SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul – Aug. 2013 pp-2498-2501 ISSN: 2249-6645
www.ijmer.com 2498 | Page
Bhagya Lakshmi Nandipati1
, G. Sridevi2
1
M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India
2
Assoc. Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India
Abstract: Cloud computing is the term given to the use of several server computers via a digital network as if they were one
computer. The ‘Cloud’ itself is a virtualization of various resources such as networks, servers, applications, data storage
and services – which the end user has on-demand access to. Cloud computing services are divided into three types,
according to the abstraction level of the capability provided and the service model of providers, namely: Infrastructure as a
service(IaaS), Platform as a service(PaaS) and Software as a service(SaaS). This paper proposes a novel cloud computing
paradigm, data protection as a service (DPaaS). DPaaS is a suite of security primitives offered by a cloud computing
platform, which enforces data security and privacy and offers evidence of privacy to data owners, even in the presence of
potentially compromised or malicious applications.
Keywords: Auditing, Cloud, Data protection, Service.
I. INTRODUCTION
Now minute and average business organizations are realizing that simply exchange to the cloud can get access to
excellent business claims and increase up their infrastructure assets in a very low cost, Internet on an as-needed basis [1].
This new and exciting paradigm has generated significant interest in both the marketplace and the academic world [2],
resulting in a number of notable commercial and individual cloud computing services, e.g., form Amazon, Google,
Microsoft, Yahoo, and Sales force [3]. Also, top database vendors, like Oracle, are adding cloud environment support to their
databases. The providers are enjoying the superficial opportunity in the marketplace but they should ensure that they possess
the right security features. The cloud computing provide facilities like fast development, lower cost on pay-for-use, quick
flexibility, quick provisioning, everywhere network contact, hypervisor defense against network vulnerability, economical
failure recovery and data storage solution, on-request security checks, synchronized detection of system altering and rapid
re-construction of services. The cloud environment provides this compensation, until some of the risks are better understood.
The basic concept of the cloud computing, based on the services they offer, from application service provisioning,
grid and service computing, to Software as a Service [4][5]. Despite of the specific architecture, the dominant concept of this
cloud computing model is that customers‘ data, which can be of individuals, organizations or enterprises, is processed
remotely in unknown machines about which the user not aware. The ease and efficiency of this approach, however, comes
with both privacy and security risks [6]. Secrecy of data is the main hurdle in implementation of cloud services. A huge data
centers are established in cloud computing environment, but the deployment of data and services are not trustworthy. These
create different new security challenges. These challenges are vulnerabilities in accessibility, web and virtualization, such as
SQL injection, cross site scripting, physical access issues, privacy and control issues happening from third parties having
physical control of data, issues related to identity and credential , data loss and theft, issues related to data confirmation,
changing and privacy, issues related to integrity and IP spoofing.
II. CLOUD COMPUTING SERVICE MODELS
There are three primary classes of cloud computing service models (Figure 1):
A. Infrastructure as a Service (IaaS)
A cloud based virtual server providing networking and mass storage services and other infrastructure services. The
user does not manage or control the data centre but may have control over the data or operating systems placed into the
infrastructure. For example, Amazon web service (AWS).
B. Platform as a Service (PaaS)
It is the service level where a computable platform upon which the user can host and develop applications and
services by using programming language and API‘s37 is provided. The user can control the deployed applications and
sometimes the application-hosting environment as well. However, the infrastructure (servers, OS, storage) is still in the
control of the cloud provider. Examples include Windows Azure and Google App engine.
A Novel Computing Paradigm for Data Protection in
Cloud Computing
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul – Aug. 2013 pp-2498-2501 ISSN: 2249-6645
www.ijmer.com 2499 | Page
Figure 1: Cloud Computing Architecture
C. Software as a Service (SaaS)
