-in-cloud-computing-with-effect-of-kerberos-IJERTV1IS5003.pdf Cloud computing as we know is envisioned of the next-generation technology of IT industry. In other method is Internet based technology where the users can subscribe high quality of services from data and software that resides in the remote servers. This make many advantage and drawback for the users to create and store data in the cloud servers thereby utilizing fewer resource in client syste and the other hand management of the data and software may not be fully trustworthy and accurate which possesses many security challenges. So the security is important aspect of service quality. In this article,we concentrate on cloud data storage security by the implementation of kerberos authentication service.We define the kerberos for create the ticket and granting ticket for each user.so to make the more focus on user we made more secure.
Late mechanical advances have offered ascend to the notoriety and accomplishment of cloud. This new worldview is picking up a growing enthusiasm, since it gives cost effective models that help the transmission, stockpiling, and concentrated processing of information. In any case, these promising stockpiling administrations bring many testing configuration issues, impressively because of the loss of information control. These difficulties, to be specific information classification and information respectability, have noteworthy effect on the security and exhibitions of the cloud framework. Some danger models accept that the cloud specialist organization can't be trusted, and in this manner security creators propose an abnormal state security confirmation, for example, putting away scrambled information in cloud servers. Others assume that cloud suppliers can be trusted, and that potential dangers come essentially from outside aggressors and different vindictive cloud clients. Furthur more, a cloud client can never deny a potential server breakdown. Thus, there are a few difficulties that should be tended to as for security and protection in a cloud setting. This proposition goes for defeating this exchange off, while considering two information security concerns. On one hand, we concentrate on information secrecy safeguarding which turns out to be more complex with adaptable information sharing among a dynamic gathering of clients. It requires the mystery of outsourced information and an efficient sharing of unscrambling keys between different approved clients. For this reason, we, in the first place, proposed another technique depending on the utilization of ID-Based Cryptography (IBC), where every customer goes about as a Private Key Generator (PKG). That is, he creates his own open components and infers his comparing private key utilizing a mystery. Because of IBC properties, this commitment is appeared to help information security and confidentiality, and to be impervious to unapproved access to information amid the sharing procedure, while considering two sensible risk models, to be specific a genuine however inquisitive server and a malignant client foe. Second, we characterize CloudaSec, an open key based arrangement, which proposes the partition of membership based key administration and privacy situated deviated encryption strategies. That is, CloudaSec empowers adaptable and versatile sending of the arrangement and also solid security ensures for outsourced information in cloud servers. Trial comes about, under Open Stack Swift, have demonstrated the efficiency of CloudaSec in versatile information sharing while at the same time considering the effect of the cryptographic operations at the customer side. Then again, we address the Proof of Data Possession (PDP) concern. Actually, the cloud client ought to have an efficient approach to perform periodical remote respectability confirmations, without keeping the information locally, following three considerable angles : security level, open certainty, and execution. This worry is amplified by the customer's compelled stockpiling and calculation capacities and the expansive size of outsourced information. Keeping in mind the end goal to satisfy this security prerequisite, we initially characterize another zero-learning PDP protocol that gives deterministic honesty check ensures, depending on the uniqueness of the Euclidean Division. These assurances are considered as fascinating, contrasted with a few proposed plans, showing probabilistic methodologies. At that point, we propose SHOPS, a Set-Homomorphism Proof of Data Possession plot, supporting the 3 levels of information confirmation. SHOPS empowers the cloud customer not exclusively to acquire a proof of ownership from the remote server, yet in addition to check that a given information document is dispersed over numerous capacity gadgets to accomplish a specific wanted level of blame tolerance. Without a doubt, we display the set homomorphism property, which stretches out pliability to set operations properties, for example, union, convergence and incorporation. SHOPS display high security level and low preparing many-sided quality. For example, SHOPS spares vitality inside the cloud supplier by appropriating the calculation over numerous hubs. Every hub gives confirmations of neighbourhood information square sets. This is to make appropriate, subsequent evidence over arrangements of information squares, fulfilling a few needs, for example, proofs accumulation.
international journal for research in applied science and engineering technology ijraset, 2020
Cloud computing is a popular approach that is used to store any kind of data or information over the internet rather than storing it on our desktops. But there is one major issue that arises when we wish to adopt this method which is the security of the data of the user. When data is stored in the cloud it is not completely under the control of the user. So we need to make use of methods that will make sure that the data of the user stored in the cloud cannot be accessed by the cloud service provider and that only valid or authorised users can access the data. These methods will ensure security of the data and will increase the rate of adoption of cloud computing services.
