SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 1 (Sep-Oct. 2012), PP 01-05
www.iosrjournals.org
www.iosrjournals.org 1 | Page
A Secure Model for Cloud Computing Based Storage and
Retrieval
Yaga Reddemma1
, Lingala Thirupathi2
, Sreekanth Gunti3
1,3
Department of CSE, PRRM College of Engineering, Shabad, Ranga Reddy, Andhra Pradesh, India
2
Asst.Prof, Department of CSE, Malla Reddy Institute of Engineering & Technology, Secunderabad,
Andhra Pradesh, India
Abstract: Enterprises protect their internal storage and retrieval process using firewalls and also protect it
from insider attacks by formulating secure data access procedures. If the enterprises are willing to store data in
cloud, cloud computing service providers have to take care of data privacy and security. A common way to
achieve security is encryption/decryption mechanism employed by cloud service providers. However,
performing both tasks such as storage and encryption/decryption mechanism by cloud server causes security
problems as the administrators know the sensitive information and may involve in illegal practices. To
overcome this problem, this paper presents a mechanism where the storage is done by one provider while
encryption/decryption mechanisms are provided by another service provider. In the proposed system the party
that uses cloud storage services must encrypt data before sending it to cloud while the service provider who is
responsible for encryption/decryption must delete data once encryption/decryption process is completed. To
illustrate the proposed mechanism, this paper uses a CRM service example that demonstrates how the parties
involved in secure storage and retrieval when data is saved to cloud. It also provides insights into multi-party
SLAs for the proposed system.
Keywords–SLAs, cloud computing, encryption and decryption, secure storage and retrieval
I. Introduction
Cloud computing has become a reality recently. Many vendors such as Google, IBM, and Microsoft came up
with cloud solutions that enable people and organizations gain access to huge computational and other resources
in pay per use fashion. According to Weiss, cloud computing involved many existing technologies [1]. They
include utility computing in service oriented fashion [2], grid computing [3] and large data centers that are used
to store huge amount of data of cloud users. Before cloud computing came into existence, organizations used to
store data in their internal storage media and security is provided by various means to prevent attacks from
external and internal users. As organizations need more and more resources they may opt to use cloud services.
In such case, their data is directly stored in cloud server maintained by service provider. The data security plays
an important role when data is stored in cloud server. Cloud service providers take care of security of their
users’ data. However, from user perspective, cloud is not secure. This is because the administrators of cloud
storage servers are privileges to have unauthorized access to data of clients. This has to be prevented. This is the
motivation behind taking up this research work. This paper proposes the mechanisms to prevent it.
Generally service providers provide certain security and service policies which are to be accepted by
the clients or users. Every application which needs people involvement has some sort of agreement with clients
or users. For instance Yahoo! Web mail needs users consent for its terms and conditions. In cloud environment
also the clients might have different storage requirements at different times. These requirements and server’s
rules and regulations and any other issues are clearly mentioned in the agreements. Often they are known as
service level agreements (SLAs) [4]. The signing on SLAs indicate that users have accepted to the terms and
conditions and both service provider and client. Generally security to storage is provided by using encryption
and decryption concepts. System administrators are able to access to the private data of users in cloud
computing. If this is the case, users’ data may not be secure. This paper focuses on this security threat.
We propose a new mechanism where the storage and encryption/decryption are separated into two different
cloud servers. In one cloud server data storage takes place securely while other server only takes care of
encryption and decryptionoperations to see that data of user remains secure. This paper uses CRM concept to
demonstrate the new mechanism proposed.
II. Related Work
With the advent of Internet began all related technologies to grow in a fast pace. People of all walks of life
started using these technologies either directly or indirectly. Businesses became truly global in nature. There are
no geographical and time restrictions for merchandise as it can be done online. Recently cloud computing [5]
