IRJET- Tracking Down Unauthorized Access by Users in Cloud

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 03 Issue: 08 | Aug-2016

www.irjet.net

e-ISSN: 2395 -0056 p-ISSN: 2395-0072

Tracking Down Unauthorized Access by Users in Cloud Swati Mehta#1, Jitender Saini#2 1,2Department 1,2N.C

of Computer Science

College of Engineering, Israna Haryana, India

---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract— In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is no exception. According to studies one of the major challenges of this technology is the security and safety required for providing services and build trust in consumers to transfer their data into the cloud. In this paper we attempt to review and highlight security challenges, particularly the security of data storage in a cloud environment using Erasable Correcting Code. Also, provides some offers to enhance the security of data storage in the cloud computing systems. We propose an effective and flexible distributed scheme with explicit dynamic data support to ensure the correctness of users’ data in the cloud.

Keywords— Cloud Computing, security challenges Cloud computing Security, Erasable Correcting Code I. INTRODUCTION Cloud Computing [1] provides us a means by which we can access the applications as utilities, over the Internet. It allows us to create, configure, and customize applications online. It offers online data storage, infrastructure and application. The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is something, which is present at remote location. Cloud can provide services over network, i.e., on public networks or on private networks, i.e., WAN, LAN or VPN. Applications such as e-mail, web conferencing, customer relationship management (CRM), all run in cloud. The cloud makes it possible for users to access information from anywhere anytime. It removes the need for users to be in the same location as the hardware that stores data. Once the internet connection is established either with wireless or broadband, user can access services of cloud computing through various hardware. This hardware could be a desktop, laptop, tablet or phone. From the perspective of data security, which has always been an important aspect of quality of service, Cloud Computing

© 2016, IRJET

|

Impact Factor value: 4.45

|

inevitably poses new challenging security threats for number of reasons. 1. Firstly, traditional cryptographic primitives for the purpose of data security protection cannot be directly adopted due to the users’ loss control of data under Cloud Computing. Therefore, verification of correct data storage in the cloud must be conducted without explicit knowledge of the whole data. Considering various kinds of data for each user stored in the cloud and the demand of long term continuous assurance of their data safety, the problem of verifying correctness of data storage in the cloud becomes even more challenging. 2. Secondly, Cloud Computing is not just a third party data warehouse. The data stored in the cloud may be frequently updated by the users, including insertion, deletion, modification, appending, reordering, etc. To ensure storage correctness under dynamic data update is hence of paramount importance. These techniques, while can be useful to ensure the storage correctness without having users possessing data, cannot address all the security threats in cloud data storage, since they are all focusing on single server scenario and most of them do not consider dynamic data operations. As a complementary approach, researchers have also proposed distributed protocols for ensuring storage correctness across multiple servers or peers. Again, none of these distributed schemes is aware of dynamic data operations. As a result, their applicability in cloud data storage can be drastically limited. In this paper, we propose an effective and flexible distributed scheme with explicit dynamic data support to ensure the correctness of users’ data in the cloud. We rely on erasure correcting code in the file distribution preparation to provide redundancies and guarantee the data dependability. This construction drastically reduces the communication and storage overhead as compared to the traditional replicationbased file distribution techniques.

ISO 9001:2008 Certified Journal

|

Page 501


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.