We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Essential Cloud Storage Systems Security Methodologies

by Mervat Hashem, Zhiyong Li, Alaa Al Ghamry
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 21
Year of Publication: 2013
Authors: Mervat Hashem, Zhiyong Li, Alaa Al Ghamry
10.5120/11517-7192

Mervat Hashem, Zhiyong Li, Alaa Al Ghamry . Essential Cloud Storage Systems Security Methodologies. International Journal of Computer Applications. 67, 21 ( April 2013), 6-10. DOI=10.5120/11517-7192

@article{ 10.5120/11517-7192,
author = { Mervat Hashem, Zhiyong Li, Alaa Al Ghamry },
title = { Essential Cloud Storage Systems Security Methodologies },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 21 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 6-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number21/11517-7192/ },
doi = { 10.5120/11517-7192 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:26:03.088474+05:30
%A Mervat Hashem
%A Zhiyong Li
%A Alaa Al Ghamry
%T Essential Cloud Storage Systems Security Methodologies
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 21
%P 6-10
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The demand to have secure environments for systems' information on cloud systems is arising since this should be more secure and far away from our systems damage disasters and data corruption. The dream became real with the cloud computing. Cloud computing is being more famous and used especially in the enterprises where the cost matters. These enterprises can reduce IT costs by using cloud computing services. Most of the enterprises that don't use cloud computing have a fear of the platform security and the information security. The users always seek for verifying the confidentiality and integrity of their data and computations before using cloud computing. Many researches have been established in these two fields for the infrastructure, platform security, data confidentiality and integrity. This paper, presents two examples for platform security and a comparison between three techniques for how can users secure the data and computations, at cloud environment, to keep the confidentiality and integrity. The ultimate goal of providing such a comparison is to encourage enterprises and users to use the cloud storage systems on secure infrastructures and platforms that maintain their customers/own data privacy.

References
  1. Liu, F. , Tong, J. , Mao, J. , Bohn, R. , Messina, J. , Badger, L. , & Leaf, D. (2011). NIST Cloud Computing Reference Architecture. NIST Special Publication, 500:292.
  2. Garfinkel, T. , Pfaff, B. , Chow, J. , Rosenblum, M. , & Boneh, D. (2003, October). Terra: A virtual machine-based platform for trusted computing. In ACM SIGOPS Operating Systems Review (Vol. 37, No. 5, pp. 193-206). ACM.
  3. Santos, N. , Gummadi, K. P. , & Rodrigues, R. (2009, June). Towards trusted cloud computing. In Proceedings of the 2009 conference on Hot topics in cloud computing (pp. 3-3). USENIX Association.
  4. Zhang, X. , Du, H. T. , Chen, J. Q. , Lin, Y. , & Zeng, L. J. (2011, May). Ensure Data Security in Cloud Storage. In Network Computing and Information Security (NCIS), 2011 International Conference on (Vol. 1, pp. 284-287). IEEE.
  5. Hwang, J. J. , Chuang, H. K. , Hsu, Y. C. , & Wu, C. H. (2011, April). A business model for cloud computing based on a separate encryption and decryption service. In Information Science and Applications (ICISA), 2011 International Conference on (pp. 1-7). IEEE.
  6. Munier, M. , Lalanne, V. , & Ricarde, M. (2012, June). Self-Protecting Documents for Cloud Storage Security. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (pp. 1231-1238). IEEE.
  7. Grobauer, B. , Walloschek, T. , & Stocker, E. (2011). Understanding cloud computing vulnerabilities. Security & Privacy, IEEE, 9(2), 50-57.
  8. Dahbur, K. , Mohammad, B. , & Tarakji, A. B. (2011, April). A survey of risks, threats and vulnerabilities in cloud computing. In Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications (p. 12). ACM.
Index Terms

Computer Science
Information Sciences

Keywords

Amazon web services IaaS PaaS