technology came into existence. It is an emerging technology that enables individuals and organizations to gain
A Secure Model for Cloud Computing Based Storage and Retrieval
www.iosrjournals.org 2 | Page
access to huge state-of-the-art resources through Internet in pay per use fashion without capital investment. This
concept helps people at large to make use of resources through Internet and pay per use. The resource usage can
be adjusted based on the customer requirements [6]. Cloud computing has many kinds such as PaaS (Platform as
a Service), IaaS (Infrastructure as a Service), and SaaS (Software as a Service) [7]. The SaaS provides software
to cloud clients as service. The IaaS provides infrastructure such as data centers, storage, and secure servers etc
to cloud clients. The PaaS provides development platform that enables programmer to write applications that
interacts with cloud.
There are many data privacy concerns in cloud computing. Improper disclosure of business data to
third parties is one of the major concerns [8]. Encryption must be used to properly secure user’s data in cloud
[9]. For protecting cloud data the existing methods include FIPS, TDEA, AES, RSA cryptography [10] and ECC
[11]. These technologies are capable of providing security to cloud storage. However, there are some problems
with these technologies including encrypting/decryption technology for ensuring safe storage. However, the
storage and security (encryption/decryption) are mixed in the same server. This may allow administrators of the
service provider to have illegal access to cloud storage. This paper addresses this problem by proposing a
business model that separates the storage cloud service from encryption/decryption service. This ensures that
those services work independently in a loosely coupled fashion. The administrators of both the services can’t
directly access the data thus making it more secure.
III. Proposed Business Model
The proposed business model separates data storage service from that of encryption and decryption service. The
separation is as visualized in fig. 1. Storage service is provided by one cloud service provider and
encryption/decryption service is provided by another service provider.
Fig 3: Encryption/Decryption as an independent service
This separation is required as the cloud server administrators might have illegal access to data of the users. To
prevent this, the services such as storage and encryption/decryption are separated and moved to different cloud
servers. Generally users use cloud environment for specific purposes. For instances SAP’s ERP services [12],
Salesforce.com’s CRM service [13] and so on. The data generated by these operations is saved to cloud storage.
However, this study advocates an additional cloud server that takes care of encryption/decryption activities
which are independent of storage service. This split responsibilities of both the servers have division of labor in
functioning that provides more secure to user’s data.
Fig. 2 –Proposed Business Model for storing user’s data in cloud
As can be seen in fig. 2, user CRM service is taken to demonstrate the new business model. As per this model
users interact with CRM cloud service. In turn the CRM service interacts with both storage could service and
also encryption/decryption cloud service. The interaction among them is bidirectional. The storage cloud service
and encryption/decryption service and CRM service are having bi-directional communication among them.
A Secure Model for Cloud Computing Based Storage and Retrieval
www.iosrjournals.org 3 | Page
Fig. 3 –Data retrieval mechanism in the proposed business model
First of all user’s credentials are authenticated by CRM cloud service. Once authentication is done user can
access CRM server through which he performs data retrieval and data storage operations. Fig. 3 shows data
retrieval operation in detail. As per the user’s instructions the CRM cloud service interacts with storage cloud
service and makes data usage request. Then the storage cloud service sends encrypted data which is available in
to encryption/decryption service and requests for decryption. The encryption/decryption service takes encrypted
data and simply decrypts it and sends the decrypted data to CRM cloud service. SSL (Secure Sockets Layer) is
used for encryption and decryption purposes. The last step is that the CRM cloud service sends requested data to
end user. Thus secure communication is taking place across all components as part of proposed data retrieval
mechanism.
Fig. 4 – Data storage mechanism in the proposed business model
As can be seen in fig. 4, after due authentication, the end users sends data storage request to CRM cloud service.
In turn the CRM cloud service sends unencrypted data to encryption/decryption cloud service. The
encryption/decryption cloud service actually encrypts the given content and sends it to storage cloud service
