Paper Type |
: |
Research Paper |
Title |
: |
Secure Model for Cloud Computing Based Storage and
Retrieval |
Country |
: |
India |
Authors |
: |
Yaga Reddemma, Lingala Thirupath2, Sreekanth Gunti |
 |
: |
10.9790/0661-0610105  |
Abstract:Enterprises protect their internal storage and retrieval process using firewalls and also protect it
from insider attacks by formulating secure data access procedures. If the enterprises are willing to store data in
cloud, cloud computing service providers have to take care of data privacy and security. A common way to
achieve security is encryption/decryption mechanism employed by cloud service providers. However,
performing both tasks such as storage and encryption/decryption mechanism by cloud server causes security
problems as the administrators know the sensitive information and may involve in illegal practices. To
overcome this problem, this paper presents a mechanism where the storage is done by one provider while
encryption/decryption mechanisms are provided by another service provider. In the proposed system the party
that uses cloud storage services must encrypt data before sending it to cloud while the service provider who is
responsible for encryption/decryption must delete data once encryption/decryption process is completed. To
illustrate the proposed mechanism, this paper uses a CRM service example that demonstrates how the parties
involved in secure storage and retrieval when data is saved to cloud. It also provides insights into multi-party
SLAs for the proposed system.
Keywords: SLAs, cloud computing, encryption and decryption, secure storage and retrieval
[1] A. Weiss, "Computing in the clouds", netWorker, vol. 11, no. 4, pp. 16 -25, December 2007.
[2] C. S. Yeo, S. Venugopal, X. Chu, and R. Buyya, "Autonomic metered pricing for a utility computing service", Future Generation
Computer Systems, vol. 26, issue 8, pp. 1368-1380, October 2010.
[3] M. Baker, R. Buyya, and D. Laforenza, "Grids and grid technologies for wide-area distributed computing," International Journal
of Software: Practice and Experience, vol.32, pp. 1437-1466, 2002.
[4] B. R. Kandukuri, V, R. Paturi and A. Rakshit, "Cloud security issues," in Proceedings of the 2009 IEEE International Conference
on Services Computing, pp. 517-520, September 2009.
[5] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging IT platforms: vision, hype, and
reality for delivering computing as the 5th utility," Future Generation Computer Systems, vol. 25, issue 6, pp. 599 -616, June 2008.
[6] R. Sterritt, "Autonomic computing," Innovations in Systems and Software Engineering, vol. 1, no. 1, Springer, pp. 79-88. 2005.
[7] L. M. Vaquero,L. Rodero-Merino,J. Caceres, and M. Lindner, "A break in the clouds: towards a cloud definition," ACM
SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, January 2009.
[8] N. Hawthorn, "Finding security in the cloud," Computer Fraud & Security, vol. 2009, issue 10, pp. 19-20, October 2009.
[9] A. Parakh and S. Kak, "Online data storage using implicit security", Information Sciences, vol. 179, issue 19, pp. 3323-3333,
September 2009.
[10] R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems",
Communications of the ACM, vol. 21, no. 2, pp.120-126, 1978.