Secure Data Storage and Retrieval Using Adaptive Integrity Protocol Model in Cloud Environment
Keywords:
Cloud Computing, Multi-cloud, Integrity, Isolation Preserving Auditing, ITPAAbstract
Cloud computing is provide a dynamically scalable resources provisioned as a service over the webpage. The third-party, on-demand, self-service, pay-per-use, and seamlessly scalable computing resources and services offered by the cloud environment promise to reduce capital as well as operational expenditures for hardware and software. Various distinct architectures are introduced and discussed according to their security and privacy capabilities and prospects. It provides four distinct models in form of abstracted multi-cloud architectures. These developed multi cloud architectures allow to categorize the available schemes and to analyze them according to their security reimbursement. An assessment of the different methods replication of applications, partition of application system into tiers, partition of application logic into fragments and partition of application data into fragments is given in particular. In addition, enabling public audit ability for cloud storage is of critical importance so that users can resort to an Integrity third party auditor (ITPA) to check the integrity of outsourced data and be worry-free. This paper proposes a secure cloud storage system supporting Isolation-preserving public auditing. It further extends the result to enable the ITPA to perform audits for multiple cloud users simultaneously and efficiently.
References
S. Bugiel, S. Nurnberger, T. Poppelmann, A.-R. Sadeghi, and T.Schneider, ―AmazonIA: When Elasticity Snaps Back,‖ Proc. 18th ACM Conf. Computer and Comm. Security (CCS ’11), pp. 389-400, 2011.
Amazon Elastic Compute Cloud (Amazon EC2).http://aws.amazon.com/ec2/.
D. Catteddu (Ed.): Security & Resilience in Governmental Clouds – Making an informed decision. ENISA Report, January 2011.
J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, ―All Your Clouds Are Belong to Us: Security Analysis of Cloud Management Interfaces,‖ Proc. Third ACM Workshop Cloud Computing Security Workshop (CCSW ’11), pp. 3-14, 2011.
P. Mell and T. Grance: The NIST Definition of Cloud Computing (Draft). Recommendations of the National Institute of Standards and Technology (NIST), Special Publication 800—145 (Draft), available at http://csrc.nist.gov/publications/drafts/800-145/Draft-SP-800-145_cloud-definition.pdf, January 2011.
G. Danezis and B. Livshits, ―Towards Ensuring Client-Side Computational Integrity (Position Paper),‖ Proc. ACM Cloud Computing Security Workshop (CCSW ’11), pp. 125-130, 2011.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