where it is stored. Then the storage cloud service sends resultant message to CRM cloud service.
IV. Service Level Agreements
Service level agreements between the parties involved in cloud computing is essential. In other words there must
be business agreements between the cloud service provider and cloud user. The SLA template should cover all
possible agreements. This will make it clear to both the parties so that they stick to their promises. The proposed
business model involves cloud user, CRM service, storage cloud service and encryption/decryption service. The
template for SLAs among them is provided in fig. 5.
A Secure Model for Cloud Computing Based Storage and Retrieval
www.iosrjournals.org 4 | Page
Fig. 5 – SLA Template
The proposed business model when SLAs are incorporated becomes a perfect business model where all
partners or parties follow ideal practices keeping their agreements in mind. The business model is very secure as
all parties involved in SSL communication and the separation of encryption/decryption service from storage
service makes is more robust and secure.
V. Conclusion
This paper has presented a new security mechanism to protect data of cloud users. It proposes
separation of storage and encryption/decryption services into two different cloud service providers. The data
storage is taken place at one cloud server while the security mechanisms are applied at another cloud server.
This ensures the transparency in storage and retrieval. When user sends data to cloud service provider, he has to
send it as plain text to encryption/decryption service provider. Then the encryption/decryption service provider
encrypts data and sends it to another service provider who is responsible for storage. Thus a secure storage of
data is ensured. When user wants to get information from cloud server, a request is made to this effect and the
cloud server where data is stored sends encrypted data to cloud server responsible for encryption/decryption.
That server decrypts the data and finally the plain text is sent to user securely. In addition to this, in the proposed
system multi-party Service Level Agreements (SLAs) are also suggested for father improvement of the system.
References
[1] A. Weiss, “Computing in the clouds”, netWorker, vol. 11, no. 4, pp. 16-25, December 2007.
[2] C. S. Yeo, S. Venugopal, X. Chu, and R. Buyya, "Autonomic metered pricing for a utility computing service", Future Generation
Computer Systems, vol. 26, issue 8, pp. 1368-1380, October 2010.
[3] M. Baker, R. Buyya, and D. Laforenza, “Grids and grid technologies for wide-area distributed computing,” International Journal
of Software: Practice and Experience, vol.32, pp. 1437-1466, 2002.
[4] B. R. Kandukuri, V, R. Paturi and A. Rakshit, “Cloud security issues,” in Proceedings of the 2009 IEEE International Conference
on Services Computing, pp. 517-520, September 2009.
[5] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms: vision, hype, and
reality for delivering computing as the 5th utility,” Future Generation Computer Systems, vol. 25, issue 6, pp. 599-616, June 2008.
[6] R. Sterritt, “Autonomic computing,” Innovations in Systems and Software Engineering, vol. 1, no. 1, Springer, pp. 79-88. 2005.
[7] L. M. Vaquero,L. Rodero-Merino,J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition,” ACM
SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, January 2009.
[8] N. Hawthorn, “Finding security in the cloud,” Computer Fraud & Security, vol. 2009, issue 10, pp. 19-20, October 2009.
[9] A. Parakh and S. Kak, “Online data storage using implicit security”, Information Sciences, vol. 179, issue 19, pp. 3323-3333,
September 2009.
[10] R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems”,
Communications of the ACM, vol. 21, no. 2, pp.120-126, 1978.
[11] V. Miller, “Uses of elliptic curves in cryptography,” Advances in Cryptology - CRYPTO '85, Lecture Notes in Computer Science,
pp. 417-426, 1986.
[12] SAP AG., “SAP services: maximize your success,” Retrieved Jan. 2010, from http://www.sap.com/services/index.epx
[13] Salesforce.com, Inc., “Force.com platform,” Retrieved Dec. 2009, from http://www.salesforce.com/tw/
A Secure Model for Cloud Computing Based Storage and Retrieval
www.iosrjournals.org 5 | Page
About Authors:
Yaga Reddemma received the B.Tech Computer Science, A.P, India and Currently
doing M.Tech in Computer Science and Engineering at PRRM College of
Engineering, Ranga Reddy, Andhra Pradesh, India.
Lingala Thirupathi received the B.Tech (Information Technology),M.Tech
(SoftwareEngineering) atSreenidhi Institute of Science &
Technology,Secunderabad,AP, India & currently working as anAsst.Professorat
Malla Reddy Institute of Engineering & Technology, Secunderabad, AP, India.
Sreekanth Guntipursing the M.Tech Computer Science Engineering, Hyderabad,
A.P, India at PRRM College of Engineering, Ranga Reddy, Andhra Pradesh, India.

