SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Journal of Computational Engineering Research||Vol, 04||Issue, 2||

Data Storage in Secured Multi-Cloud Storage in Cloud
Computing
Archana Waghmare1, Rahul Patil2, Pramod Mane3, Shruti Bhosale4.
1, 2,3,4

S.V.P.M’s COE Malegaon(Bk). Department Of Computer Engg.

ABSTRACT
Now a day even though Cloud services offer flexibility, scalability, there have been proportionate
concerns about security. As more data moves from centrally located server storage to the cloud
storage. Security is the most important factor related to the cloud computing. As the users can stores
his private data on cloud with the help of cloud service providers. Data stored on single cloud is risk
of service availability failure due to attacker enters in single cloud.Our approach is to movement
towards multi-clouds that is data stored on multi-cloud service providers. In this system we propose a
secured cost-effective multi-cloud storage (SCMCS) model in cloud computing in which holds an
economical distribution of data among the available cloud service provider (SP) in the market,
instead of single cloud to provide the customers with advanced data availability as well as security.
This work aims to encourage the use of multi-clouds due to its ability to reduce security risks that
affect the cloud computing user. Our proposed model provides a better security for customer’s data
according to their available budgets from that they can choose cloud service provider.

KEYWORDS: Cloud Networks , Service provider ,Multi- Cloud Storage ,Security, Cloud Services,
Cloud Computing.

I.

INTRODUCTION

Cloud computing is nothing but rate server and internet based model .A huge amount of data being
retrieved from geographically distributed data sources and non localized data handling requirements. The
industrial information technology towards a subscription based or pay-per-use service business model known as
cloud computing. One of the advantage of cloud computing is cloud data storage, in which users do not have to
store his own data on their own servers [1], where instead their data will be stored on the cloud service
provider’s servers. For that reason users have to pay the service charge to service provider for this storage
service. This service does not provide only flexibility and scalability for the data storage it also provides
customers with the benefit of paying a charge only amount of data they need to store for particular time.To
access this cloud services security and reliability we are using different modules like: 1) Using single cloud
service provider. 2) Using multiple cloud service providers. The drawback of single cloud service provider is
that it can be easily hacked by any attacker. In multiple cloud service provider model gives better security and
availability of user private data.

Fig 1: Cloud Computing Architecture

||Issn 2250-3005 ||

||February||2014||

Page 66
Data Storage In Secured Multi-Cloud Storage…
Data integrity and privacy of the data are the most critical issues in cloud storage. For that reason cloud service
provider have standard techniques and hybrid model [4][3][5]. In this work we provide better privacy and
availability of user’s data can be achieved by dividing into block of data pieces and distributing them among the
cloud service provider’s in such way that for retrieving original data specific number of cloud service providers
are required.
Our proposed approach will provide the cloud computing users a decision model, That will
provide a better security by distributing data over multiple cloud service providers in such a manner, none of the
SP can successfully retrieve meaningful information from the data pieces allocated at their servers. Also in
addition, we may provide user with better assurance of availability of their data.

II.

BACKGROUND

We found these some existing system is related to our proposed system having their advantages and limitations.
From these we can say that our proposed system is better than existing one.
1

2

Existing System
Single Cloud Computing

Data
Storage
Cryptography.

only

i.

with

i.

Advantages
Availability of data is maintained.

Due to encryption and decryption
of data, confidentiality is achieved.

i.
ii.
i.
ii.

3

Data Storage
Networks.

Over

Untrusted

i.

If Attacker hacks any one network
still he does not retrieve any
meaningful data.

i.
ii.

Limitations
Require high cost.
Does not provide
flexibility and scalability.
Only cryptography does not
provide full security.
Cryptography does not provide
integrity and availability.
Secret key get be shared with
every user.
Losses of data.

In one of the above system we consider threat model which will losses data availability because of failure or
crash of server of cloud service provider which makes difficult for customer to retrieve his stored data on the
server [2]. Customer cannot depend on single cloud service provider to ensure the storage of confidential data.
For understanding this threat model we take example in Fig 1. Let us consider three customers (customer1,
customer2 and customer3) and stored their data on three different cloud service providers (CSP1, CSP2 and
CSP3) respectively. Each customer can retrieve his own data from the cloud service provider who it has dealing
with. If a failure occurs at CSP1, due to internal problem with the server all customer1 data which was stored on
CSP1’s servers will be lost and cannot be retrieved.

Fig. 3:CSP Failure

III.