In SaaS, applications are running on a cloud infrastructure or platform which is accessible via a thin client interface
(browser) or program interface. The user only has the possibility to manage some user specific settings, because the provider
does not accommodate cloud features; they only provide applications running ‗in the cloud‘. SaaS is an alternative to having
the software running on local machines and good examples are online office applications (Google Docs), online CRM
systems (SalesForce CRM), webmail (Google Mail) and Social Network Sites (Twitter, Facebook).
III. DATA PROTECTION AS A SERVICE
For organizations embarking on cloud computing environment, storage management is extremely important. To
avoid loss, the cloud computing system must provide data protection and resiliency. If loss does occur, the computing
environment must be able to recover the data quickly in order to restore access to the cloud services. This need is equally
true whether the cloud computing environment is private, public or hybrid. It is possible to obtain data storage and protection
services from the companies that specialize in storage, and many organizations that handle their own computing and
applications choose this option for outsourcing storage. When outsourcing applications, however, an organization should
never assume that the service provider includes storage management, data protection or disaster recovery among its
services—not all of them do. It is therefore important to ensure from the beginning that the service provider delivers the
necessary data storage and protection services, and to be familiar with the technologies and products used for storage
management in the cloud environment. To ensure a practical solution, we considered the following goals relating to data
protection in cloud.
 Integrity: The customer‘s stored data won‘t be corrupted.
 Privacy: Secret data won‘t be leaked to any unauthorized entity.
 Access transparency: Logs will clearly indicate who or what accessed any type of data.
 Ease of verification: Customers will be able to easily verify what platform or application code is running, as well as
whether the cloud has strictly enforced their data‘s privacy policies.
 Rich computation: The cloud platform will allow efficient, rich computations on sensitive user data.
 Development and maintenance support: Because they face a long list of challenges—bugs to find and fix, frequent
software upgrades, continuous usage pattern changes, and customer demand for high performance— developers will
receive both development and maintenance support.
IV. DAAS ARCHITECTURE
Figure 2 shows architecture to explore the design space of Data Protection as a Service [7].
Figure 2: DPaaS Architecture
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul – Aug. 2013 pp-2498-2501 ISSN: 2249-6645
www.ijmer.com 2500 | Page
A. Lightweight Confinement
A Secure Data Capsule (SDC) is an enciphered data unit packaged with its security policy, e.g., Access Control List
(ACL). To avoid unauthorized leakage of customer‘s data in the presence of potentially buggy or compromised applications,
we confine the execution of various applications to mutually isolated environments, henceforth referred to as Secure
Execution Environments (SEEs). There are different levels of inter-SEE isolation we could impose; stronger isolation in
general exacts the greater performance cost due to context switching and data marshalling. At one end, a SEE could be a
virtual machine with an output channel back to the requesting customer. In other words, the thread pool of the traditional
server would be replaced with a pool of VMs or containers, whose data state is reset before being loaded with a new data
unit.
B. Sharing and authorization
It is a basic requirement of our target applications that units of data that should be sharable; that is why SDCs are
bound to a full ACL versus a particular customer. The key to enforcing those ACLs is that we can control the Input/Output
channels available to SEEs. To confine data, we mandate that the data in an SDC is deciphered by the platform only for an
SEE, and even then, only at an authorized user‘s request. The output may be funneled either directly to the customer or to
another SEE which provides a service; in either case, the channel is mediated by the platform.
C. Auditor and Data Access Auditing
The auditor is one who audits the overall performance of the computing system. The auditor can track the
transactions and logins of users with correct time and date. Here auditor is software component that is capable of tracking the
transactions. Cloud storage offers movement of data into the cloud. It has great convenience to the customer because users
can store their data in the cloud safely without the knowledge about the storage space. Since the platform mediates all access