Weitere ähnliche Inhalte

Was ist angesagt?

A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computingijsrd.com
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...IRJET Journal
 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & WhereMohammed Sajjad Ali
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...ijsrd.com
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageIRJET Journal
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...pharmaindexing
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage StructureIRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage StructureIRJET Journal
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructurecsandit
 

Was ist angesagt? (19)

A Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud ComputingA Secure & Scalable Access Method in Cloud Computing
A Secure & Scalable Access Method in Cloud Computing
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
V04405122126
V04405122126V04405122126
V04405122126
 
Moving to the Cloud When & Where
Moving to the Cloud When & WhereMoving to the Cloud When & Where
Moving to the Cloud When & Where
 
R180203114117
R180203114117R180203114117
R180203114117
 
G033030035
G033030035G033030035
G033030035
 
IRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual ProtectionIRJET- Secure Cloud Storage through Dual Protection
IRJET- Secure Cloud Storage through Dual Protection
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
Fs2510501055
Fs2510501055Fs2510501055
Fs2510501055
 
IRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage StructureIRJET- Effective Privacy based Distributed Storage Structure
IRJET- Effective Privacy based Distributed Storage Structure
 
Security policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructureSecurity policy enforcement in cloud infrastructure
Security policy enforcement in cloud infrastructure
 

Andere mochten auch

Almentariak hodei ehiztari
Almentariak hodei ehiztariAlmentariak hodei ehiztari
Almentariak hodei ehiztariAlmentariak
 
How To Create Your Own Info Product
How To Create Your Own Info ProductHow To Create Your Own Info Product
How To Create Your Own Info Productbelieve52
 
Seminar curriculumppt
Seminar curriculumpptSeminar curriculumppt
Seminar curriculumpptcpennello
 
Whistler Animal Shelter - 10th Annual K9 Wine & Dine
Whistler Animal Shelter - 10th Annual K9 Wine & DineWhistler Animal Shelter - 10th Annual K9 Wine & Dine
Whistler Animal Shelter - 10th Annual K9 Wine & DineWhistler Animals Galore
 
Implementation of RISC-Based Architecture for Low power applications
Implementation of RISC-Based Architecture for Low power applicationsImplementation of RISC-Based Architecture for Low power applications
Implementation of RISC-Based Architecture for Low power applicationsIOSR Journals
 
Поэма А.С. Пушкина "Руслан и Людмила"
Поэма А.С. Пушкина "Руслан и Людмила"Поэма А.С. Пушкина "Руслан и Людмила"
Поэма А.С. Пушкина "Руслан и Людмила"Natalya Dyrda
 
Static Slicing Technique with Algorithmic Approach
Static Slicing Technique with Algorithmic ApproachStatic Slicing Technique with Algorithmic Approach
Static Slicing Technique with Algorithmic ApproachIOSR Journals
 
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...IOSR Journals
 
Opportunity Arabia 2015 (London, September 14 2015)
Opportunity Arabia 2015 (London, September 14 2015)Opportunity Arabia 2015 (London, September 14 2015)
Opportunity Arabia 2015 (London, September 14 2015)Odyssey Recruitment
 
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet  Hiding MethodsJamming Attacks Prevention in Wireless Networks Using Packet  Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding MethodsIOSR Journals
 
Improving search time for contentment based image retrieval via, LSH, MTRee, ...
Improving search time for contentment based image retrieval via, LSH, MTRee, ...Improving search time for contentment based image retrieval via, LSH, MTRee, ...
Improving search time for contentment based image retrieval via, LSH, MTRee, ...IOSR Journals
 
Performance Analysis of CSI Based PV system During LL and TPG faults
Performance Analysis of CSI Based PV system During LL and TPG faultsPerformance Analysis of CSI Based PV system During LL and TPG faults
Performance Analysis of CSI Based PV system During LL and TPG faultsIOSR Journals
 
MAC Protocols: A Review
MAC Protocols: A ReviewMAC Protocols: A Review
MAC Protocols: A ReviewIOSR Journals
 
The prediction of moisture through the use of neural networks MLP type
The prediction of moisture through the use of neural networks MLP typeThe prediction of moisture through the use of neural networks MLP type
The prediction of moisture through the use of neural networks MLP typeIOSR Journals
 
Tools for Ontology Building from Texts: Analysis and Improvement of the Resul...
Tools for Ontology Building from Texts: Analysis and Improvement of the Resul...Tools for Ontology Building from Texts: Analysis and Improvement of the Resul...
Tools for Ontology Building from Texts: Analysis and Improvement of the Resul...IOSR Journals
 

