CFP last date
20 January 2025
Reseach Article

Cloud Computing and Protected Storage Services Technique

Published on November 2012 by Neha Chaudhary, Vineet Sharma
Issues and Challenges in Networking, Intelligence and Computing Technologies
Foundation of Computer Science USA
ICNICT - Number 4
November 2012
Authors: Neha Chaudhary, Vineet Sharma
ab044a60-7696-4972-89bd-05dc3885cdb8

Neha Chaudhary, Vineet Sharma . Cloud Computing and Protected Storage Services Technique. Issues and Challenges in Networking, Intelligence and Computing Technologies. ICNICT, 4 (November 2012), 24-27.

@article{
author = { Neha Chaudhary, Vineet Sharma },
title = { Cloud Computing and Protected Storage Services Technique },
journal = { Issues and Challenges in Networking, Intelligence and Computing Technologies },
issue_date = { November 2012 },
volume = { ICNICT },
number = { 4 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 24-27 },
numpages = 4,
url = { /specialissues/icnict/number4/9040-1067/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Issues and Challenges in Networking, Intelligence and Computing Technologies
%A Neha Chaudhary
%A Vineet Sharma
%T Cloud Computing and Protected Storage Services Technique
%J Issues and Challenges in Networking, Intelligence and Computing Technologies
%@ 0975-8887
%V ICNICT
%N 4
%P 24-27
%D 2012
%I International Journal of Computer Applications
Abstract

Cloud Computing is the Shared pool of resources, which can be requested on-demand to enjoy the services and application. The data owner remotely store their data services and application which can be retrieved when required. The clients save their data on the storage services and gets free from the burden of maintaining the data. But some of the incidences in the history of cloud computing shows that they are not reliable at times Ex: Gmail disaster, Amazon S3 downfall. Some of the major challenging issues of the cloud computing are availability of service, data lock in, Data confidentiality and Auditability, Data transfer Bottleneck etc. The data outsourcing makes the owner free from data storage, physical organization and security, which is the need of both enterprises and individuals with high service level requirements. In order to smooth the progress of rapid deployment of cloud data storage service and regain security assurances with outsourced data dependability, efficient methods that enable on-demand data correctness verification on behalf of cloud data owners have to be designed. While public audit ability, we can have a trusted third audit party who have knowledge and capability to evaluate the danger of outsourced data whenever demanded. This is a cost effective method for data owners to believe on the cloud. We have challenges that need to be resolved for publicly auditable secure cloud storage services to become a reality.

References
  1. P. Mell and T. Grance, "Draft NIST Working Definition of Cloud Computing," 2009; http://csrc. nist. gov/groups/SNS/cloud-computing/index. html
  2. M. Armbrust et al. , "Above the Clouds: A Berkeley View of Cloud Computing," Univ. California, Berkeley, Tech. Rep. UCBEECS-2009-28, Feb. 2009.
  3. Janakiram MSV "Demystifying the Cloud, introduction to Cloud Computing" Version 1. 1, 2010.
  4. A. Juels, J. Burton, and S. Kaliski, "PORs: Proofs of Retrievability for Large Files," Proc. ACM CCS '07, Oct. 2007, pp. 584–97.
  5. G. Ateniese et al. , "Provable Data Possession at Untrusted Stores," Proc. ACM
  6. Mehul A. Shah, Mary Baker, Jeffrey C. Mogul, Ram Swaminathan, "Auditing To Keep Online Services Honest"; http://www. hpl. hp. com/personal/Mehul_Shah/papers/hotos11_2007_shah. pdf.
  7. Cong Wang, Qian Wang, and Kui Ren, "Ensuring data storage security in cloud computing", Dept of ECE Illinois Institute of Technology; http://ece. wpi. edu/~wjlou/publication/IWQoS09_Wang. pdf
  8. Amazon. com, "Amazon s3 Availability Event: July 20, 2008," July 2008; http://status. aws. amazon. com/s3-20080720. html
  9. M. Arrington, "Gmail Disaster: Reports of Mass Email Deletions," Dec. 2006; http://www. techcrunch. com/2006/12/28/gmail-disaster-reports-of-massemail- deletions/
  10. G. Ateniese et al. , "Scalable and Efficient Provable Data Possession," Proc. SecureComm '08, Sept. 2008
  11. C. Wang et al. ,"Ensuring Data Storage Security in Cloud Computing," Proc. IWQoS '09, July 2009, pp. 1–9.
  12. William stallings,2007 "Cryptography and Network Security, Principles and Practices",Volume, Prentis Hall.
Index Terms

Computer Science
Information Sciences

Keywords

Mac Pdp Por Tpa