International Journal of Engineering Research and Technology (IJERT), 2012
https://www.ijert.org/data-security-in-cloud-computing https://www.ijert.org/research/data-security-in-cloud-computing-IJERTV1IS5299.pdf Cloud computing has been envisioned as the next-generation architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this paper, we focus on cloud data storage security i.e. Data Verification, Tampering, Loss and Theft, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against data tampering, loss and theft in cloud computing.
Clients store tremendous measures of touchy information on a cloud. Sharing delicate information will enable undertakings to lessen the cost of giving clients customized benefits and offer some incentive included information services. Be that as it may, secure information sharing is risky. Security is a standout amongst the most troublesome errand to actualize in cloud computing. Distinctive types of attacks in the application side and in the equipment segments. This paper proposes a system for secure delicate information partaking in cloud, including secure information conveyance, stockpiling, use, and devastation on a semi-confided in cloud environment. We exhibit Kerberos convention over the system and a client procedure insurance technique in view of a virtual machine screen, which offers help for the acknowledgment of framework capacities.
Computational Intelligence and Neuroscience
The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over clou...
IAEME PUBLICATION, 2020
Cloud computing (CC) is a emerging area as the data levels are increasing day by day and the maintenance of the storage and its storage is becoming a complex task. The primary point of CC is to lessen the requirement for clients' interest in new equipment or programming by offering adaptable cloud administrations, with a client receiving the rewards of the compensation per use approach. CC requests tending to numerous security and protection issues: the two issues vulnerabilities, dangers, attacks and arrangements for controlling. Cloud computing has been generally received in a huge assortment of uses. Check and approval of dispersed frameworks has been broadly considered, be that as it may, it has not been examined whether confirmation or authentication approaches in distributed frameworks can be straightforwardly applied to Cloud computing or not. There are chances of obstructing the security of the information because of untrustworthiness of some service providers or because of malicious cloud users. Avoiding malicious users in cloud and providing security to the users sensitive information and giving accessing to only validated users is a challenging task. Along these lines, to verify the information which is re-appropriated and accessed to outsider is an incredible test. The perspective on current security arrangements is basically on confirmation to catch that the information of an individual that can't be drawn closer wrongfully to unauthorized users, however there emerged a protection issue when a client demand for information sharing to different clients through cloud server. The data which is stored in the cloud needs to be validated before giving accessing permissions to the requested users. In the proposed work a strong Two Level
International Journal of Engineering Development and Research, 2016
Cloud computing is a rising computing standard in which the computing framework is given as a service over the Internet. The Cloud computing tool gives facility of data storage and access for cloud users, but when outsourcing the data to a third party causes safety issue of cloud data so data are protected by restricting the data. We propose a new decentralized access control scheme for secure data storage in the clouds that supports anonymous authentication where identity of the user is protected from the cloud during authentication. The architecture is decentralized, meaning that there can be several KDCs for key management. Revoked users cannot access data after they have been revoked. The proposed scheme is resilient to replay attacks. In addition to this a new symmetric key cryptographic method called Modern encryption Standard (MES)-II presents method which can be effective to encrypt various types of plain text files and the method is free from standard cryptography attacks n...
Çalışma ve Toplum Dergisi, 2019
Metro, 2021
Journal of Plant Nutrition, 2012
Physical Review E, 1995
Journal of Experimental Marine Biology and Ecology, 2019
Advances in Difference Equations, 2017
Journal of Magnetism and Magnetic Materials, 2014
BMC Research Notes