Andere mochten auch (20)

Jeopardy
JeopardyJeopardy
Jeopardy
 
Almentariak hodei ehiztari
Almentariak hodei ehiztariAlmentariak hodei ehiztari
Almentariak hodei ehiztari
 
How To Create Your Own Info Product
How To Create Your Own Info ProductHow To Create Your Own Info Product
How To Create Your Own Info Product
 
Seminar curriculumppt
Seminar curriculumpptSeminar curriculumppt
Seminar curriculumppt
 
Yo y mi mascota
Yo y mi mascotaYo y mi mascota
Yo y mi mascota
 
Tattoos designs gallery
Tattoos designs galleryTattoos designs gallery
Tattoos designs gallery
 
Films cool q3
Films cool q3Films cool q3
Films cool q3
 
Whistler Animal Shelter - 10th Annual K9 Wine & Dine
Whistler Animal Shelter - 10th Annual K9 Wine & DineWhistler Animal Shelter - 10th Annual K9 Wine & Dine
Whistler Animal Shelter - 10th Annual K9 Wine & Dine
 
Implementation of RISC-Based Architecture for Low power applications
Implementation of RISC-Based Architecture for Low power applicationsImplementation of RISC-Based Architecture for Low power applications
Implementation of RISC-Based Architecture for Low power applications
 
Поэма А.С. Пушкина "Руслан и Людмила"
Поэма А.С. Пушкина "Руслан и Людмила"Поэма А.С. Пушкина "Руслан и Людмила"
Поэма А.С. Пушкина "Руслан и Людмила"
 
Static Slicing Technique with Algorithmic Approach
Static Slicing Technique with Algorithmic ApproachStatic Slicing Technique with Algorithmic Approach
Static Slicing Technique with Algorithmic Approach
 
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...Formal Modeling and Verification of Trusted OLSR Protocol  Using I-SPIN Model...
Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model...
 
Opportunity Arabia 2015 (London, September 14 2015)
Opportunity Arabia 2015 (London, September 14 2015)Opportunity Arabia 2015 (London, September 14 2015)
Opportunity Arabia 2015 (London, September 14 2015)
 
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet  Hiding MethodsJamming Attacks Prevention in Wireless Networks Using Packet  Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
 
Improving search time for contentment based image retrieval via, LSH, MTRee, ...
Improving search time for contentment based image retrieval via, LSH, MTRee, ...Improving search time for contentment based image retrieval via, LSH, MTRee, ...
Improving search time for contentment based image retrieval via, LSH, MTRee, ...
 
Performance Analysis of CSI Based PV system During LL and TPG faults
Performance Analysis of CSI Based PV system During LL and TPG faultsPerformance Analysis of CSI Based PV system During LL and TPG faults
Performance Analysis of CSI Based PV system During LL and TPG faults
 
MAC Protocols: A Review
MAC Protocols: A ReviewMAC Protocols: A Review
MAC Protocols: A Review
 
The prediction of moisture through the use of neural networks MLP type
The prediction of moisture through the use of neural networks MLP typeThe prediction of moisture through the use of neural networks MLP type
The prediction of moisture through the use of neural networks MLP type
 
Tools for Ontology Building from Texts: Analysis and Improvement of the Resul...
Tools for Ontology Building from Texts: Analysis and Improvement of the Resul...Tools for Ontology Building from Texts: Analysis and Improvement of the Resul...
Tools for Ontology Building from Texts: Analysis and Improvement of the Resul...
 
