SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Noman Mazher et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

A Survey on data security models in cloud computing
Noman Mazher1 Imran Ashraf2
1
2

Department of Information Technology University of Gujrat, Gujrat Pakistan
Lecturer Faculty of CS & IT, University of Gujrat, Gujrat Pakistan

Abstract:
The world of data computing is becoming larger and complex day by day. Could computing is the most popular
model for supporting large and complex data. Organizations are moving toward cloud computing for getting
benefit of its cost reduction and elasticity features. However cloud computing has potential riks and
vulnerabilities. One of major hurdle in moving to cloud computing is its security and privacy concerns. As in
cloud computing environment data is out of user possession this leads to great risk of data integrity, data
confidentiality and data vulnerability etc. A number of security models have been developed to cope with these
security threats. Our research aims at investigating security models that were developed for securing data during
whole lifecycle of cloud computing.
Keywords—Cloud computing , data security , security model
I.
INTRODUCTION
The world of computation has becoming
larger and complex day by day. Could computing is
most popular model for supporting large and complex
data. Organizations are moving toward cloud
computing for getting benefit of its cost reduction
and elasticity features. Yet cloud computing have
potential disadvantages and threats. One of the major
hurdles in moving to cloud computing is its security
and privacy concerns. As in cloud computing
environment data is out of user possession this
increases the risk of data integrity, data
confidentiality etc. To reduce these risks researchers
have purposed many security models. In our research
we will investigate security models that were
developed for securing data during whole lifecycle of
cloud computing.
The data life cycle is divided into seven stages
that are Data generation , data transfer , use , share ,
storage , archival and destruction (Chen e Zhao,
2012) .
In proceeding section we will introduce different
security models purposed for different security
threats.
II.
RELATED WORKS
Cloud computing collects all the computing
resources and manages them automatically through
software. The historical data and present data are
integrated to make the collected information more
accurate. In this way cloud computing provides more
intelligent service to the users. The users are not
bothered about how to buy a server or solution.
Instead they can buy the computing resources on the
internet according to their need. However cloud
computing emerge as promising technology in order
www.ijera.com

to provide the services remotely. But there are many
security issues in cloud computing. For example in
February, 2010, the Amazon network host service, S3
(Simple Storage Service) was broken down for 4
hours. This made people think about the security of
cloud computing again. Since Amazon provides S3, it
has attracted a lot of entrepreneur on Web 2.0 put
their website on the data center of Amazon to save a
large hardware investment (Zhang et al., 2010). So
the service of cloud computing is not stable and
believable. Security is still a major concern in cloud
computing and one of the reason that’s why cloud
computing is still not admitted by the users.
To improve security of cloud many models
have been purposed. User would like to know which
security scheme they should implement for securing
our data. Comparison of these security schemes have
also been done by many researchers such as Farzad
Sabahi discuss many security problems to cloud
computing against these problems. (Sabahi, 2011) .
In this section we will introduce different security
models which were purposed by different
researchers. We will also tell about each security
model that in which layer it works.
A. Private Virtual Infrastructure (PVI):
This model is proposed by F.John Krothein
.(Author Guidelines for 8 - krautheim.pdf, 2013) In
this model he addresses risks associated with data. As
in cloud computing data is out of control of
organization so privacy and security of data is the
major concern of the organizations. PVI ensures
security of data while transferring data from client to
service provider and vice versa. Main purpose of PVI
is to secure data during its transfer stage. In this
413 | P a g e
Noman Mazher et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417

www.ijera.com

purposed architecture data security is ensured with
the help of two layers: PVI layer and cloud fabric
layer.
PVI layer:
Datacenter of PVI is controlled by information
owner. Each client is responsible of security of data
through firewall, intrusion detection system and other
monitoring and logging system to ensure that data is
confidential.
Cloud fabric layer:
Cloud datacenter or fabrics are controlled by cloud
service provider. This layer is responsible of
maintaining physical and logical security of data.
They ensure the security through security tools.
Another tool Locator Botprovider is also used.
Locator Botprovider provides details of all activities

by monitoring the cloud security. He claims that
locator Botprovider will also ensure security during
destruction stage of data. This architecture is
general and does not restrict itself to any specific
XaaS (IaaS, PaaS, and SaaS) service. It is a suggested
architecture and there is no implementation detail
provided.