SYSTEM OVERVIEW

In our system, we are considering 1] Customer (C1): The person who has some files to store on the
cloud (i.e. Cloud Server). 2] Cloud service provider (CSP): To manage Cloud Server, having considerable
storage space and to provide effective services for data storage and maintenance.The cloud service provider
priced to customers which is based on two factors, how much data is going to be stored on the cloud servers and
for how long time the data is to be stored. In our system, we consider that specific number cloud service
providers for data storage and retrieve. Hence, customer can store his private data on multiple clouds according
his budgets.
||Issn 2250-3005 ||

||February||2014||

Page 67
Data Storage In Secured Multi-Cloud Storage…

Fig 2: Data Storage And Retrieval

IV.

PROPOSED MODEL

In this system, we proposed distribution of user’s data among the available service providers in the
market, to provide all the cloud users with data availability as well as better security of data storage. In our
model, the customer divides his data among several CSP’s available in the market, based on user available
budget. Also we provide a choice for the customer, to choose different CSP. User may choose CSP to store or to
access the data.

Fig. 4:Multi-Cloud Storage in Cloud Computing
Our proposed approach provides a better security by distributing the data over multiple cloud service
providers in such a way that, none of the service provider can successfully retrieve meaningful data from the
data stored at their own servers and provides better availability of data. If any hacker hacks any of the network
still user can access his data by retrieving it from other cloud service providers.
3.1. Advantages
1) The system provides data Integrity, Availability, Confidentiality in short Security.
2) By using cryptography data is secured.
3) Less cost and cost based on client requirements.
4) Cloud data storage also redefines security issues targeted on customers outsourced data.
5) Easy to maintain large databases with security.
6) Avoid database losses.
3.2. Algorithms
The Algorithms to be used in our system:
1) Shamir Secret Sharing Algorithm
||Issn 2250-3005 ||

||February||2014||

Page 68
Data Storage In Secured Multi-Cloud Storage…
In cryptography, secret sharing refers to a method for distributing a ”secret” amongst a group of shares, each of
them gets allocated a share of the secret. The secret can be only reconstructed when the shares are combined
together; individual shares are of no use on their own. 2) Message Digest (MD5) This algorithm used for
checking integrity of retrieved data. It takes as input a message of arbitrary length and produces as output a 128
bit fingerprint or message digest of the input. It is conjectured, so it is computationally infeasible to produce two
messages having the same message digest intended, where such a large file should be compressed in a secure
manner before being encrypted with a private key under a public-key crypto-system.

V.

CONCLUSION

It is clear that although the use of cloud computing has rapidly increased, its security is still considered
the major issue in the cloud computing environment. The customers do not want to lose their private
information as a result of malicious insiders in the cloud. In addition, loss of service availability has caused
many problems for a large number of customers. Furthermore, data intrusion leads to many problems for the
users of cloud computing. The purpose of this work is to check the recent research on single clouds and multiclouds to address the security risks and solutions.

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]

P. Mell, T. Grance, ”Draft NIST working definition of cloud computing”, Referenced on June. 3rd, 2009, Online at
http://csrc.nist.gov/groups/SNS/cloud-computing/index.html, 2009.
N.Gruschka, M. Jensen, ”Attack surfaces: A taxonomy for attacks on cloud services”, Cloud Computing (CLOUD), 2010 IEEE 3rd
International Conference on, 5-10 July 2010.
J. Kincaid, ”MediaMax/TheLinkup Closes Its Doors”, Online at http://www.techcrunch.com/2008/-7/10/mediamaxthelinkupclosesitsdorrs/, July 2008.
B. Krebs, ”Payment Processor Breach May Be Largest Ever”,Online at payment processor breach may b.html, Jan, 2009
http://voices.washingtonpost.com/securityfix/2009/01/.
Amazon.com, ”Amazon s3 availablity event: July 20, 2008”, Online at http://status.aws.amazon.com/s3-20080720.html, 2008.
P. S. Browne, ”Data privacy and integrity: an overview”, In Proceeding of SIGFIDET 71 Proceedings of the ACM SIGFIDET (now
SIGMOD), 1971.
W. Itani, A. Kayssi, A. Chehab, ”Privacy as a Service: Privacy- Aware Data Storage and Processing in Cloud Computing
Architectures,” Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, Dec 2009.
M. Dijk, A. Juels, ”On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing”, HotSec 2010.
P. F. Oliveira, L. Lima, T. T. V. Vinhoza, J. Barros, M. Medard ”Trusted storage over untrusted networks”, IEEE GLOBECOM 2010,
Miami, FL. USA.