Space 2013
Space 2013 Space 2013
Space 2013
 

Ähnlich wie Secure Model Separates Cloud Storage and Encryption

Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
 
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
Enhancing Availability of Data in Mixed Homomorphic Encryption in CloudEnhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloudijtsrd
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingIJMER
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudIOSR Journals
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computingJahangeer Qadiree
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSIJMER
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 

Ähnlich wie Secure Model Separates Cloud Storage and Encryption (20)

F017414853
F017414853F017414853
F017414853
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
I017225966
I017225966I017225966
I017225966
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
 
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
Enhancing Availability of Data in Mixed Homomorphic Encryption in CloudEnhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in Cloud
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 
Security of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaSSecurity of Data in Cloud Environment Using DPaaS
Security of Data in Cloud Environment Using DPaaS
 
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsData Partitioning Technique In Cloud: A Survey On Limitation And Benefits
Data Partitioning Technique In Cloud: A Survey On Limitation And Benefits
 
A Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud ComputingA Novel Computing Paradigm for Data Protection in Cloud Computing
A Novel Computing Paradigm for Data Protection in Cloud Computing
 
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEnhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Kürzlich hochgeladen

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Kürzlich hochgeladen (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Secure Model Separates Cloud Storage and Encryption

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 1 (Sep-Oct. 2012), PP 01-05 www.iosrjournals.org www.iosrjournals.org 1 | Page A Secure Model for Cloud Computing Based Storage and Retrieval Yaga Reddemma1 , Lingala Thirupathi2 , Sreekanth Gunti3 1,3 Department of CSE, PRRM College of Engineering, Shabad, Ranga Reddy, Andhra Pradesh, India 2 Asst.Prof, Department of CSE, Malla Reddy Institute of Engineering & Technology, Secunderabad, Andhra Pradesh, India Abstract: Enterprises protect their internal storage and retrieval process using firewalls and also protect it from insider attacks by formulating secure data access procedures. If the enterprises are willing to store data in cloud, cloud computing service providers have to take care of data privacy and security. A common way to achieve security is encryption/decryption mechanism employed by cloud service providers. However, performing both tasks such as storage and encryption/decryption mechanism by cloud server causes security problems as the administrators know the sensitive information and may involve in illegal practices. To overcome this problem, this paper presents a mechanism where the storage is done by one provider while encryption/decryption mechanisms are provided by another service provider. In the proposed system the party that uses cloud storage services must encrypt data before sending it to cloud while the service provider who is responsible for encryption/decryption must delete data once encryption/decryption process is completed. To illustrate the proposed mechanism, this paper uses a CRM service example that demonstrates how the parties involved in secure storage and retrieval when data is saved to cloud. It also provides insights into multi-party SLAs for the proposed system. Keywords–SLAs, cloud computing, encryption and decryption, secure storage and retrieval I. Introduction Cloud computing has become a reality recently. Many vendors such as Google, IBM, and Microsoft came up with cloud solutions that enable people and organizations gain access to huge computational and other resources in pay per use fashion. According to Weiss, cloud computing involved many existing technologies [1]. They include utility computing in service oriented fashion [2], grid computing [3] and large data centers that are used to store huge amount of data of cloud users. Before cloud computing came into existence, organizations used to store data in their internal storage media and security is provided by various means to prevent attacks from external and internal users. As organizations need more and more resources they may opt to use cloud services. In such case, their data is directly stored in cloud server maintained by service provider. The data security plays an important role when data is stored in cloud server. Cloud service providers take care of security of their users’ data. However, from user perspective, cloud is not secure. This is because the administrators of cloud storage servers are privileges to have unauthorized access to data of clients. This has to be prevented. This is the motivation behind taking up this research work. This paper proposes the mechanisms to prevent it. Generally service providers provide certain security and service policies which are to be accepted by the clients or users. Every application which needs people involvement has some sort of agreement with clients or users. For instance Yahoo! Web mail needs users consent for its terms and