Fig 1: cloud data storage service (Wang et al., 2010)
Third Party Auditor (TPA) is pivotal point in this
architecture as he has expertise and experience of
auditing data. TPA can send regular audit reports of
data. From those report user can evaluate that either
his data is going securely on cloud or not. To show
the performance of the proposed model a
mathematical notational proof is provided as well.
However no implementation detail in any domain is
provided. This architecture can be used for all XaaS
(IaaS, PaaS, and SaaS) services.

infrastructure for sensitive, private data and
computation, while integrating public clouds for no
sensitive, public data and computation. In this paper
the purposed model Hybprex is also implemented in
a specific environment called Mapreduce. Mapreduce
is a programming model used to execute large dataset
with parallel algorithm.

C. Cloud data storage security scheme:
This scheme is developed by Syed Azahad
and Mr.Srinivas Rao(Azhad e Rao). In this scheme
their main focus is on data storage security. This
scheme is developed with SaaS in mind. This scheme
addresses the correctness of data in the cloud
environment. In this scheme they use homomorphic
token with distributed verification. They claim to
achieve integration of correctness of storage data
and error localization of data. They also give security
analysis and the results of their analysis with the help
of graphs.
D. Hypbrex (Hybrid Execution) model:
Steven.Y.Ko et.al purposed that model (Ko,
Jeon e Morales, 2011). The HybrEx model provides a
seamless way for an organization to utilize their own
www.ijera.com

B. Privacy-preservation public Auditing:
This model is purposed by Cong-wang
et...al. (Wang et al., 2010)This architecture is
suggested typically for securing data of cloud during
during storage stage. In prototype of this model he
takes three entities 1) cloud user 2) cloud server 3)
cloud service provider.

Fig 2: Architecture of Hypbrex model (Azhad e Rao)
Hypbrex model typically worsk on storage stage of
data. For ensuring integrity of data on public cloud he
purposed to maintain hashes of public data in private
cloud. With the help of these hashing algorithms
hybprex can validate integrity of both public and
private data

414 | P a g e
Noman Mazher et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417
E. . Airavat :
Indraji roy et al purposed that model for security and
privacy for Mapreduce .(Untitled - roy.pdf, 2013)
Mapreduce is a programming model used to execute
large dataset with parallel algorithm. Airavat
guarantees to bound information leakage from any
individual data that is computed over mapreduce..

Fig 3 : Architecture of mapreduce (Roy et al., 2010)
In this paper they implemented Airavat on mapreduce
environment and gave the result with the help of
graphs .Airavat provides security on data storage
stage.
F. Integrated conceptual digital forensic
framework
This paper is written by Ben Martenie (An
integrated conceptual digital forensic framework for
cloud computing - r_6_130217100243.pdf, 2013) . In
this paper he integrates two framework of digital
forensics. These two frameworks are McKemmish
(1999) and NIST (Kent et al., 2006) . This
framework is analyzed
with help of survey and
questioner. These frameworks are work for data
security in data transfer stage.
G. Insider Threat remedies:
William R.ClayComb discussed a series of
security threats which are associated to cloud

Fig 4: Overview of POR process (ProvingRetrievability-and-Possession-within-the-CloudStorage-Model.pdf, 2013)
2) PDP (Proving data possession)
www.ijera.com

