CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Risk Involved in Cloud Data Storage and its Safety Measures

by K. Mythili, S. Rajalakshmi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 2
Year of Publication: 2014
Authors: K. Mythili, S. Rajalakshmi
10.5120/18176-9067

K. Mythili, S. Rajalakshmi . Risk Involved in Cloud Data Storage and its Safety Measures. International Journal of Computer Applications. 104, 2 ( October 2014), 25-27. DOI=10.5120/18176-9067

@article{ 10.5120/18176-9067,
author = { K. Mythili, S. Rajalakshmi },
title = { Risk Involved in Cloud Data Storage and its Safety Measures },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 2 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 25-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number2/18176-9067/ },
doi = { 10.5120/18176-9067 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:35:08.083205+05:30
%A K. Mythili
%A S. Rajalakshmi
%T Risk Involved in Cloud Data Storage and its Safety Measures
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 2
%P 25-27
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a technology which will facilitate companies or organisation to host their services without worrying about IT infrastructure and other supporting services. Usually cloud computing services are delivered by a third party – Cloud Service Provider(CSP) provider who owns the infrastructure. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. In this paper we focus on risks involved in data storage in cloud computing and solutions to minimize the risks.

References
  1. Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou, "Toward Secure and Dependable Storage Services in Cloud Computing" IEEE Transactions on services computation vol. 5, no. 2, April-June 2012.
  2. C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," Proc. 17th Int'l Workshop Quality of Service (IWQoS '09), pp. 1-9, July 2009.
  3. A. Juels and B. S. Kaliski Jr. , "PORs: Proofs of Retrievability for Large Files," Proc. 14th ACM Conf. Computer and Comm. Security (CCS '07), pp. 584-597, Oct. 2007.
  4. Sun Microsystems, Inc. , "Building Customer Trust in Cloud Computing with Transparent Security," https://www. sun. com/offers/details/sun_transparency. xml, Nov. 2009.
  5. K. Ren, C. Wang, and Q. Wang, "Security Challenges for the Public Cloud," IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, 2012.
  6. M. A. Shah, M. Baker, J. C. Mogul, and R. Swaminathan, "Auditing to Keep Online Storage Services Honest," Proc. 11th USENIX Workshop Hot Topics in Operating Systems (HotOS '07), pp. 1-6, 2007.
  7. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," Proc. 14th European Conf. Research in Computer Security (ESORICS '09), pp. 355-370, 2009.
  8. Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, 2011.
  9. Cloud_Security_Alliance (2009, April). "Security Guidance forCritical Areas of Focus in Cloud Computing. " Retrieved Nov 25, 2009, from http://www. cloudsecurityalliance. org/guidance/csaguide. pdf
  10. Addressing Cloud Computing Security Issues, Future generation computer systems (2011) www. elsevier. com/locate/fgcs.
Index Terms

Computer Science
Information Sciences

Keywords

Security Cloud Service Provider access control data Server Software License Agreement