International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 110    Submit Your Rating     Cite This   Download        Certificate

A COMPREHENSIVE SECURITY FRAMEWORK FOR CLOUD COMPUTING

    1 Author(s):  VIVEKANANTH.P

Vol -  3, Issue- 3 ,         Page(s) : 48 - 60  (2012 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

The security risks associated with each cloud delivery model vary and are dependent on a wide range of factors including the sensitivity of information assets, cloud architectures and security controls involved in a particular cloud environment. With public audit ability, a trusted entity with expertise and capabilities data owners do not possess can be delegated as an external audit party to assess the risk of outsourced data when needed. Such an auditing service not only helps save data owners’ computation resources but also provides a transparent yet cost-effective method for data owners to gain trust in the cloud. All types of users who require the secure transmission or storage of data in any kind of media or network. Since the data transmission on the inter net or over any networks are vulnerable to the hackers attack. We present information risk management framework for better understanding critical to support scalable and efficient trusted third party auditing in Cloud Computing. We propose a new model–driven methodology for the security testing of cloud environments, to support batch auditing for TPA upon delegations from multi-user’s. We also propose new scheme that enables the data owner to delegate tasks of Cloud storage data file encryption and trusted user secret key update to cloud servers without disclosing security data contents or user access privilege information. The trusted third party auditing process will bring in no new vulnerabilities towards user cloud storage data privacy. Our new method combined the secret key based homomorphic authenticator with random masking to achieve the privacy-preserving public cloud data auditing system.

  1. C. Wang et al., “Privacy-Preserving Public Auditing for Storage Security in Cloud Computing,” Proc. IEEE INFOCOM ‘10, Mar. 2010
  2. P. Mell and T. Grance, “Draft NIST Working Definition of Cloud Computing,” 2009; http://csrc.nist.gov/groups/SNS/cloud-computing/index.html
  3. M. Armbrust et al., “Above the Clouds: A Berkeley View of Cloud Computing,” Univ. California, Berkeley, Tech. Rep. UCBEECS-2009-28, Feb. 2009.
  4. Amazon.com, “Amazon s3 Availability Event: July 20, 2008,” July 2008; http://status.aws.amazon.com/s3-20080720.html
  5. M. Arrington, “Gmail Disaster: Reports of Mass Email Deletions,” Dec. 2006; 
  6. T. Ristenpart et al., “Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds,” Proc. 16th ACM Conf. Computer and Communications Security, ACM Press, 2009, pp. 199–212.
  7. G. Klein et al., “seL4: Formal Verification of an OS Kernel,” Proc. ACM SIGOPS 22nd Symp. Operating Systems Principles (SOSP 09), ACM Press, 2009, pp. 207–220.
  8. Joseph, Randy Katz, Above the Clouds: A Berkeley View of Cloud Computing, University of California Electrical Engineering & Computer Science, February 10th, 2009.
  9. Patel, Chandrakant D., Shah, Amip J., “Cost Model for Planning, Development, and Operation of a Data Center,” Internet Systems and Storage Laboratory, HP Laboratories, Palo Alto, June 9, 2005
  10. Anthes, Gary, “Data Centers Get a Makeover”, Computerworld news article, published November 1, 2005.
  11. Shafiqul Abidin, “Data Warehousing Journey and Future as Industry” Published Dec 2010 , www.irjmst.com
  12. KUSUM LATA BHARTI , “Green IT is gaining relevance in challenging economic conditions” Published March 2012 ,www.irjmst.com

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details