to the data, authenticates customers, and runs binaries, it knows what data is being accessed, by what user, and using which
application. It can generate meaningful audit log files containing all these parameters and optionally incorporate additional
information from the application layer. There are four basic types of actions we can log:
 Ordinary online data accesses occur in response to external requests from customers, and take place when a user is online
and using an application.
 Access control modification by authorized customers. Knowing the provenance of these changes can be helpful for
diagnosing or forensics sharing problems.
 Batch/offline access to handle requests while users are offline (e.g., e-mail delivery), to compute aggregates, or to
reorganize data such as during schema changes.
 Administrative access for maintenance operations like debugging.
D. Key Management
The concept of key come from the branch of science called ―cryptography‖. There are basically two kinds of keys.
 Public key
 Private key
A public key known to everyone and a private or shared secret key known only to the recipient of the message.
When Alice wants to send a secure message to Bob, he uses Jane's public key to encrypt the message. Bob then uses her
private key to decrypt it. In our system we encrypt the file using a key and stored in the cloud. The user should enter the key
in order to decrypt the file. So multiple protection schemes are used here for protecting the files in the cloud.
E. Authorization for Debugging, Maintenance, and Batch Access
While ordinary customer access is governed by the ACL on the data, administrative access needs its own separate
policy. That in turn can be audited to hold developers as well as administrators accountable. Each specific invocation of the
administrative policy, because it may entail user access to data for, e.g., debugging or account recovery, should be logged
and made available for auditing. The same kind of mechanism would be used for batch access, with perhaps different
logging granularity; and to prevent misuse, the code for the batch process can be restricted only to an approved set. That
might mean requiring controlled or quantifiable information release, such as differential privacy [8] or quantitative
information flow [9].
F. Verifiability of the Platform
The DPaaS paradigm provides logging and auditing at the platform level, sharing the benefits with all applications
running on top. Offline, the auditor can verify that the paradigm implements each data protection feature as promised. At
runtime, the platform provider can use trusted computing (TC) technologies to attest to the particular software that is
running. Trusted computing uses the tamperproof TPM as well as the virtualization and isolation features of modern
processors, such as Intel VT or AMDV.
V. CONCLUSION
Cloud computing environment enables highly scalable services to be easily consumed over the Internet on an as-
needed basis. A major feature of the cloud computing services is that customers‘ data are usually processed remotely in
unknown machines that users do not own or operate. Offering strong data protection to cloud customers while enabling rich
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul – Aug. 2013 pp-2498-2501 ISSN: 2249-6645
www.ijmer.com 2501 | Page
applications is a challenging task. We explore a novel cloud platform architecture called Data Protection as a Service, which
dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid
development and maintenance.
REFERENCES
[1] T. Mather, S. Kumaraswamy, and S. Litif, Cloud Security and Privacy: An enterprise perspectives on Risks and Compliance
(Theory in Practice ). O' Reilly, 2009.
[2] IEEE International Conference on Cloud Computing. 2009.
[3] P.T.Jaeger, J.Lin, and M. grimes, Cloud computing and information policy: Computing in a policy cloud? Journal of Information
Technology and politics, 2009.
[4] Cloud Computing: Clash of the clouds. the economist., 2009.
[5] B.P.Rimal, E.Choi, and I.Lumb. A taxonomy and survey of Cloud Computing Systems. in Networked Computing and Advanced
Information Management, International Conference. 2009.
[6] B.R. Kandukuri, R.P.V., and A. Rakshit. Cloud security issues. in IEEE International Conference on Services Computing (SCC).
2009.
[7] P. Maniatis, D. Akhawe, K. Fall, E. Shi, S. McCamant, and D. Song. Do You Know Where Your Data Are? Secure Data Capsules
for Deployable Data Protection. In HotOS, 2011.
[8] C. Dwork, ―The Differential Privacy Frontier Extended Abstract,‖ Proc. 6th Theory of Cryptography Conf. (TCC 09), LNCS 5444,
Springer, 2009, pp. 496-502.
[9] S. McCamant and M. D. Ernst. Quantitative information flow as network flow capacity. In PLDI, pages 193–205, 2008.