||Issn 2250-3005 ||

||February||2014||

Page 69

Contenu connexe

Tendances

ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...pharmaindexing
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
data storage security technique for cloud computing
data storage security technique for cloud computingdata storage security technique for cloud computing
data storage security technique for cloud computinghasimshah
 
MCDB: Multi Cloud Database Model
MCDB: Multi Cloud Database ModelMCDB: Multi Cloud Database Model
MCDB: Multi Cloud Database Modelathulya_raj
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Editor IJARCET
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Shakas Technologies
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlijdpsjournal
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
 
Research Design Report Tagore
Research Design Report TagoreResearch Design Report Tagore
Research Design Report TagoreVinoth Kanna
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...IJECEIAES
 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...IJCSIS Research Publications
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computingGopinath Muthusamy
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 

Tendances (18)

ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
data storage security technique for cloud computing
data storage security technique for cloud computingdata storage security technique for cloud computing
data storage security technique for cloud computing
 
MCDB: Multi Cloud Database Model
MCDB: Multi Cloud Database ModelMCDB: Multi Cloud Database Model
MCDB: Multi Cloud Database Model
 
Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235Ijarcet vol-2-issue-7-2232-2235
Ijarcet vol-2-issue-7-2232-2235
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
Research Design Report Tagore
Research Design Report TagoreResearch Design Report Tagore
Research Design Report Tagore
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
 
Attaining data security in cloud computing
Attaining data security in cloud computingAttaining data security in cloud computing
Attaining data security in cloud computing
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 

En vedette

Achieving effective cloud search services multi keyword ranked search over en...
Achieving effective cloud search services multi keyword ranked search over en...Achieving effective cloud search services multi keyword ranked search over en...
Achieving effective cloud search services multi keyword ranked search over en...ieeepondy
 
privacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataprivacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataswathi78
 
Qos aware data replication for data-intensive applications in cloud computing...
Qos aware data replication for data-intensive applications in cloud computing...Qos aware data replication for data-intensive applications in cloud computing...
Qos aware data replication for data-intensive applications in cloud computing...Papitha Velumani
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPapitha Velumani
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED MOBILE CLOUD D...
ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED MOBILE  CLOUD D...ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED MOBILE  CLOUD D...
ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED MOBILE CLOUD D...I3E Technologies
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...redpel dot com
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPapitha Velumani
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPapitha Velumani
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataNexgen Technology
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataIGEEKS TECHNOLOGIES
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...Nexgen Technology
 

En vedette (14)

Sub1522
Sub1522Sub1522
Sub1522
 
Achieving effective cloud search services multi keyword ranked search over en...
Achieving effective cloud search services multi keyword ranked search over en...Achieving effective cloud search services multi keyword ranked search over en...
Achieving effective cloud search services multi keyword ranked search over en...
 
privacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud dataprivacy preserving multi keyword ranked search over encrypted cloud data
privacy preserving multi keyword ranked search over encrypted cloud data
 
Qos aware data replication for data-intensive applications in cloud computing...
Qos aware data replication for data-intensive applications in cloud computing...Qos aware data replication for data-intensive applications in cloud computing...
Qos aware data replication for data-intensive applications in cloud computing...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED MOBILE CLOUD D...
ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED MOBILE  CLOUD D...ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED MOBILE  CLOUD D...
ENABLING EFFICIENT MULTI-KEYWORD RANKED SEARCH OVER ENCRYPTED MOBILE CLOUD D...
 
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
Enabling efficient multi keyword ranked search over encrypted mobile cloud da...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD... A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
A SECURE AND DYNAMIC MULTI-KEYWORD RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD...
 
Sub14405
Sub14405Sub14405
Sub14405
 

Similaire à Data Storage in Secured Multi-Cloud Storage Model

Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureeSAT Journals
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with siceSAT Publishing House
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computingSonali Jain
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Journals
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewSecurity Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewEswar Publications
 

Similaire à Data Storage in Secured Multi-Cloud Storage Model (20)

Security in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architectureSecurity in multi cloud data storage with sic architecture
Security in multi cloud data storage with sic architecture
 
Security in multi cloud data storage with sic
Security in multi cloud data storage with sicSecurity in multi cloud data storage with sic
Security in multi cloud data storage with sic
 