conditions. In cloud environment also the clients might have different storage requirements at different times. These requirements and server’s rules and regulations and any other issues are clearly mentioned in the agreements. Often they are known as service level agreements (SLAs) [4]. The signing on SLAs indicate that users have accepted to the terms and conditions and both service provider and client. Generally security to storage is provided by using encryption and decryption concepts. System administrators are able to access to the private data of users in cloud computing. If this is the case, users’ data may not be secure. This paper focuses on this security threat. We propose a new mechanism where the storage and encryption/decryption are separated into two different cloud servers. In one cloud server data storage takes place securely while other server only takes care of encryption and decryptionoperations to see that data of user remains secure. This paper uses CRM concept to demonstrate the new mechanism proposed. II. Related Work With the advent of Internet began all related technologies to grow in a fast pace. People of all walks of life started using these technologies either directly or indirectly. Businesses became truly global in nature. There are no geographical and time restrictions for merchandise as it can be done online. Recently cloud computing [5] technology came into existence. It is an emerging technology that enables individuals and organizations to gain
  • 2. A Secure Model for Cloud Computing Based Storage and Retrieval www.iosrjournals.org 2 | Page access to huge state-of-the-art resources through Internet in pay per use fashion without capital investment. This concept helps people at large to make use of resources through Internet and pay per use. The resource usage can be adjusted based on the customer requirements [6]. Cloud computing has many kinds such as PaaS (Platform as a Service), IaaS (Infrastructure as a Service), and SaaS (Software as a Service) [7]. The SaaS provides software to cloud clients as service. The IaaS provides infrastructure such as data centers, storage, and secure servers etc to cloud clients. The PaaS provides development platform that enables programmer to write applications that interacts with cloud. There are many data privacy concerns in cloud computing. Improper disclosure of business data to third parties is one of the major concerns [8]. Encryption must be used to properly secure user’s data in cloud [9]. For protecting cloud data the existing methods include FIPS, TDEA, AES, RSA cryptography [10] and ECC [11]. These technologies are capable of providing security to cloud storage. However, there are some problems with these technologies including encrypting/decryption technology for ensuring safe storage. However, the storage and security (encryption/decryption) are mixed in the same server. This may allow administrators of the service provider to have illegal access to cloud storage. This paper addresses this problem by proposing a business model that separates the storage cloud service from encryption/decryption service. This ensures that those services work independently in a loosely coupled fashion. The administrators of both the services can’t directly access the data thus making it more secure. III. Proposed Business Model The proposed business model separates data storage service from that of encryption and decryption service. The separation is as visualized in fig. 1. Storage service is provided by one cloud service provider and encryption/decryption service is provided by another service provider. Fig 3: Encryption/Decryption as an independent service This separation is required as the cloud server administrators might have illegal access to data of the users. To prevent this, the services such as storage and encryption/decryption are separated and moved to different cloud servers. Generally users use cloud environment for specific purposes. For instances SAP’s ERP services [12], Salesforce.com’s CRM service [13] and so on. The data generated by these operations is saved to cloud storage. However, this study advocates an additional cloud server that takes care of encryption/decryption activities which are independent of storage service. This split responsibilities of both the servers have division of labor in functioning that provides more secure to user’s data. Fig. 2 –Proposed Business Model for storing user’s data in cloud As can be seen in fig. 2, user CRM service is taken to demonstrate the new business model. As per this model users interact with CRM cloud service. In turn the CRM service interacts with both storage could service and also encryption/decryption cloud service. The interaction among them is bidirectional. The storage cloud service and encryption/decryption service and CRM service are having bi-directional communication among them.