Contenu connexe

Tendances

Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architectureeSAT Journals
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Editor IJARCET
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menaceeSAT Publishing House
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Servicesijtsrd
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelscloudresearcher
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniqueseSAT Publishing House
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Zuhair Haroon khan
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 

Tendances (18)

Overview of cloud computing architecture
Overview of cloud computing architectureOverview of cloud computing architecture
Overview of cloud computing architecture
 
H046053944
H046053944H046053944
H046053944
 
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud ComputingAddressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131Ijarcet vol-2-issue-3-1128-1131
Ijarcet vol-2-issue-3-1128-1131
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Cloud Computing Basics Features and Services
Cloud Computing Basics Features and ServicesCloud Computing Basics Features and Services
Cloud Computing Basics Features and Services
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 

En vedette

Effect of Preform Geometry on the Material Behaviour and the Densification Me...
Effect of Preform Geometry on the Material Behaviour and the Densification Me...Effect of Preform Geometry on the Material Behaviour and the Densification Me...
Effect of Preform Geometry on the Material Behaviour and the Densification Me...IJMER
 
Marketing a small business
Marketing a small businessMarketing a small business
Marketing a small businessdenise2228
 
How to write articles easily
How to write articles easilyHow to write articles easily
How to write articles easilydenise2228
 
Internet leads
Internet leadsInternet leads
Internet leadsdenise2228
 
Design, Simulation and Implementation of Flyback based, True Single Stage, Is...
Design, Simulation and Implementation of Flyback based, True Single Stage, Is...Design, Simulation and Implementation of Flyback based, True Single Stage, Is...
Design, Simulation and Implementation of Flyback based, True Single Stage, Is...IJMER
 
Conservation of Energy: a Case Study on Energy Conservation in Campus Lightin...
Conservation of Energy: a Case Study on Energy Conservation in Campus Lightin...Conservation of Energy: a Case Study on Energy Conservation in Campus Lightin...
Conservation of Energy: a Case Study on Energy Conservation in Campus Lightin...IJMER
 
Deconstructing hollyoaks later
Deconstructing hollyoaks laterDeconstructing hollyoaks later
Deconstructing hollyoaks lateraq111969bethany
 
Implementation of Multiple Touch Gesture Using Depth Information
Implementation of Multiple Touch Gesture Using Depth InformationImplementation of Multiple Touch Gesture Using Depth Information
Implementation of Multiple Touch Gesture Using Depth InformationIJMER
 
The fall of the second babylon
The fall of the second babylonThe fall of the second babylon
The fall of the second babylonRobert Taylor
 
Solar Chimney Power Plant-A Review
Solar Chimney Power Plant-A ReviewSolar Chimney Power Plant-A Review
Solar Chimney Power Plant-A ReviewIJMER
 
An insight on transparent antennas
An insight on transparent antennasAn insight on transparent antennas
An insight on transparent antennasIJMER
 
A044010114
A044010114A044010114
A044010114IJMER
 
Effects of Continuous Cooling On Impact and Micro Structural Properties of Lo...
Effects of Continuous Cooling On Impact and Micro Structural Properties of Lo...Effects of Continuous Cooling On Impact and Micro Structural Properties of Lo...
Effects of Continuous Cooling On Impact and Micro Structural Properties of Lo...IJMER
 
Writing for pr #2
Writing for pr #2Writing for pr #2
Writing for pr #2Dicky Ahmad
 
Effect Of Water On Slope Stability And Investigation Of ΝΝw Drainage Techniqu...
Effect Of Water On Slope Stability And Investigation Of ΝΝw Drainage Techniqu...Effect Of Water On Slope Stability And Investigation Of ΝΝw Drainage Techniqu...
Effect Of Water On Slope Stability And Investigation Of ΝΝw Drainage Techniqu...IJMER
 
Customized IVR Implementation Using Voicexml on SIP (Voip) Communication Plat...
Customized IVR Implementation Using Voicexml on SIP (Voip) Communication Plat...Customized IVR Implementation Using Voicexml on SIP (Voip) Communication Plat...
Customized IVR Implementation Using Voicexml on SIP (Voip) Communication Plat...IJMER
 
Ap2419031907
Ap2419031907Ap2419031907
Ap2419031907IJMER
 
User Navigation Pattern Prediction from Web Log Data: A Survey
User Navigation Pattern Prediction from Web Log Data:  A SurveyUser Navigation Pattern Prediction from Web Log Data:  A Survey
User Navigation Pattern Prediction from Web Log Data: A SurveyIJMER
 
Does risk reversal work
Does risk reversal workDoes risk reversal work
Does risk reversal workdenise2228
 
My adventure with WebSockets
My adventure with WebSocketsMy adventure with WebSockets
My adventure with WebSocketsMichiel De Mey
 

En vedette (20)

Effect of Preform Geometry on the Material Behaviour and the Densification Me...
Effect of Preform Geometry on the Material Behaviour and the Densification Me...Effect of Preform Geometry on the Material Behaviour and the Densification Me...
Effect of Preform Geometry on the Material Behaviour and the Densification Me...
 
