Preview

Data Integrity in Cloud Storage

Powerful Essays
Open Document
Open Document
6658 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Integrity in Cloud Storage
CHAPTER 01

Data Integrity Proofs In Cloud Storage
ABSTRACT:
Cloud computing has been envisioned as the de-facto solution to the rising storage costs of IT Enterprises. With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly for enterprises or individual users to frequently update their hardware. Apart from reduction in storage costs data outsourcing to the cloud also helps in reducing the maintenance. Cloud storage moves the user’s data to large data centers, which are remotely located, on which user does not have any control. However, this unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved. We provide a scheme which gives a proof of data integrity in the cloud which the customer can employ to check the correctness of his data in the cloud. This proof can be agreed upon by both the cloud and the customer and can be incorporated in the Service level agreement (SLA).

PROJECT PURPOSE:
Purpose of developing proofs for data possession at untrusted cloud storage servers we are often limited by the resources at the cloud server as well as at the client. Given that the data sizes are large and are stored at remote servers, accessing the entire file can be expensive in I/O costs to the storage server. Also transmitting the file across the network to the client can consume heavy bandwidths. Since growth in storage capacity has far outpaced the growth in data access as well as network bandwidth, accessing and transmitting the entire archive even occasionally greatly limits the scalability of the network resources. Furthermore, the I/O to establish the data proof interferes with the on-demand bandwidth of the server used for normal storage and retrieving purpose.

PROJECT SCOPE:
Cloud storing its data file F at the client should process it and create suitable meta data which is used in the later stage of verification the data integrity at

You May Also Find These Documents Helpful

  • Best Essays

    With the unprecedented growth and spread of information, there is no wonder why large Information Technology companies have been investing in the “cloud”. To expand, when referring to Cloud Computing, this means to access and store information not stored with in your computer whether it be public, private, or hybrid cloud computing. In technological terms, the server you are accessing is somewhere else and therefore, the information and tools you are using are “up in the clouds” but more so stored in another server space. However, whether you are paying for services through software, total usage, or free usage (hence the types of cloud services) Cloud Computing seems to be everywhere. Yet, it is important to recognize what is to gain by using cloud computing from big businesses to individual users and what are some risky moves when utilizing cloud storage over the Internet. Hence, the content of this paper will discuss the pros and cons of cloud computing and where cloud computing is headed in todays online society.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Input Controls

    • 1029 Words
    • 5 Pages

    Sivathanu, G., Wright, C. P., & Zadok, E. (2005, November 14). Stony Brook University. Retrieved from Ensuring Data Integrity in Storage: Techniques and Applications: http://www.fsl.cs.sunysb.edu/docs/integrity-storagess05/integrity.html…

    • 1029 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Trust is not easily defined, but most people agree that when it comes to cloud computing, transparency is essential to creating trust. Businesses must be able to see cloud service providers are complying with agreed data security standards and practices. These must include controls around who has access to data, staff security vetting practices, and the technologies and processes to segregate, backup and delete data. Suppliers of cloud technologies and services are quick to claim that cloud computing is well equipped to provide the necessary controls. Virtualization, they argue, underlies cloud computing, and therein lies the potential to achieve hitherto impossible levels of security. While virtualization is viewed with suspicion and fear by many IT directors, suppliers like RSA, IBM and other say that the technology enables organizations to build security into the infrastructure and automate security processes, to surpass traditional data protection…

    • 1351 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Large enterprises have been reluctant to move certain files or apps to the cloud network. The market size for cloud is far behind what it was expected to be, and for good reason. Consumers have concerns with cloud computing security, especially when it involves data security and confidentiality issues. This article shows the legitimacy of concerns people are have when dealing with…

    • 2396 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    The Alchemist Sparknotes

