A Survey on Secured Approach of External Cloud without Avoiding the Data Integrity
Abstract
Cloud Computing settled state of mind has included a New York minute inmany organizations. Cloud Computing offers numerous advantages in uncertainty of delicate cost and administration of information. Guaranteeing the guarantee of exceed processing assumes a leisure activity part in the leave in the shade registering, as clients regularly five and dime shop imperative data by all of obscuration automated data suppliers in any case these suppliers make out be hazardous. Clients are pondering generally assaults on the arrangement of significant worth and the accessibility of their story in the diminish from terrible insiders and untouchables, and from accepting nobody guarantee worth of diminish administrations. These issues are strongly critical yet there are still around space for stake investigating in leave in the shade processing. Managing by the entire of "single cloud" suppliers is anticipated to wind up noticeably slight well known commonly clients appropriate to dangers of engagement in movement application accessibility blemish and the incident of wretched insiders in the fair hit cloud. An arrangement towards "multi-mists", or in particular words, "inter clouds" or "billow of-Cloud" has expanded as of late.
The thought process of this freebee is to skim late research over each other to hit and multi-mists cash in the bank and to give conceivable arrangements. It is rely on that the examination into the demonstration with respect to of multi-cloud suppliers to sponsor security has gotten rare consideration from the exploration swarm than has the oversee of fair hit mists. This exchange tries to protect the consider of multi-mists guerdon to its adaptability to influenced a long story to short security chances that push the distributed computing buyer.Full Text:
PDFReferences
(NIST), http://www.nist.gov/itl/cloud/, Accessed in May-2011.
I. Abraham, G. Chockler, I. Keidar and D. Malkhi, Byzantine disk paxos: optimal resilience with Byzantine shared memory, Distributed Computing, 18 (2006), pp. 387-408.
H. Abu-Libdeh, L. Princehouse and H. Weatherspoon, RACS: a case for cloud storage diversity, Proceedings of the 1st ACM symposium on Cloud computing, ACM, 2010, pp. 229-240.
S. Akioka and Y. Muraoka, HPC benchmarks on Amazon EC2, Proceedings of The 2010 24th International Conference on Advanced Information Networking and Applications Workshops, IEEE, 2010, pp. 1029-1034.
M. A. AlZain and E. Pardede, Using Multi Shares for Ensuring Privacy in Database-as-a-Service, Proceedings of The 2011 44th Hawaii International Conference on System Sciences (HICSS), IEEE, Kauai, USA, 2011, pp. 1-9.
M. A. AlZain, B. Soh and E. Pardede, MCDB: Using Multi-clouds to Ensure Security in Cloud Computing, Proceedings of The 2011 Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), IEEE, Sydney, Australia, 2011, pp. 784-791.
M. A. AlZain, B. Soh and E. Pardede, A New Approach Using Redundancy Technique to Improve Security in Cloud Computing, Proceedings of The 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec12), IEEE, Kuala Lumpur, Malaysia, 2012, pp. 230-235.
M. A. AlZain, B. Soh and E. Pardede, A new model to ensure security in cloud computing services, Journal of Service Science Research, 4 (2012), pp. 49-70.
Amazon, Amazon Web Services. Web services licensing agreement, (2010).
Amazon, Amazon Web Services. Web services licensing agreement, Accessed in May-2011 (2006).
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, Provable data possession at untrusted stores, Proceedings of the 14th ACM conference on Computer and communications security, ACM, 2007, pp. 598-609.
H. Attiya and A. Bar-Or, Sharing memory with semi-byzantine clients and faulty storage servers, Proceedings The 2003 22nd International Symposium on Reliable Distributed Systems, 2003, pp. 371-378.
A. Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, DepSky: dependable and secure storage in a cloud-of-clouds, Proceedings of the sixth conference on Computer systems, ACM, 2011, pp. 31-46.
K. Birman, G. Chockler and R. van Renesse, Toward a cloud computing research agenda, SIGACT News, 40 (2009), pp. 68-80.
M. P. Boss G, Quan D, Legregni L, Hall H. , Cloud computing, White Paper, IBM (2007).
K. D. Bowers, A. Juels and A. Oprea, HAIL: A high-availability and integrity layer for cloud storage, Proceedings of the 16th ACM conference on Computer and communications security, ACM, 2009, pp. 187-198.
C. Cachin, R. Haas and M. Vukolic, Dependable storage in the Intercloud, IBM Research, 3783 (2010), pp. 1-6.
C. Cachin, I. Keidar and A. Shraer, Trusting the cloud, ACM SIGACT News, 40 (2009), pp. 81-86.
C. Cachin and S. Tessaro, Optimal resilience for erasure-coded Byzantine distributed storage, Distributed Computing, 3724 (2005), pp. 497-498.
M. Castro and B. Liskov, Practical Byzantine fault tolerance, Operating Systems Review, 33 (1998), pp. 173-186.
G. Chockler, R. Guerraoui, I. Keidar and M. Vukolic, Reliable distributed storage, Computer, 42 (2009), pp. 60-67.
G. Chockler and D. Malkhi, Active disk paxos with infinitely many processes, Proceedings of The 2002 twenty-first annual symposium on Principles of distributed computing, ACM, 2002, pp. 78-87.
Clavister, Security in the cloud, Clavister White Paper (2008), pp. 1-6.
A. J. Feldman, W. P. Zeller, M. J. Freedman and E. W. Felten, SPORC: Group collaboration using untrusted cloud resources, Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation - OSDI (2010), pp. 337-350.
S. L. Garfinkel, Email-based identification and authentication: An alternative to PKI?, IEEE Security and Privacy, 1 (2003), pp. 20-26.