Marketing a small business
Marketing a small businessMarketing a small business
Marketing a small business
 
How to write articles easily
How to write articles easilyHow to write articles easily
How to write articles easily
 
Internet leads
Internet leadsInternet leads
Internet leads
 
Design, Simulation and Implementation of Flyback based, True Single Stage, Is...
Design, Simulation and Implementation of Flyback based, True Single Stage, Is...Design, Simulation and Implementation of Flyback based, True Single Stage, Is...
Design, Simulation and Implementation of Flyback based, True Single Stage, Is...
 
Conservation of Energy: a Case Study on Energy Conservation in Campus Lightin...
Conservation of Energy: a Case Study on Energy Conservation in Campus Lightin...Conservation of Energy: a Case Study on Energy Conservation in Campus Lightin...
Conservation of Energy: a Case Study on Energy Conservation in Campus Lightin...
 
Deconstructing hollyoaks later
Deconstructing hollyoaks laterDeconstructing hollyoaks later
Deconstructing hollyoaks later
 
Implementation of Multiple Touch Gesture Using Depth Information
Implementation of Multiple Touch Gesture Using Depth InformationImplementation of Multiple Touch Gesture Using Depth Information
Implementation of Multiple Touch Gesture Using Depth Information
 
The fall of the second babylon
The fall of the second babylonThe fall of the second babylon
The fall of the second babylon
 
Solar Chimney Power Plant-A Review
Solar Chimney Power Plant-A ReviewSolar Chimney Power Plant-A Review
Solar Chimney Power Plant-A Review
 
An insight on transparent antennas
An insight on transparent antennasAn insight on transparent antennas
An insight on transparent antennas
 
A044010114
A044010114A044010114
A044010114
 
Effects of Continuous Cooling On Impact and Micro Structural Properties of Lo...
Effects of Continuous Cooling On Impact and Micro Structural Properties of Lo...Effects of Continuous Cooling On Impact and Micro Structural Properties of Lo...
Effects of Continuous Cooling On Impact and Micro Structural Properties of Lo...
 
Writing for pr #2
Writing for pr #2Writing for pr #2
Writing for pr #2
 
Effect Of Water On Slope Stability And Investigation Of ΝΝw Drainage Techniqu...
Effect Of Water On Slope Stability And Investigation Of ΝΝw Drainage Techniqu...Effect Of Water On Slope Stability And Investigation Of ΝΝw Drainage Techniqu...
Effect Of Water On Slope Stability And Investigation Of ΝΝw Drainage Techniqu...
 
Customized IVR Implementation Using Voicexml on SIP (Voip) Communication Plat...
Customized IVR Implementation Using Voicexml on SIP (Voip) Communication Plat...Customized IVR Implementation Using Voicexml on SIP (Voip) Communication Plat...
Customized IVR Implementation Using Voicexml on SIP (Voip) Communication Plat...
 
Ap2419031907
Ap2419031907Ap2419031907
Ap2419031907
 
User Navigation Pattern Prediction from Web Log Data: A Survey
User Navigation Pattern Prediction from Web Log Data:  A SurveyUser Navigation Pattern Prediction from Web Log Data:  A Survey
User Navigation Pattern Prediction from Web Log Data: A Survey
 
Does risk reversal work
Does risk reversal workDoes risk reversal work
Does risk reversal work
 
My adventure with WebSockets
My adventure with WebSocketsMy adventure with WebSockets
My adventure with WebSockets
 

