Data is stored in a distributed way, Data partitioned in this scheme is already implicitly secured and each packet is stored distributed in different servers, log structure is maintained to keep track of each data block. Reconstruction of the data packet makes use of the log files.
2.2 Identify Based Authentication
IBE-Identify based encryption/decryption and Identify based signatures are used for ensuring authentication at all levels, client and server handshake each other with Random number generated before transferring data establishing a secure connection. 2.3 Effective and secure storage protocol
A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography …show more content…
based on algebraic structure of elliptic curves over finite fields. Elliptic curve is a plane curve over a finite field which consists of points satisfying the following equation
3. Limitation of Cloud Computing
Cloud computing has benefited many of the enterprise applications by reducing costs and allowing them and giving ability for the enterprises to concentrate on core business but cloud computing as its own challenges.
Performance of cloud is entirely dependent on the assumption that client has better network connectivity, in public cloud user doesn’t have the control over the data security, client data is susceptible to hacking and phishing attacks.
Public cloud offerings are very generic and implementing in-house cloud can be more difficult for small enterprises.
Peripheral devices like scanners and printers require software to be installed locally which will be a limitation for cloud computing.
3.1 Security Threats on Cloud
Cloud being single point of data access it even suffers from single point data failure /
Security attacks. A huge number of attacks are been made on cloud every day by malicious programs.
Data Breach at Target resulting in loss of 110 million individual’s sensitive information
Like credit card and personal details. Side channel timing exposure been just a way where a user on one virtual machine can tamper with the secured key on another virtual Machine on same host. Unfortunately Data loss is a huge threat to cloud computing, the more u encrypt the data and once u lost key u have lost entire information on the other hand, Cloud systems back up data copies for emergency situations exposes data for more attacks.
Consumer or user loosing data permanently is the last thing that a company can afford in enterprise scale. Phishing, taking Advantage of software loop holes, password loss can all lead to loss of control over the user information. Most security measure being refraining from sharing credentials between users and use a strong encryption -Decryption while exchanging critical
data.
API make easy of making services available to millions of users, Leading Developer of Public interfaces are setting up a standard Authorization OAuth to make APIs secure and follow a particular standard