S. L. Garfinkel, An evaluation of amazon’s grid computing services: EC2, S3, and SQS, http://simson.net/clips/academic/2007.Harvard.S3.pdf, 2007, pp. 1-15.
E. J. Goh, H. Shacham, N. Modadugu and D. Boneh, SiRiUS: Securing remote untrusted storage, Proceedings of the Tenth Network and Distributed System Security (NDSS) Symposium, 2003, pp. 131–145.
G. R. Goodson, J. J. Wylie, G. R. Ganger and M. K. Reiter, Efficient Byzantine-tolerant erasure-coded storage, Proceedings of the International Conference on Dependable Systems and Networks, 2004, pp. 1-22.
E. Grosse, J. Howie, J. Ransome, J. Reavis and S. Schmidt, Cloud computing roundtable, Security & Privacy, IEEE, 8 (2010), pp. 17-23.
J. Heiser, What you need to know about cloud computing security and compliance, Gartner, Research, ID (2009).
J. Hendricks, G. R. Ganger and M. K. Reiter, Low-overhead byzantine fault-tolerant storage, Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, ACM, 2007, pp. 73-86.
P. Jayanti, T. D. Chandra and S. Toueg, Fault-tolerant wait-free shared objects, Journal of the ACM (JACM), 45 (1998), pp. 451-500.
B. W. Johnson, Design & analysis of fault tolerant digital systems, Addison-Wesley Longman Publishing Co., Inc., 1988.
A. Juels and B. S. Kaliski Jr, PORs: Proofs of retrievability for large files, Proceedings of the 14th ACM conference on Computer and communications security, ACM, 2007, pp. 584-597.
S. Kamara and K. Lauter, Cryptographic cloud storage, Financial Cryptography and Data Security, 6054 (2010),
pp. 136-149.
L. M. Kaufman, Data security in the world of cloud computing, IEEE Security & Privacy, 7 (2009), pp. 61-64.
H. Krawczyk, Secret sharing made short, Proceedings of the 13th annual international cryptology conference on Advances in cryptology Springer, 1994, pp. 136-146.
H. Krawczyk, M. Bellare and R. Canetti, HMAC: Keyed-hashing for message authentication, in R. Editor, ed., 1997, pp. 1-11.
P. Kuznetsov and R. Rodrigues, BFTW 3: why? when? where? workshop on the theory and practice of byzantine fault tolerance, ACM SIGACT News, 40 (2009), pp. 82-86.
L. Lamport, R. Shostak and M. Pease, The Byzantine generals problem, ACM Transactions on Programming Languages and Systems (TOPLAS), 4 (1982), pp. 382-401.
P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner and J. F. Farrell, The inevitability of failure: The flawed assumption of security in modern computing environments, Proceedings of the 21st National Information Systems Security Conference, 1998, pp. 303-314.
U. Maheshwari, R. Vingralek and W. Shapiro, How to build a trusted database system on untrusted storage, Proceedings of the 4th conference on Symposium on Operating System Design & Implementation, USENIX Association, 2000, pp. 10-10.
D. Malkhi and M. Reiter, Byzantine quorum systems, Distributed Computing, 11 (1998), pp. 203-213.
J. P. Martin, L. Alvisi and M. Dahlin, Minimal byzantine storage, Distributed Computing (2002), pp. 311-325.
H. Mei, J. Dawei, L. Guoliang and Z. Yuan, Supporting Database Applications as a Service, Proceedings of the 2009 International Conference on Data Engineering IEEE 2009, pp. 832-843.
R. C. Merkle, Protocols for public key cryptosystems, IEEE Symposium on Security and Privacy, IEEE, 1980, pp. 122-134.
E. Mykletun, M. Narasimha and G. Tsudik, Authentication and integrity in outsourced databases, ACM Transactions on Storage (TOS), 2 (2006), pp. 107-138.
C. Papamanthou, R. Tamassia and N. Triandopoulos, Authenticated hash tables, Proceedings of the 15th ACM conference on Computer and communications security, ACM, 2008, pp. 437-448.
M. Pease, R. Shostak and L. Lamport, Reaching agreement in the presence of faults, Journal of the ACM (JACM), 27 (1980), pp. 228-234.
R. Perez, R. Sailer and L. van Doorn, vTPM: virtualizing the trusted platform module, Proceedings of the 15th conference on USENIX Security Symposium 2006, pp. 305-320.
M. O. Rabin, Efficient dispersal of information for security, load balancing, and fault tolerance, Journal of the ACM (JACM), 36 (1989), pp. 335-348.
RedHat, https://rhn.redhat.com/errata/RHSA-2008-0855.html, Accessed in May-2011.
T. Ristenpart, E. Tromer, H. Shacham and S. Savage, Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, Proceedings of the 16th ACM conference on Computer and communications security, ACM, 2009, pp. 199-212.
F. Rocha and M. Correia, Lucy in the Sky without Diamonds: Stealing Confidential Data in the Cloud, Proceedings of The 2011 1st International Conference on Dependable Systems and Networks Workshops (DSN-W), IEEE, 2011, pp. 1-6.
N. Santos, K. P. Gummadi and R. Rodrigues, Towards trusted cloud computing, Proceedings of the 2009 conference on Hot topics in cloud computing, USENIX Association, 2009, pp. 1-5.
D. Sarno, Microsoft says lost sidekick data will be restored to users, Los Angeles Times, (2009).
F. Schneider and L. Zhou, Implementing trustworthy services using replicated state machines, Replication (2010), pp. 151-167.
DOI: https://doi.org/10.23956/ijarcsse.v7i11.476
Refbacks
- There are currently no refbacks.