Similaire à A Novel Computing Paradigm for Data Protection in Cloud Computing

An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
AI for cloud computing A strategic guide.pdf
AI for cloud computing A strategic guide.pdfAI for cloud computing A strategic guide.pdf
AI for cloud computing A strategic guide.pdfChristopherTHyatt
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computingijsrd.com
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...IIJSRJournal
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computingPuneet Arora
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGEr Piyush Gupta IN ⊞⌘
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingJahangeer Qadiree
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
Fault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud ComputingFault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud ComputingCaner KAYA
 

Similaire à A Novel Computing Paradigm for Data Protection in Cloud Computing (20)

An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
G0314043
G0314043G0314043
G0314043
 
AI for cloud computing A strategic guide.pdf
AI for cloud computing A strategic guide.pdfAI for cloud computing A strategic guide.pdf
AI for cloud computing A strategic guide.pdf
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Security threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computingSecurity threat issues and countermeasures in cloud computing
Security threat issues and countermeasures in cloud computing
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
Fault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud ComputingFault Tolerance in AWS Distributed Cloud Computing
Fault Tolerance in AWS Distributed Cloud Computing
 

Plus de IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

Plus de IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

A Novel Computing Paradigm for Data Protection in Cloud Computing

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul – Aug. 2013 pp-2498-2501 ISSN: 2249-6645 www.ijmer.com 2498 | Page Bhagya Lakshmi Nandipati1 , G. Sridevi2 1 M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India 2 Assoc. Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India Abstract: Cloud computing is the term given to the use of several server computers via a digital network as if they were one computer. The ‘Cloud’ itself is a virtualization of various resources such as networks, servers, applications, data storage and services – which the end user has on-demand access to. Cloud computing services are divided into three types, according to the abstraction level of the capability provided and the service model of providers, namely: Infrastructure as a service(IaaS), Platform as a service(PaaS) and Software as a service(SaaS). This paper proposes a novel cloud computing paradigm, data protection as a service (DPaaS). DPaaS is a suite of security primitives offered by a cloud computing platform, which enforces data security and privacy and offers evidence of privacy to data owners, even in the presence of potentially compromised or malicious applications. Keywords: Auditing, Cloud, Data protection, Service. I. INTRODUCTION Now minute and average business organizations are realizing that simply exchange to the cloud can get access to excellent business claims and increase up their infrastructure assets in a very low cost, Internet on an as-needed basis [1]. This new and exciting paradigm has generated significant interest in both the marketplace and the academic world [2], resulting in a number of notable commercial and individual cloud computing services, e.g., form Amazon, Google, Microsoft, Yahoo, and Sales force [3]. Also, top database vendors, like Oracle, are adding cloud environment support to their databases. The providers are enjoying the superficial opportunity in the marketplace but they should ensure that they possess the right security features. The cloud computing provide facilities like fast development, lower cost on pay-for-use, quick flexibility, quick provisioning, everywhere network contact, hypervisor defense against network vulnerability, economical failure recovery and data storage solution, on-request security checks, synchronized detection of system altering and rapid re-construction of services. The cloud environment provides this compensation, until some of the risks are better understood. The basic concept of the cloud computing, based on the services they offer, from application service provisioning, grid and service computing, to Software as a Service [4][5]. Despite of the specific architecture, the dominant concept of this cloud computing model is that customers‘ data, which can be of individuals, organizations or enterprises, is processed remotely in unknown machines about which the user not aware. The ease and efficiency of this approach, however, comes with both privacy and security risks [6]. Secrecy of data is the main hurdle in implementation of cloud services. A huge data centers are established in cloud computing environment, but the deployment of data and services are not trustworthy. These create different new security challenges. These challenges are vulnerabilities in accessibility, web and virtualization, such as SQL injection, cross site scripting, physical access issues, privacy and control issues happening from third parties having physical control of data, issues