    • 1268 Words
    • 6 Pages

    The Alchemist: Coelho fights, and wins, the battle of effective reader engagement within the textual arena alone In Paulo Coelho’s work, The Alchemist, a young boy learns to listen to his heart and trust the world around him in pursuit of living out his dreams. Originally written in Portuguese, an in-depth study of the textual arena reveals Coelho’s engagement of the reader, in both the original language and translations, function as a fail-safe. Whether or not a certain reader finds the book’s concepts agreeable, the simplicity and coherence of the textual arena and choices in language, like the use of the colloquial, cause him or her to find inspiration and thought provocation within its pages. The main concept throughout The Alchemist is found in the form of sage advice to the shepherd boy: “The Soul of the World is nourished by people’s…

    • 1268 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    institutions across the country. In doing so, these government agencies will be able to better…

    • 732 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Businesses need to ensure the secure storage of company files and the guaranteed privacy of employee information. With the increased use and demand for network computing, information security has become a high priority. With all the ways in which someone can gain access to private and confidential information, the previous safe measures need to be enhanced and improved (Yaoxue Zhang; Laurenc T. Yang; Yuezhi Zhou; Wenyuan Kuang. 2010). For example, employee and company files are…

    • 962 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Security plays a significant role in today’s corporations and mitigating risks to a company’s most valuable asset, data, is important. With data breaches, such as the one experienced by Target, the Department of Homeland Security as well as the Internal Revenue System, it is becoming increasingly obvious that no one is immune. Securing data is complex and with the advent of cloud services where information is now gathered and stored in various locations throughout the globe, securing that data continues to be a challenge. Even as we implement policies and procedures to secure our environment, we are now partnering with many companies and vendors that must also follow the same guidelines to ensure a company’s assets.…

    • 1286 Words
    • 6 Pages
    Good Essays
  • Best Essays

    Cyber Security

    • 4964 Words
    • 20 Pages

    10. Catteddu, D. and Hogben, G. (2009). Cloud Computing: benefits, risks and recommendations for information security. Technical Report. European Network and Information Security Agency.…

    • 4964 Words
    • 20 Pages
    Best Essays
  • Good Essays

    210243 gay marriage

    • 993 Words
    • 3 Pages

    V. Conclusion: In Search for a Compromise between Acknowledging the Rights and Freedoms of Gays and Straight People…

    • 993 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The external environment refers to the conditions, entities, events and factors surrounding an organization which influence its activities and choices and determine the organization’s opportunities and risks. Factors relating to political, economic, social-cultural, technological, environmental and legal have implications on the functions and long term goals of the organization. On the other hand, management practice refers to the methods and techniques in which the organization goes about achieving its corporate goals. External environment affects the organization from the outside in whereas managers utilizing best practices will attempt to steer the organization to meet corporate goals in the midst of the uncertain environment. However, the ability of the organization to meet corporate goals is not solely dependent on best management practice but also on the opportunities and risks provided by the external environment. E.g. good economic climate will foster the achievement of corporate goals; bad economic climate will hamper the growth of the organization.…

    • 357 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Data Security services in cloud computing is still mystery for the customers although service providers have implemented all standard technologies that you can imagine: state ful inspection firewalls, Intrusion Detection and…

    • 667 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Auditors have access to an organization’s financial, sales and distribution, customer and supplier records. Activities such as collection of data relating to the customer base of a retail company could be sold to competitors. There are a lot of information technology (IT) software and hardware have been used in auditing to help auditors to store data and information. One of today’s most exciting computing paradigm shift in information technology is cloud computing. Major challenge to adopt cloud infrastructure is to secure sensitive data. Other than cloud computing, there are many manual and electronic records that fails to secure sensitive data. The internal audit team is exposed to the risks around data security and privacy that it examines for its…

    • 1728 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Referring to the same forensic function on the diagram, apart from data provenance which is useful when it comes to cloud storage, it is also recommend to incorporate the LDF2C framework as described in chapter five (5) into use as it could help law enforcement (via the forensic function) to acquire evidence artifacts i.e. log from various layer of the cloud as explained in the same…

    • 807 Words
    • 4 Pages
    Good Essays