G033030035
G033030035G033030035
G033030035
 
Gf2511301134
Gf2511301134Gf2511301134
Gf2511301134
 
Gf2511301134
Gf2511301134Gf2511301134
Gf2511301134
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
C017421624
C017421624C017421624
C017421624
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Dn35636640
Dn35636640Dn35636640
Dn35636640
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
Security Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A ReviewSecurity Issues in Cloud Computing - A Review
Security Issues in Cloud Computing - A Review
 

Dernier

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Dernier (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Data Storage in Secured Multi-Cloud Storage Model

  • 1. International Journal of Computational Engineering Research||Vol, 04||Issue, 2|| Data Storage in Secured Multi-Cloud Storage in Cloud Computing Archana Waghmare1, Rahul Patil2, Pramod Mane3, Shruti Bhosale4. 1, 2,3,4 S.V.P.M’s COE Malegaon(Bk). Department Of Computer Engg. ABSTRACT Now a day even though Cloud services offer flexibility, scalability, there have been proportionate concerns about security. As more data moves from centrally located server storage to the cloud storage. Security is the most important factor related to the cloud computing. As the users can stores his private data on cloud with the help of cloud service providers. Data stored on single cloud is risk of service availability failure due to attacker enters in single cloud.Our approach is to movement towards multi-clouds that is data stored on multi-cloud service providers. In this system we propose a secured cost-effective multi-cloud storage (SCMCS) model in cloud computing in which holds an economical distribution of data among the available cloud service provider (SP) in the market, instead of single cloud to provide the customers with advanced data availability as well as security. This work aims to encourage the use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user. Our proposed model provides a better security for customer’s data according to their available budgets from that they can choose cloud service provider. KEYWORDS: Cloud Networks , Service provider ,Multi- Cloud Storage ,Security, Cloud Services, Cloud Computing. I. INTRODUCTION Cloud computing is nothing but rate server and internet based model .A huge amount of data being retrieved from geographically distributed data sources and non localized data handling requirements. The industrial information technology towards a subscription based or pay-per-use service business model known as cloud computing. One of the advantage of cloud computing is cloud data storage, in which users do not have to store his own data on their own servers [1], where instead their data will be stored on the cloud service provider’s servers. For that reason users have to pay the service charge to service provider for this storage service. This service does not provide only flexibility and scalability for the data storage it also provides customers with the benefit of paying a charge only amount of data they need to store for particular time.To access this cloud services security and reliability we are using different modules like: 1) Using single cloud service provider. 2) Using multiple cloud service providers. The drawback of single cloud service provider is that it can be easily hacked by any attacker. In multiple cloud service provider model gives better security and availability of user private data. Fig 1: Cloud Computing Architecture ||Issn 2250-3005 || ||February||2014|| Page 66
  • 2. Data Storage In Secured Multi-Cloud Storage… Data integrity and privacy of the data are the most critical issues in cloud storage. For that reason cloud service provider have standard techniques and hybrid model [4][3][5]. In this work we provide better privacy and availability of user’s data can be achieved by dividing into block of data pieces and distributing them among the cloud service provider’s in such way that for retrieving original data specific number of cloud service providers are required. Our proposed approach will provide the cloud computing users a decision model, That will provide a better security by distributing data over multiple cloud service providers in such a manner, none of the SP can successfully retrieve meaningful information from the data pieces allocated at their servers. Also in addition, we may provide user with better assurance of availability of their data. II. BACKGROUND We found these some existing system is related to our proposed system having their advantages and limitations. From these we can say that our proposed system is better than existing one. 1 2 Existing System Single Cloud Computing Data Storage Cryptography. only i. with i. Advantages Availability of data is maintained. Due to encryption and decryption of data, confidentiality is achieved. i. ii. i. ii. 3 Data Storage Networks. Over Untrusted i. If Attacker hacks any one network still he does not retrieve any meaningful data. i. ii. Limitations Require high cost. Does not provide flexibility and scalability. Only cryptography does not provide full security. Cryptography does not provide integrity and availability. Secret key get be shared with every user. Losses of data. In one of the above system we consider threat model which will losses data availability because of failure or crash of server of cloud service provider which makes difficult for customer to retrieve his stored data on the server [2]. Customer cannot depend on single cloud service provider to ensure the storage of confidential data. For understanding this threat model we take example in Fig 1. Let us consider three customers (customer1, customer2 and customer3) and stored their data on three different cloud service providers (CSP1, CSP2 and CSP3) respectively. Each customer can retrieve his own data from the cloud service provider who it has dealing with. If a failure occurs at CSP1, due to internal problem with the server all customer1 data which was stored on CSP1’s servers will be lost and cannot be retrieved. Fig. 3:CSP Failure III. SYSTEM OVERVIEW In our system, we are considering 1] Customer (C1): The person who has some files to store on the cloud (i.e. Cloud Server). 