www.ijera.com

computing in general and data security in specific. A
general
data
security
threat
is
insider
threat.(Claycomb e Nicoll, 2012) Insider threat is
commonly known as “Rouge Administrator” threat.
According to definition of CERT insider threat is
“current or former employee, contractor, or other
business partner who has or had authorized access to
an organizations network, system or data and
intentionally exceeded or misused that access in a
manner that negatively affected the confidentiality,
integrity, or availability of the organizations
information or information systems.”
They gave the following suggestions to prevent our
data from insider threat:
 Enforce strict supply chain management and
conduct
a
comprehensive
supplier
assessment.
 Specify human resource requirements as
part of legal contracts.
 Require
transparency
into
overall
information security and management
practices, as well as compliance reporting.
 Determine security breach notification
processes.
Insider threat or “rogue administrator” threat can be
categorized on data storage stage of cloud
computing.
H. POR and PDP:
Jeff WhiteWorth discussed two issue of SaaS storage
model
(Proving-Retrievability-and-Possessionwithin-the-Cloud-Storage-Model.pdf, 2013).
1) POR (Prove of Retrievability )
First issue is Prove of Retrievability. This means that
user should have any proof that data stored on Cloud
storage device can be retrieved without any error or
loss, when needed. Solution provided for POR is to
use hash function on data. So data is sent in
encrypted state. When original data owner or prover
wants to retrieve data from cloud service provider or
verifier he can ensure that data which are retrieved
are same as sent for storing .

Provable data possession (PDP) refers to the ability
of a client to verify that data stored with a server still
possesses the data without retrieving it. The building
block of the proposed PDP scheme utilizes
415 | P a g e
Noman Mazher et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417
Homomorphic Verifiable Tags (HVTs) that are, in
the most basic concept, metadata stored with the file
that provides unforgeable data tags used for
verification. These building blocks are utilized in the
four main polynomial-time algorithms used in the
PDP scheme: KeyGen, TagBlock, GenProof and

www.ijera.com

CheckProof. The first two algorithms are used in the
scheme setup to produce public and secret keys as
well as HVTs. GenProof is used by the server to
generate a proof in response to the challenge sent by
the client and CheckProof is used by the client to
verify the proof generated by the server.

Fig 5: PDP overview (Proving-Retrievability-andPossession-within-the-Cloud-Storage-Model.pdf,
2013)
Both of these approaches address data security at
storage stage.
I.

Transparent
Table
encryption
Technique:
Ms. Ankita Parkash et al purposed an oracle storage
based technique for ensuring data security in cloud
computing (Baheti e Patil, 2013). This technique
ensures the reliability of data that is stored in cloud
environment.

Fig 6: Working diagram of proposed system (Baheti
e Patil, 2013)
In this approach they purposed a novel approach of
storing data. As user data is stored on any particular
cloud so we divide that particular cloud into four
groups or region R0, R1, R3 and R3. When user
stores his file on cloud his file is partitioned in four
parts. A segment file is maintained for each file.

www.ijera.com

Fig 7: segment table (Baheti e Patil, 2013)
Here Base represents the starting address of segment
in memory. The bound represents end address of the
segment. Rw field represents read and write access of
that segment. This all work will be done on cloud
administrator side. Cloud administrator encrypts
entries of segment table. When user wants to retrieve
their data cloud administrator will decrypt that
segment table entries and with the help of base and
bound address gets user data and sends it to the user.
So in this way user data can be secured in cloud
environment. This technique also addresses security
threats at data storage stage.
III.
CONCLUSION
In this research we analyzed different
security models that were purposed for different
stages of data in cloud computing. It presents a
comprehensive report on different security models
which has been purposed so far.
For securing data on different stages of data
lifecycle different security models can be
implemented
within
different
perspectives.
Confidentiality is an immense concern of data
security. To ensure users confidentiality Hypbrex
model can be implemented as it is developed by
taking confidentiality in mind specifically. While in
the environment where information leakage is more
important Airavat is the best suit. If data will have to
store for long time their Proof of reliability and proof
of data possession is very important. So model of OR
416 | P a g e
Noman Mazher et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417
and PDP scheme presented is best suited in scenario
where data will have to store for a long time.
Reliability of stored data is very important for user.
Transport Table Encryption Scheme is best suited for
ensuring reliability of data. Cloud computing security
scheme can be used where integration and
correctness of data is important. Transfer of data
during client to server can be secured using PVI
model.