  • 3. A Secure Model for Cloud Computing Based Storage and Retrieval www.iosrjournals.org 3 | Page Fig. 3 –Data retrieval mechanism in the proposed business model First of all user’s credentials are authenticated by CRM cloud service. Once authentication is done user can access CRM server through which he performs data retrieval and data storage operations. Fig. 3 shows data retrieval operation in detail. As per the user’s instructions the CRM cloud service interacts with storage cloud service and makes data usage request. Then the storage cloud service sends encrypted data which is available in to encryption/decryption service and requests for decryption. The encryption/decryption service takes encrypted data and simply decrypts it and sends the decrypted data to CRM cloud service. SSL (Secure Sockets Layer) is used for encryption and decryption purposes. The last step is that the CRM cloud service sends requested data to end user. Thus secure communication is taking place across all components as part of proposed data retrieval mechanism. Fig. 4 – Data storage mechanism in the proposed business model As can be seen in fig. 4, after due authentication, the end users sends data storage request to CRM cloud service. In turn the CRM cloud service sends unencrypted data to encryption/decryption cloud service. The encryption/decryption cloud service actually encrypts the given content and sends it to storage cloud service where it is stored. Then the storage cloud service sends resultant message to CRM cloud service. IV. Service Level Agreements Service level agreements between the parties involved in cloud computing is essential. In other words there must be business agreements between the cloud service provider and cloud user. The SLA template should cover all possible agreements. This will make it clear to both the parties so that they stick to their promises. The proposed business model involves cloud user, CRM service, storage cloud service and encryption/decryption service. The template for SLAs among them is provided in fig. 5.
  • 4. A Secure Model for Cloud Computing Based Storage and Retrieval www.iosrjournals.org 4 | Page Fig. 5 – SLA Template The proposed business model when SLAs are incorporated becomes a perfect business model where all partners or parties follow ideal practices keeping their agreements in mind. The business model is very secure as all parties involved in SSL communication and the separation of encryption/decryption service from storage service makes is more robust and secure. V. Conclusion This paper has presented a new security mechanism to protect data of cloud users. It proposes separation of storage and encryption/decryption services into two different cloud service providers. The data storage is taken place at one cloud server while the security mechanisms are applied at another cloud server. This ensures the transparency in storage and retrieval. When user sends data to cloud service provider, he has to send it as plain text to encryption/decryption service provider. Then the encryption/decryption service provider encrypts data and sends it to another service provider who is responsible for storage. Thus a secure storage of data is ensured. When user wants to get information from cloud server, a request is made to this effect and the cloud server where data is stored sends encrypted data to cloud server responsible for encryption/decryption. That server decrypts the data and finally the plain text is sent to user securely. In addition to this, in the proposed system multi-party Service Level Agreements (SLAs) are also suggested for father improvement of the system. References [1] A. Weiss, “Computing in the clouds”, netWorker, vol. 11, no. 4, pp. 16-25, December 2007. [2] C. S. Yeo, S. Venugopal, X. Chu, and R. Buyya, "Autonomic metered pricing for a utility computing service", Future Generation Computer Systems, vol. 26, issue 8, pp. 1368-1380, October 2010. [3] M. Baker, R. Buyya, and D. Laforenza, “Grids and grid technologies for wide-area distributed computing,” International Journal of Software: Practice and Experience, vol.32, pp. 1437-1466, 2002. [4] B. R. Kandukuri, V, R. Paturi and A. Rakshit, “Cloud security issues,” in Proceedings of the 2009 IEEE International Conference on Services Computing, pp. 517-520, September 2009. [5] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility,” Future Generation Computer Systems, vol. 25, issue 6, pp. 599-616, June 2008. [6] R. Sterritt, “Autonomic computing,” Innovations in Systems and Software Engineering, vol. 1, no. 1, Springer, pp. 79-88. 2005. [7] L. M. Vaquero,L. Rodero-Merino,J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, January 2009. [8] N. Hawthorn, “Finding security in the cloud,” Computer Fraud & Security, vol. 2009, issue 10, pp. 19-20, October 2009. [9] A. Parakh and S. Kak, “Online data storage using implicit security”, Information Sciences, vol. 179, issue 19, pp. 3323-3333, September 2009. [10] R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems”, Communications of the ACM, vol. 21, no. 2, pp.120-126, 1978. [11] V. Miller, “Uses of elliptic curves in cryptography,” Advances in Cryptology - CRYPTO '85, Lecture Notes in Computer Science, pp. 417-426, 1986. [12] SAP AG., “SAP services: maximize your success,” Retrieved Jan. 2010, from http://www.sap.com/services/index.epx [13] Salesforce.com, Inc., “Force.com platform,” Retrieved Dec. 2009, from http://www.salesforce.com/tw/
  • 5. A Secure Model for Cloud Computing Based Storage and Retrieval www.iosrjournals.org 5 | Page About Authors: Yaga Reddemma received the B.Tech Computer Science, A.P, India and Currently doing M.Tech in Computer Science and Engineering at PRRM College of Engineering, Ranga Reddy, Andhra Pradesh, India. Lingala Thirupathi received the B.Tech (Information Technology),M.Tech (SoftwareEngineering) atSreenidhi Institute of Science & Technology,Secunderabad,AP, India & currently working as anAsst.Professorat Malla Reddy Institute of Engineering & Technology, Secunderabad, AP, India. Sreekanth Guntipursing the M.Tech Computer Science Engineering, Hyderabad, A.P, India at PRRM College of Engineering, Ranga Reddy, Andhra Pradesh, India.