2] Cloud service provider (CSP): To manage Cloud Server, having considerable storage space and to provide effective services for data storage and maintenance.The cloud service provider priced to customers which is based on two factors, how much data is going to be stored on the cloud servers and for how long time the data is to be stored. In our system, we consider that specific number cloud service providers for data storage and retrieve. Hence, customer can store his private data on multiple clouds according his budgets. ||Issn 2250-3005 || ||February||2014|| Page 67
  • 3. Data Storage In Secured Multi-Cloud Storage… Fig 2: Data Storage And Retrieval IV. PROPOSED MODEL In this system, we proposed distribution of user’s data among the available service providers in the market, to provide all the cloud users with data availability as well as better security of data storage. In our model, the customer divides his data among several CSP’s available in the market, based on user available budget. Also we provide a choice for the customer, to choose different CSP. User may choose CSP to store or to access the data. Fig. 4:Multi-Cloud Storage in Cloud Computing Our proposed approach provides a better security by distributing the data over multiple cloud service providers in such a way that, none of the service provider can successfully retrieve meaningful data from the data stored at their own servers and provides better availability of data. If any hacker hacks any of the network still user can access his data by retrieving it from other cloud service providers. 3.1. Advantages 1) The system provides data Integrity, Availability, Confidentiality in short Security. 2) By using cryptography data is secured. 3) Less cost and cost based on client requirements. 4) Cloud data storage also redefines security issues targeted on customers outsourced data. 5) Easy to maintain large databases with security. 6) Avoid database losses. 3.2. Algorithms The Algorithms to be used in our system: 1) Shamir Secret Sharing Algorithm ||Issn 2250-3005 || ||February||2014|| Page 68
  • 4. Data Storage In Secured Multi-Cloud Storage… In cryptography, secret sharing refers to a method for distributing a ”secret” amongst a group of shares, each of them gets allocated a share of the secret. The secret can be only reconstructed when the shares are combined together; individual shares are of no use on their own. 2) Message Digest (MD5) This algorithm used for checking integrity of retrieved data. It takes as input a message of arbitrary length and produces as output a 128 bit fingerprint or message digest of the input. It is conjectured, so it is computationally infeasible to produce two messages having the same message digest intended, where such a large file should be compressed in a secure manner before being encrypted with a private key under a public-key crypto-system. V. CONCLUSION It is clear that although the use of cloud computing has rapidly increased, its security is still considered the major issue in the cloud computing environment. The customers do not want to lose their private information as a result of malicious insiders in the cloud. In addition, loss of service availability has caused many problems for a large number of customers. Furthermore, data intrusion leads to many problems for the users of cloud computing. The purpose of this work is to check the recent research on single clouds and multiclouds to address the security risks and solutions. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] P. Mell, T. Grance, ”Draft NIST working definition of cloud computing”, Referenced on June. 3rd, 2009, Online at http://csrc.nist.gov/groups/SNS/cloud-computing/index.html, 2009. N.Gruschka, M. Jensen, ”Attack surfaces: A taxonomy for attacks on cloud services”, Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, 5-10 July 2010. J. Kincaid, ”MediaMax/TheLinkup Closes Its Doors”, Online at http://www.techcrunch.com/2008/-7/10/mediamaxthelinkupclosesitsdorrs/, July 2008. B. Krebs, ”Payment Processor Breach May Be Largest Ever”,Online at payment processor breach may b.html, Jan, 2009 http://voices.washingtonpost.com/securityfix/2009/01/. Amazon.com, ”Amazon s3 availablity event: July 20, 2008”, Online at http://status.aws.amazon.com/s3-20080720.html, 2008. P. S. Browne, ”Data privacy and integrity: an overview”, In Proceeding of SIGFIDET 71 Proceedings of the ACM SIGFIDET (now SIGMOD), 1971. W. Itani, A. Kayssi, A. Chehab, ”Privacy as a Service: Privacy- Aware Data Storage and Processing in Cloud Computing Architectures,” Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, Dec 2009. M. Dijk, A. Juels, ”On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing”, HotSec 2010. P. F. Oliveira, L. Lima, T. T. V. Vinhoza, J. Barros, M. Medard ”Trusted storage over untrusted networks”, IEEE GLOBECOM 2010, Miami, FL. USA. ||Issn 2250-3005 || ||February||2014|| Page 69