related to identity and credential , data loss and theft, issues related to data confirmation, changing and privacy, issues related to integrity and IP spoofing. II. CLOUD COMPUTING SERVICE MODELS There are three primary classes of cloud computing service models (Figure 1): A. Infrastructure as a Service (IaaS) A cloud based virtual server providing networking and mass storage services and other infrastructure services. The user does not manage or control the data centre but may have control over the data or operating systems placed into the infrastructure. For example, Amazon web service (AWS). B. Platform as a Service (PaaS) It is the service level where a computable platform upon which the user can host and develop applications and services by using programming language and API‘s37 is provided. The user can control the deployed applications and sometimes the application-hosting environment as well. However, the infrastructure (servers, OS, storage) is still in the control of the cloud provider. Examples include Windows Azure and Google App engine. A Novel Computing Paradigm for Data Protection in Cloud Computing
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul – Aug. 2013 pp-2498-2501 ISSN: 2249-6645 www.ijmer.com 2499 | Page Figure 1: Cloud Computing Architecture C. Software as a Service (SaaS) In SaaS, applications are running on a cloud infrastructure or platform which is accessible via a thin client interface (browser) or program interface. The user only has the possibility to manage some user specific settings, because the provider does not accommodate cloud features; they only provide applications running ‗in the cloud‘. SaaS is an alternative to having the software running on local machines and good examples are online office applications (Google Docs), online CRM systems (SalesForce CRM), webmail (Google Mail) and Social Network Sites (Twitter, Facebook). III. DATA PROTECTION AS A SERVICE For organizations embarking on cloud computing environment, storage management is extremely important. To avoid loss, the cloud computing system must provide data protection and resiliency. If loss does occur, the computing environment must be able to recover the data quickly in order to restore access to the cloud services. This need is equally true whether the cloud computing environment is private, public or hybrid. It is possible to obtain data storage and protection services from the companies that specialize in storage, and many organizations that handle their own computing and applications choose this option for outsourcing storage. When outsourcing applications, however, an organization should never assume that the service provider includes storage management, data protection or disaster recovery among its services—not all of them do. It is therefore important to ensure from the beginning that the service provider delivers the necessary data storage and protection services, and to be familiar with the technologies and products used for storage management in the cloud environment. To ensure a practical solution, we considered the following goals relating to data protection in cloud.  Integrity: The customer‘s stored data won‘t be corrupted.  Privacy: Secret data won‘t be leaked to any unauthorized entity.  Access transparency: Logs will clearly indicate who or what accessed any type of data.  Ease of verification: Customers will be able to easily verify what platform or application code is running, as well as whether the cloud has strictly enforced their data‘s privacy policies.  Rich computation: The cloud platform will allow efficient, rich computations on sensitive user data.  Development and maintenance support: Because they face a long list of challenges—bugs to find and fix, frequent software upgrades, continuous usage pattern changes, and customer demand for high performance— developers will receive both development and maintenance support. IV. DAAS ARCHITECTURE Figure 2 shows architecture to explore the design space of Data Protection as a Service [7]. Figure 2: DPaaS Architecture
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul – Aug. 2013 pp-2498-2501 ISSN: 2249-6645 www.ijmer.com 2500 | Page A. Lightweight Confinement A Secure Data Capsule (SDC) is an enciphered data unit packaged with its security policy, e.g., Access Control List (ACL). To avoid unauthorized leakage of customer‘s data in the presence of potentially buggy or compromised applications, we confine the execution of various applications to mutually isolated environments, henceforth referred to as Secure Execution Environments (SEEs). There are different levels of inter-SEE isolation we could impose; stronger isolation in general exacts the greater performance cost due to context switching and data marshalling. At one end, a SEE could be a virtual machine with an output channel back to the requesting customer. In other words, the thread pool of the traditional server would be replaced with a pool of VMs or containers, whose data state is reset before being loaded with a new data unit. B. Sharing and authorization It is a basic requirement of our target applications that units of data that should be sharable; that is why SDCs are bound to a full ACL versus a particular customer. The key to enforcing those ACLs is that we can control the Input/Output channels available to SEEs. To confine data, we mandate that the data in an SDC is