[12]

[13]

www.ijera.com

WANG, C. et al. Privacy-preserving public
auditing for data storage security in cloud
computing. INFOCOM, 2010 Proceedings
IEEE, 2010, IEEE. p.1-9.
ZHANG, S.
et al. Cloud computing
research and development trend. Future
Networks,
2010.
ICFN'10.
Second
International Conference on, 2010, IEEE.
p.93-97.

References:
[1]
[2]

[3]
[4]

[5]

[6]

[7]

[8]

[9]
[10]

[11]

http://www.ccbc.ir/files_site/files/r_6_13021
7100243.pdf >.
Author Guidelines for 8 - krautheim.pdf.
2013.
Disponível
em:
<
http://static.usenix.org/event/hotcloud09/tec
h/full_papers/krautheim.pdf >.
AZHAD, S.; RAO, M. S. Ensuring Data
Storage Security in Cloud Computing.
BAHETI, A. P.; PATIL, S. V. Cloud
Security Based On Oracle Storage Using
Transparent Table Encryption Technique.
IJCER, v. 2, n. 2, p. 132-136, 2013. ISSN
2278-5795.
CHEN, D.; ZHAO, H. Data security and
privacy protection issues in cloud
computing.
Computer
Science
and
Electronics Engineering (ICCSEE), 2012
International Conference on, 2012, IEEE.
p.647-651.
CLAYCOMB, W. R.; NICOLL, A. Insider
Threats to Cloud Computing: Directions for
New Research Challenges. Computer
Software and Applications Conference
(COMPSAC), 2012 IEEE 36th Annual,
2012, IEEE. p.387-394.
KO, S. Y.; JEON, K.; MORALES, R. The
hybrex model for confidentiality and privacy
in cloud computing. Proceedings of the 2011
conference on Hot topics in Cloud
Computing. USENIX Association, Portland,
OR, 2011.
Proving-Retrievability-and-Possessionwithin-the-Cloud-Storage-Model.pdf. 2013.
Disponível
em:
<
http://www.whitworthtech.com/sysadmin/w
p-content/uploads/2012/07/ProvingRetrievability-and-Possession-within-theCloud-Storage-Model.pdf >.
ROY, I. et al. Airavat: Security and Privacy
for MapReduce. NSDI, 2010. p.297-312.
SABAHI, F. Cloud computing security
threats and responses. Communication
Software and Networks (ICCSN), 2011
IEEE 3rd International Conference on, 2011,
IEEE. p.245-249.
Untitled - roy.pdf. 2013. Disponível em: <
https://www.usenix.org/legacy/event/nsdi10/
tech/full_papers/roy.pdf >.

www.ijera.com

417 | P a g e

Mais conteúdo relacionado

Mais procurados

Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformSamuel Borthwick
 
Cloud computing and security issues in the
Cloud computing and security issues in theCloud computing and security issues in the
Cloud computing and security issues in theIJNSA Journal
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudEditor IJCATR
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storageijtsrd
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageIRJET Journal
 
Cloud computing technology security and trust challenges
Cloud computing technology security and trust challengesCloud computing technology security and trust challenges
Cloud computing technology security and trust challengesijsptm
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...ElavarasaN GanesaN
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services   a proposal  by shibwabo anyembeSecure third party cloud computing services   a proposal  by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembeShibwabo Christopher Anyembe
 

Mais procurados (18)

Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
C017421624
C017421624C017421624
C017421624
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud Platform
 
Cloud computing and security issues in the
Cloud computing and security issues in theCloud computing and security issues in the
Cloud computing and security issues in the
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 
A Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the CloudA Security Model for Virtual Infrastructure in the Cloud
A Security Model for Virtual Infrastructure in the Cloud
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
Cloud computing technology security and trust challenges
Cloud computing technology security and trust challengesCloud computing technology security and trust challenges
Cloud computing technology security and trust challenges
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services   a proposal  by shibwabo anyembeSecure third party cloud computing services   a proposal  by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembe
 

Destaque (20)

