You are on page 1of 7

Cloud Storage Security

Kala
Cloud Computing

Advantages:
• Backup and Recovery
• Almost Unlimited Storage
• Efficiency and Performance Increasing

Disadvantages:
•Security
•Privacy
Cloud Computing Storage Security Issues:
1.Traditional Security problems

2. Law Issue

3. Third party Issue


Related Research for Storage Security:
DATA
1.Authorization:
• Multi-level authorization
• The Face Fuzzy Vault
COPY 1 PART 1 PART 2 COPY 2
2.Encryption:
• RSA Encryption
• AES Encryption
• Hybrid Encryption
3. Segmentation:
• Metadata Based Storage Model
• Multi-cloud Architecture Model
SE R V E R SE R V E R SE R V E R SE R V E R

Figure: Segmentation Backup System


Table: Metadata Based Storage Model Level Figure: Multi-cloud Architecture Model
REFERENCES:

[1] L. Wentao, "Research on cloud computing security problem and strategy," in Consumer Electronics, Com
munications and Networks (CECNet), 2012 2nd International Conference on, 2012, pp. 1216-1219.
[2] H. Bakshi, M. Mulla, N. Dutta, and V. Shinde, "Multi Cloud Architecture to Provide Data Security And Integr
ity," IJETAE, vol. 3, 2013.
[3] E. Chang, T. Dillon, and W. Chen, "Cloud Computing: Issues and Challenges," in Advanced Information N
etworking and Applications (AINA), 2010 24th IEEE International Conference on, 2010, pp. 27-33.
[4] C. Zhibin and Y. Jianfeng, "Cloud Computing Research and Security Issues," in Computational Intelligenc
e and Software Engineering (CiSE), 2010 International Conference on, 2010, pp. 1-3.
[5] A. Y. Chang, C. Chun-Jung, L. Uei-Chin, and T. Chang-Lung, "Information security issue of enterprises ado
pting the application of cloud computing," in Networked Computing and Advanced Information Management (N
CM), 2010 Sixth International Conference on, 2010, pp. 645-649.
[6] P. Sanghavi and V. Joshi, "Three tier data storage security in cloud using Face fuzzy vault," in Computing,
Communication and Applications (ICCCA), 2012 International Conference on, 2012, pp. 1-6.
[7] A. Bogdanov, C. Paar, M. Wienecke, and T. Eisenbarth, "Differential cache-collision timing attacks on AES
with applications to embedded CPUs," in Topics in Cryptology-CT-RSA 2010, ed: Springer, 2010, pp. 235-251.
[8] L. Weiwei, L. Mingqi, and Y. Chao, "A Novel Triple Encryption Scheme for Hadoop-Based Cloud Data Sec
urity," in Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference on, 2013,
pp. 437-442.
[9] C. SelvaKumar, M. R. Sumalatha, and M. Venkatesh, "Improving public auditability, data possession in dat
a storage security for cloud computing," in Recent Trends In Information Technology (ICRTIT), 2012 International Co
nference on, 2012, pp. 463-467.

You might also like