deciphered by the platform only for an SEE, and even then, only at an authorized user‘s request. The output may be funneled either directly to the customer or to another SEE which provides a service; in either case, the channel is mediated by the platform. C. Auditor and Data Access Auditing The auditor is one who audits the overall performance of the computing system. The auditor can track the transactions and logins of users with correct time and date. Here auditor is software component that is capable of tracking the transactions. Cloud storage offers movement of data into the cloud. It has great convenience to the customer because users can store their data in the cloud safely without the knowledge about the storage space. Since the platform mediates all access to the data, authenticates customers, and runs binaries, it knows what data is being accessed, by what user, and using which application. It can generate meaningful audit log files containing all these parameters and optionally incorporate additional information from the application layer. There are four basic types of actions we can log:  Ordinary online data accesses occur in response to external requests from customers, and take place when a user is online and using an application.  Access control modification by authorized customers. Knowing the provenance of these changes can be helpful for diagnosing or forensics sharing problems.  Batch/offline access to handle requests while users are offline (e.g., e-mail delivery), to compute aggregates, or to reorganize data such as during schema changes.  Administrative access for maintenance operations like debugging. D. Key Management The concept of key come from the branch of science called ―cryptography‖. There are basically two kinds of keys.  Public key  Private key A public key known to everyone and a private or shared secret key known only to the recipient of the message. When Alice wants to send a secure message to Bob, he uses Jane's public key to encrypt the message. Bob then uses her private key to decrypt it. In our system we encrypt the file using a key and stored in the cloud. The user should enter the key in order to decrypt the file. So multiple protection schemes are used here for protecting the files in the cloud. E. Authorization for Debugging, Maintenance, and Batch Access While ordinary customer access is governed by the ACL on the data, administrative access needs its own separate policy. That in turn can be audited to hold developers as well as administrators accountable. Each specific invocation of the administrative policy, because it may entail user access to data for, e.g., debugging or account recovery, should be logged and made available for auditing. The same kind of mechanism would be used for batch access, with perhaps different logging granularity; and to prevent misuse, the code for the batch process can be restricted only to an approved set. That might mean requiring controlled or quantifiable information release, such as differential privacy [8] or quantitative information flow [9]. F. Verifiability of the Platform The DPaaS paradigm provides logging and auditing at the platform level, sharing the benefits with all applications running on top. Offline, the auditor can verify that the paradigm implements each data protection feature as promised. At runtime, the platform provider can use trusted computing (TC) technologies to attest to the particular software that is running. Trusted computing uses the tamperproof TPM as well as the virtualization and isolation features of modern processors, such as Intel VT or AMDV. V. CONCLUSION Cloud computing environment enables highly scalable services to be easily consumed over the Internet on an as- needed basis. A major feature of the cloud computing services is that customers‘ data are usually processed remotely in unknown machines that users do not own or operate. Offering strong data protection to cloud customers while enabling rich
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul – Aug. 2013 pp-2498-2501 ISSN: 2249-6645 www.ijmer.com 2501 | Page applications is a challenging task. We explore a novel cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance. REFERENCES [1] T. Mather, S. Kumaraswamy, and S. Litif, Cloud Security and Privacy: An enterprise perspectives on Risks and Compliance (Theory in Practice ). O' Reilly, 2009. [2] IEEE International Conference on Cloud Computing. 2009. [3] P.T.Jaeger, J.Lin, and M. grimes, Cloud computing and information policy: Computing in a policy cloud? Journal of Information Technology and politics, 2009. [4] Cloud Computing: Clash of the clouds. the economist., 2009. [5] B.P.Rimal, E.Choi, and I.Lumb. A taxonomy and survey of Cloud Computing Systems. in Networked Computing and Advanced Information Management, International Conference. 2009. [6] B.R. Kandukuri, R.P.V., and A. Rakshit. Cloud security issues. in IEEE International Conference on Services Computing (SCC). 2009. [7] P. Maniatis, D. Akhawe, K. Fall, E. Shi, S. McCamant, and D. Song. Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection. In HotOS, 2011. [8] C. Dwork, ―The Differential Privacy Frontier Extended Abstract,‖ Proc. 6th Theory of Cryptography Conf. (TCC 09), LNCS 5444, Springer, 2009, pp. 496-502. [9] S. McCamant and M. D. Ernst. Quantitative information flow as network flow capacity. In PLDI, pages 193–205, 2008.