Bs36418429
Bs36418429Bs36418429
Bs36418429
 
Bj36363371
Bj36363371Bj36363371
Bj36363371
 
Bc36330333
Bc36330333Bc36330333
Bc36330333
 
Ax36300303
Ax36300303Ax36300303
Ax36300303
 
B360614
B360614B360614
B360614
 
Z36149154
Z36149154Z36149154
Z36149154
 
Ab36161166
Ab36161166Ab36161166
Ab36161166
 
At36276280
At36276280At36276280
At36276280
 
Ak36215227
Ak36215227Ak36215227
Ak36215227
 
Bl36378381
Bl36378381Bl36378381
Bl36378381
 
Bw36444448
Bw36444448Bw36444448
Bw36444448
 
Cp36547553
Cp36547553Cp36547553
Cp36547553
 
Ci36507510
Ci36507510Ci36507510
Ci36507510
 
Bz36459463
Bz36459463Bz36459463
Bz36459463
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Ck36515520
Ck36515520Ck36515520
Ck36515520
 
Bu36433437
Bu36433437Bu36433437
Bu36433437
 
Bk36372377
Bk36372377Bk36372377
Bk36372377
 
Cq36554559
Cq36554559Cq36554559
Cq36554559
 
Bt36430432
Bt36430432Bt36430432
Bt36430432
 

Semelhante a Br36413417

Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingYolanda Ivey
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET Journal
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docxsleeperharwell
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYSECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYijsrd.com
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architectureijsrd.com
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
Data Security Model Enhancement in Cloud Environment
Data Security Model Enhancement in Cloud EnvironmentData Security Model Enhancement in Cloud Environment
Data Security Model Enhancement in Cloud Environmentijsrd.com
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxmichael591
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...IJERA Editor
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 

Semelhante a Br36413417 (20)

Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
A Review On Data Security In Cloud Computing
A Review On Data Security In Cloud ComputingA Review On Data Security In Cloud Computing
A Review On Data Security In Cloud Computing
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
 
7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx7132019 Originality Reporthttpsucumberlands.blackboar.docx
7132019 Originality Reporthttpsucumberlands.blackboar.docx
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYSECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architecture
 
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Data Security Model Enhancement in Cloud Environment
Data Security Model Enhancement in Cloud EnvironmentData Security Model Enhancement in Cloud Environment
Data Security Model Enhancement in Cloud Environment
 
Review of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docxReview of Business Information Systems – Fourth Quarter 2013 V.docx
Review of Business Information Systems – Fourth Quarter 2013 V.docx
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 

