Cloud Data Security Using Filters Authentication and Encryption

Authors

  • Ashim Sarkar  Senior Faculty, NIIT, Ranchi Jharkhand India

Keywords:

VPN, Authentication, Security, Filtering, Encryption

Abstract

The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is something, which is present at remote location. Cloud can provide services over network, i.e., on public networks or on private networks, i.e., WAN, LAN or VPN. Applications such as e-mail, web conferencing, customer relationship management (CRM), all run in cloud. Cloud is a technology invention. It provides the computational resources (Server, Storage, OS and Network) to user as service based on demand. Cloud computing has emerged as a popular solution to provide cheap and easy access to externalized Information Technology resources. An increasing number of organizations benefit from Cloud computing to host their applications [1]-[2]. Cloud Computing refers to manipulating, configuring, and accessing the applications online. It offers online data storage, infrastructure and application.Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet users requirements and applications. It can be thought of or considered as a complete or a partial outsourcing of hardware and software resources. To access cloud applications, a good Internet connection and a standard Internet browser are required. The National Institute of Standard and Technology defines cloud computing in the following way: Cloud Computing is a model for enabling convenient, on demand network access to share pool of configurable computing resources e.g. networks, services, storage, applications that can be rapidly provisioned and released with minimal management effort or service provider interaction [6].Many vendors declared that adoption of this technology can bring many benefits to the users such as cost reduction, convenience and continuous availability, scalability and performance, quick deployment and ease of integration, yet some organization are still not feeling comfortable in adoption of this technology due to concerns of trust and security e.g., data security is one of them [7, 8]. One of the best ways to ensure confidentiality of secret data in the cloud is to utilize encryption for data. Almost all cloud service providers support encryption for data storage [10]. To protect user‘s secret data in the cloud, encryption is considered as essential tool that can be used efficiently. User can confidently utilize cloud services by knowing that their confidential data is protected by encryption.In cloud computing, Security of file or data is provided to the end user in the private cloud environment. The main concern is to provide the security to end user to protect files or data from unauthorized user. Difference is that the research is done in cloud, but security related issue can’t be resolved completely. Security is the main intention of any technology through which unauthorized users can't access your file or data in cloud. In this research work we are going to resolve cloud data security issues through Filter Authentication and Encription.In particularly, we intend to discuss cloud security requirement and data privacy issues. In this research work we are proposing three layers of security architecture using Filters as First Layer Authentication as second Layer and encryption as third Layer to provide complete data security in the cloud.

References

  1. J.Srinivas, K.VenkataSubba Reddy and Dr.A.MoizQyser, ”Cloud Computing Basics”, International Journal of Advanced Research in Computer and Communication EngineeringVol.1, Issue 5, pp 343-347, 2012.
  2. Chunye Gong, Jie Liu, Qiang Zhang, Haitao Chen and Henghu Gong, ”The Characteristics of Cloud Computing”, 39th International
  3. Gartner, “What you need to know about cloud computing security and compliance”, (HeiserJ), [online] 2009, https://www.gartner.com/doc/1071415/need-know-cloud-computing- Security (Accessed 23 December 2013).
  4. Z. Yandong and Z. Yongsheng, “Cloud computing and cloud security challenges in Information Technology in Medicine and Education (ITME)”, 2012 International Symposium on, (2012), pp. 1084-1088.
  5. “Security Guidance For Critical Areas Of Focus In Cloud Computing V3.0”, https://cloudsecurityalliance.org/research/security-guidance/
  6. NIST Definition of cloud Computing V15 http://csrc.nest.gov/groups/SNS/cloudcomputing/clouddef- V15.doc
  7. Harauz, J., Kauifman, M., Potter, B.: Data Security in the world of cloud computing. IEEE Security & Privacy 7(4), 61–64 (2009)
  8. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(1), 1–11 (2011)
  9. Takabi, H., Joshi, J.B.D.: Security and Privacy Challenges in Cloud Computing Environments. Published. IEEE Security and Privacy 8(6), 24–31 (2010)
  10. Chen, D., Zhao, H.: Data Security and Privacy Protection Issues in Cloud Computing. In: Int. Conference on Computer Science and Electronics Engineering, pp. 647–651 (2012)
  11. Rahul, S.S., Rai, J.K.: Security & Privacy Issues In Cloud Computing. International Journal of Engineering Research & Technology (IJERT) 2(3) (March 2013)
  12. Hashizume, K., Rosado, D.G., Medina, E.F., Fernandez, E.: An analysis of security issues for cloud computing. Journal of Internet Services and Applications 4(5) (2013)
  13. Reddy, V.K., Thirumala, R.B., Reddy, L.S.S., Kiran, S.: Research Issues in Cloud Computing. Global Journal of Computer Science and Technology 11(11) (July 2011)
  14. Argall, K.: Compliance in a Cloud Computing Environment. HIPAA and PCI DSS (2010)
  15. Ren, K., Wang, C., Wang, Q.: Security Challenges for the Public Cloud. Journal of InternetComputing IEEE 16(1) (2012)
  16. Lovell, R.: White Paper: Introduction to cloud computing (October 2009)
  17. Pearson, S., Benameur, A.: Privacy, Security and Trust Issues Arising from Cloud Computing. In 2nd International Conference on Cloud Computing Technology and Science (2010)
  18. Ayala, L.C., Vega, M., Vargas, L.M.: Emerging Threats, Risk and Attacks in Distributed Systems: Cloud Computing. In: Elleithy, K., Sobh, T. (eds.) Innovations and Advances in Computer, Information, Systems Sciences, and Engineering. LNEE, vol. 152, pp. 37–52. Springer, Heidelberg (2013)
  19. Rana, S., Joshi, P.K.: Risk Analysis in Web Applications by Using Cloud Computing. International Journal of Multidisciplinary Research 2 (January 2012)
  20. Khajeh- Hosseini, A., Sommerville, I., Bogaerts, J., Teregowda, P.: Decision Support Tools for Cloud Migration in the Enterprise. In: IEEE CLOUD 2011 (November 2011)
  21. D. Catteddu and G. Hogben, “Cloud computing: Benefits, risks and recommendations for information security”, European Network and Information Security Agency (ENISA), pp. 1–125.
  22. S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing”, Journal of Network and Computer Applications, vol. 34, no. 1, (2011), pp. 1-11.
  23. T. Dillon, C. Wu and E. Chang, “Cloud computing: issues and challenges”, Paper presented at the Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on. (2010).
  24. AmanBakshi and Yogesh B, “Securing cloud from DDOS Attacks using Intrusion Detection System in VM”, IEEE, 2010, pp. 260-264.

Downloads

Published

2017-06-30

Issue

Section

Research Articles

How to Cite

[1]
Ashim Sarkar, " Cloud Data Security Using Filters Authentication and Encryption, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 3, pp.916-924, May-June-2017.