Br36413417

  • 1. Noman Mazher et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417 RESEARCH ARTICLE www.ijera.com OPEN ACCESS A Survey on data security models in cloud computing Noman Mazher1 Imran Ashraf2 1 2 Department of Information Technology University of Gujrat, Gujrat Pakistan Lecturer Faculty of CS & IT, University of Gujrat, Gujrat Pakistan Abstract: The world of data computing is becoming larger and complex day by day. Could computing is the most popular model for supporting large and complex data. Organizations are moving toward cloud computing for getting benefit of its cost reduction and elasticity features. However cloud computing has potential riks and vulnerabilities. One of major hurdle in moving to cloud computing is its security and privacy concerns. As in cloud computing environment data is out of user possession this leads to great risk of data integrity, data confidentiality and data vulnerability etc. A number of security models have been developed to cope with these security threats. Our research aims at investigating security models that were developed for securing data during whole lifecycle of cloud computing. Keywords—Cloud computing , data security , security model I. INTRODUCTION The world of computation has becoming larger and complex day by day. Could computing is most popular model for supporting large and complex data. Organizations are moving toward cloud computing for getting benefit of its cost reduction and elasticity features. Yet cloud computing have potential disadvantages and threats. One of the major hurdles in moving to cloud computing is its security and privacy concerns. As in cloud computing environment data is out of user possession this increases the risk of data integrity, data confidentiality etc. To reduce these risks researchers have purposed many security models. In our research we will investigate security models that were developed for securing data during whole lifecycle of cloud computing. The data life cycle is divided into seven stages that are Data generation , data transfer , use , share , storage , archival and destruction (Chen e Zhao, 2012) . In proceeding section we will introduce different security models purposed for different security threats. II. RELATED WORKS Cloud computing collects all the computing resources and manages them automatically through software. The historical data and present data are integrated to make the collected information more accurate. In this way cloud computing provides more intelligent service to the users. The users are not bothered about how to buy a server or solution. Instead they can buy the computing resources on the internet according to their need. However cloud computing emerge as promising technology in order www.ijera.com to provide the services remotely. But there are many security issues in cloud computing. For example in February, 2010, the Amazon network host service, S3 (Simple Storage Service) was broken down for 4 hours. This made people think about the security of cloud computing again. Since Amazon provides S3, it has attracted a lot of entrepreneur on Web 2.0 put their website on the data center of Amazon to save a large hardware investment (Zhang et al., 2010). So the service of cloud computing is not stable and believable. Security is still a major concern in cloud computing and one of the reason that’s why cloud computing is still not admitted by the users. To improve security of cloud many models have been purposed. User would like to know which security scheme they should implement for securing our data. Comparison of these security schemes have also been done by many researchers such as Farzad Sabahi discuss many security problems to cloud computing against these problems. (Sabahi, 2011) . In this section we will introduce different security models which were purposed by different researchers. We will also tell about each security model that in which layer it works. A. Private Virtual Infrastructure (PVI): This model is proposed by F.John Krothein .(Author Guidelines for 8 - krautheim.pdf, 2013) In this model he addresses risks associated with data. As in cloud computing data is out of control of organization so privacy and security of data is the major concern of the organizations. PVI ensures security of data while transferring data from client to service provider and vice versa. Main purpose of PVI is to secure data during its transfer stage. In this 413 | P a g e
  • 2. Noman Mazher et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417 www.ijera.com purposed architecture data security is ensured with the help of two layers: PVI layer and cloud fabric layer. PVI layer: Datacenter of PVI is controlled by information owner. Each client is responsible of security of data through firewall, intrusion detection system and other monitoring and logging system to ensure that data is confidential. Cloud fabric layer: Cloud datacenter or fabrics are controlled by cloud service provider. This layer is responsible of maintaining physical and logical security of data. They ensure the security through security tools. Another tool Locator Botprovider is also used. Locator Botprovider provides details of all activities by monitoring the cloud security. He claims that locator Botprovider will also ensure security during destruction stage of data. This architecture is general and does not restrict itself to any specific XaaS (IaaS, PaaS, and SaaS) service. It is a suggested architecture and there is no implementation detail provided. Fig 1: cloud data storage service (Wang et al., 2010) Third Party Auditor (TPA) is pivotal point in this architecture as he has expertise and experience of auditing data. TPA can send regular audit reports of data. From those report user can evaluate that either his data is going securely on cloud or not. To show the performance of the proposed model a mathematical notational proof is provided as well. However no implementation detail in any domain is provided. This architecture can be used for all XaaS (IaaS, PaaS, and SaaS) services. infrastructure for sensitive, private data and computation, while integrating public clouds for no sensitive, public data and computation. In this paper the purposed model Hybprex is also implemented in a specific environment called Mapreduce. Mapreduce is a programming model used to execute large dataset with parallel algorithm. C. Cloud data storage security scheme: This scheme is developed by Syed Azahad and Mr.Srinivas Rao(Azhad e Rao). In this scheme their main focus is on data storage security. This scheme is developed with SaaS in mind. This scheme addresses the correctness of data in the cloud environment. In this scheme they use homomorphic token with distributed verification. They claim to achieve integration of correctness of storage data and error localization of data. They also give security analysis and the results of their analysis with the help of graphs. D. Hypbrex (Hybrid Execution) model: Steven.Y.Ko et.al purposed that model (Ko, Jeon e Morales, 2011). The HybrEx model provides a seamless way for an organization to utilize their own www.ijera.com B. Privacy-preservation public Auditing: This model is purposed by Cong-wang et...al. (Wang et al., 2010)This architecture is suggested typically for securing data of cloud during during storage stage. In prototype of this model he takes three entities 1) cloud user 2) cloud server 3) cloud service provider. Fig 2: Architecture of Hypbrex model (Azhad e Rao) Hypbrex model typically worsk on storage stage of data. For ensuring integrity of data on public cloud he purposed to maintain hashes of public data in private cloud. With the help of these hashing algorithms hybprex can validate integrity of both public and private data 414 | P a g e
  • 3. Noman Mazher et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417 E. . Airavat : Indraji roy et al purposed that model for security and privacy for Mapreduce .(Untitled - roy.pdf, 2013) Mapreduce is a programming model used to execute large dataset with parallel algorithm. Airavat guarantees to bound information leakage from any individual data that is computed over mapreduce.. Fig 3 : Architecture of mapreduce (Roy et al., 2010) In this paper they implemented Airavat on mapreduce environment and gave the result with the help of graphs .Airavat provides security on data storage stage. F. Integrated conceptual digital forensic framework This paper is written by Ben Martenie (An integrated conceptual digital forensic framework for cloud computing - r_6_130217100243.pdf, 2013) . In this paper he integrates two framework of digital forensics. These two frameworks are McKemmish (1999) and NIST (Kent et al., 2006) . This framework is analyzed with help of survey and questioner. These frameworks are work for data security in data transfer stage. G. Insider Threat remedies: William R.ClayComb discussed a series of security threats which are associated to cloud Fig 4: Overview of POR process (ProvingRetrievability-and-Possession-within-the-CloudStorage-Model.pdf, 2013) 2) PDP (Proving data possession) www.ijera.com www.ijera.com computing in general and data security in specific. A general data security threat is insider threat.(Claycomb e Nicoll, 2012) Insider threat is commonly known as “Rouge Administrator” threat. According to definition of CERT insider threat is “current or former employee, contractor, or other business partner who has or had authorized access to an organizations network, system or data and intentionally exceeded or misused that access in a manner that negatively affected the confidentiality, integrity, or availability of the organizations information or information systems.” They gave the following suggestions to prevent our data from insider threat:  Enforce strict supply chain management and conduct a comprehensive supplier assessment.  Specify human resource requirements as part of legal contracts.  Require transparency into overall information security and management practices, as well as compliance reporting.  Determine security breach notification processes. Insider threat or “rogue administrator” threat can be categorized on data storage stage of cloud computing. H. POR and PDP: Jeff WhiteWorth discussed two issue of SaaS storage model (Proving-Retrievability-and-Possessionwithin-the-Cloud-Storage-Model.pdf, 2013). 1) POR (Prove of Retrievability ) First issue is Prove of Retrievability. This means that user should have any proof that data stored on Cloud storage device can be retrieved without any error or loss, when needed. Solution provided for POR is to use hash function on data. So data is sent in encrypted state. When original data owner or prover wants to retrieve data from cloud service provider or verifier he can ensure that data which are retrieved are same as sent for storing . Provable data possession (PDP) refers to the ability of a client to verify that data stored with a server still possesses the data without retrieving it. The building block of the proposed PDP scheme utilizes 415 | P a g e
  • 4. Noman Mazher et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417 Homomorphic Verifiable Tags (HVTs) that are, in the most basic concept, metadata stored with the file that provides unforgeable data tags used for verification. These building blocks are utilized in the four main polynomial-time algorithms used in the PDP scheme: KeyGen, TagBlock, GenProof and www.ijera.com CheckProof. The first two algorithms are used in the scheme setup to produce public and secret keys as well as HVTs. GenProof is used by the server to generate a proof in response to the challenge sent by the client and CheckProof is used by the client to verify the proof generated by the server. Fig 5: PDP overview (Proving-Retrievability-andPossession-within-the-Cloud-Storage-Model.pdf, 2013) Both of these approaches address data security at storage stage. I. Transparent Table encryption Technique: Ms. Ankita Parkash et al purposed an oracle storage based technique for ensuring data security in cloud computing (Baheti e Patil, 2013). This technique ensures the reliability of data that is stored in cloud environment. Fig 6: Working diagram of proposed system (Baheti e Patil, 2013) In this approach they purposed a novel approach of storing data. As user data is stored on any particular cloud so we divide that particular cloud into four groups or region R0, R1, R3 and R3. When user stores his file on cloud his file is partitioned in four parts. A segment file is maintained for each file. www.ijera.com Fig 7: segment table (Baheti e Patil, 2013) Here Base represents the starting address of segment in memory. The bound represents end address of the segment. Rw field represents read and write access of that segment. This all work will be done on cloud administrator side. Cloud administrator encrypts entries of segment table. When user wants to retrieve their data cloud administrator will decrypt that segment table entries and with the help of base and bound address gets user data and sends it to the user. So in this way user data can be secured in cloud environment. This technique also addresses security threats at data storage stage. III. CONCLUSION In this research we analyzed different security models that were purposed for different stages of data in cloud computing. It presents a comprehensive report on different security models which has been purposed so far. For securing data on different stages of data lifecycle different security models can be implemented within different perspectives. Confidentiality is an immense concern of data security. To ensure users confidentiality Hypbrex model can be implemented as it is developed by taking confidentiality in mind specifically. While in the environment where information leakage is more important Airavat is the best suit. If data will have to store for long time their Proof of reliability and proof of data possession is very important. So model of OR 416 | P a g e
  • 5. Noman Mazher et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.413-417 and PDP scheme presented is best suited in scenario where data will have to store for a long time. Reliability of stored data is very important for user. Transport Table Encryption Scheme is best suited for ensuring reliability of data. Cloud computing security scheme can be used where integration and correctness of data is important. Transfer of data during client to server can be secured using PVI model. [12] [13] www.ijera.com WANG, C. et al. Privacy-preserving public auditing for data storage security in cloud computing. INFOCOM, 2010 Proceedings IEEE, 2010, IEEE. p.1-9. ZHANG, S. et al. Cloud computing research and development trend. Future Networks, 2010. ICFN'10. Second International Conference on, 2010, IEEE. p.93-97. References: [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] http://www.ccbc.ir/files_site/files/r_6_13021 7100243.pdf >. Author Guidelines for 8 - krautheim.pdf. 2013. Disponível em: < http://static.usenix.org/event/hotcloud09/tec h/full_papers/krautheim.pdf >. AZHAD, S.; RAO, M. S. Ensuring Data Storage Security in Cloud Computing. BAHETI, A. P.; PATIL, S. V. Cloud Security Based On Oracle Storage Using Transparent Table Encryption Technique. IJCER, v. 2, n. 2, p. 132-136, 2013. ISSN 2278-5795. CHEN, D.; ZHAO, H. Data security and privacy protection issues in cloud computing. Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, 2012, IEEE. p.647-651. CLAYCOMB, W. R.; NICOLL, A. Insider Threats to Cloud Computing: Directions for New Research Challenges. Computer Software and Applications Conference (COMPSAC), 2012 IEEE 36th Annual, 2012, IEEE. p.387-394. KO, S. Y.; JEON, K.; MORALES, R. The hybrex model for confidentiality and privacy in cloud computing. Proceedings of the 2011 conference on Hot topics in Cloud Computing. USENIX Association, Portland, OR, 2011. Proving-Retrievability-and-Possessionwithin-the-Cloud-Storage-Model.pdf. 2013. Disponível em: < http://www.whitworthtech.com/sysadmin/w p-content/uploads/2012/07/ProvingRetrievability-and-Possession-within-theCloud-Storage-Model.pdf >. ROY, I. et al. Airavat: Security and Privacy for MapReduce. NSDI, 2010. p.297-312. SABAHI, F. Cloud computing security threats and responses. Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on, 2011, IEEE. p.245-249. Untitled - roy.pdf. 2013. Disponível em: < https://www.usenix.org/legacy/event/nsdi10/ tech/full_papers/roy.pdf >. www.ijera.com 417 | P a g e