Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A Case of Multilevel Security Application for Ensuring Data Integrity (Prevention and Detection) in Cloud Environment

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 96 - Number 15
Year of Publication: 2014
Authors:
Rajani Sharma
Rajender K Trivedi
10.5120/16873-6774

Rajani Sharma and Rajender K Trivedi. Article: A Case of Multilevel Security Application for Ensuring Data Integrity (Prevention and Detection) in Cloud Environment. International Journal of Computer Applications 96(15):43-48, June 2014. Full text available. BibTeX

@article{key:article,
	author = {Rajani Sharma and Rajender K Trivedi},
	title = {Article: A Case of Multilevel Security Application for Ensuring Data Integrity (Prevention and Detection) in Cloud Environment},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {96},
	number = {15},
	pages = {43-48},
	month = {June},
	note = {Full text available}
}

Abstract

Cloud computing is a collective, optimized usage of IT resources which can be accessed from anywhere and performs the task of providing IT resources and services through various platforms as a service for users. Cloud users use different services of Cloud service providers and eventually end up keeping their data (in various forms) in cloud multi tenant environment. Multi-tenancy in cloud environment makes data vulnerable though with times different forms of threats and corresponding securities are already implemented in cloud environment. Although many of these services provide key functionality such as uploading and retrieving files by a precise user, more on going to the side of advanced services it offer features such as shared folders, real-time collaboration, and minimization of data transfers or unlimited storage space. As data is placed publically it require to search ways to protect the data from unauthorized access, files are uploaded publically and need to retrieve them securely with token ensuring possession proofs. In this paper we have presented a case of multilevel security application for ensuring data integrity (prevention and detection) in cloud environment.

References

  • Bowman, M. , Debray, S. K. , and Peterson, L. L. 1993. Reasoning about naming systems. .
  • Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  • Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  • Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  • Sannella, M. J. 1994 Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398. , University of Washington.
  • Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  • Brown, L. D. , Hua, H. , and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  • Y. T. Yu, M. F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
  • Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender
  • Arkaitz Ruiz-Alvarez and Marty Humphrey. 2012. A Model and Decision Procedure for Data Storage in Cloud Computing. In Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012) (CCGRID '12). IEEE Computer Society, Washington, DC, USA, 572-579. DOI=10. 1109/CCGrid. 2012. 100 http://dx. doi. org/10. 1109/CCGrid. 2012. 100Sangroya A, Kumar S, Dhok J, Varma V. Towards analyzing data security risks in cloud computing environments. Communications in Computer and Information Science; 2010;54:255–265.
  • H. Takabi, J. B. D. Joshi, and G. -J. Ahn, "SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments," Proc. 1st IEEE Int'l Workshop Emerging Applications for Cloud Computing (CloudApp 2010), IEEE CS Press, 2010, pp. 393–398.
  • SRINIVAS, J. , K. VENKATA SUBBA REDDY, and A. MOIZ QYSER. "CLOUD COMPUTING BASICS. "International Journal of Advanced Research in Computer and Communication Engineering,Vol. 1, Issue 5, July 2012.
  • Subashini,V. Kavitha "A survey on security issues in service delivery models of cloud computing. " Journal of Network and Computer Applications 34(1): 1-11.
  • http://dx. doi. org/10. 1016/jRoopa,Manjunath. " Secure Way of Storing Data in Cloud Using Third Party Auditor. "CNE, CMRIT Bangalore, India.
  • Martin, S. Schrittwieser, et al. Dark clouds on the horizon. "using cloud storage as attack vector and online slack space". Proceedings of the 20th USENIX conference on Security. San Francisco, CA, USENIX Association.
  • Giuseppe, R. Burns, et al. "Remote data checking using provable data possession. " ACM Trans. Inf. Syst. Secure. 14 (1): 1-34.
  • L. chen. "Using algebraic signatures to check data possession in cloud storage. " Future Gener. Comput. Syst. 29 (7): 1709-1715.
  • Sowparnika,R. Dheenadayalu"Improving data integrity on cloud storage services," IEEE Transactions on Knowledge and Data Engineering, Volume 23, no. 9, pp. 1432-1437, September, 2011.
  • Dawei, G. Chang,et al. " Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments, ProcediaEngineering. "Volume 15, 2011, Pages 2852-2856, ISSN 1877-7058.
  • At Dropbox, Over 100 Billion Files Served–And counting, retrieved May 23rd, 2011. Online at http://gigaom. com/2011/05/23/at dropbox-over-100-billionfiles- served-and-counting/.
  • Fatima Alkandari and Richard F. Paige. 2012. Modelling and comparing cloud computing service level agreements. In Proceedings of the 1st International Workshop on Model-Driven Engineering for High Performance and CLoud computing (MDHPCL '12). ACM, New York, NY, USA, , Article 3 , 6 pages. DOI=10. 1145/2446224. 2446227 http://doi. acm. org/10. 1145/2446224. 2446227.
  • TekinBicer, David Chiu, and Gagan Agrawal. 2012. Time and Cost Sensitive Data-Intensive Computing on Hybrid Clouds. In Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012) (CCGRID '12). IEEE Computer Society, Washington, DC, USA, 636-643. DOI=10. 1109/CCGrid. 2012. 95 http://dx. doi. org/10. 1109/CCGrid. 2012. 95.
  • Gang Sheng, Tao Wen, QuanGuo, and Ying Yin. 2013. Verifying correctness of inner product of vectors in cloud computing. In Proceedings of the 2013 international workshop on Security in cloud computing (Cloud Computing '13). ACM, New York, NY, USA, 61-68. DOI=10. 1145/2484402. 2484416 http://doi. acm. org/10. 1145/2484402. 2484416.
  • Siani Pearson. 2009. Taking account of privacy when designing cloud computing services. InProceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing(CLOUD '09). IEEE Computer Society, Washington, DC, USA, 44-52. DOI=10. 1109/CLOUD. 2009. 5071532 http://dx. doi. org/10. 1109/CLOUD. 2009. 5071532.
  • Jose Simão and Luis Veiga. 2012. VM Economics for Java Cloud Computing: An Adaptive and Resource-Aware Java Runtime with Quality-of-Execution. In Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)(CCGRID '12). IEEE Computer Society, Washington, DC, USA, 723-728. DOI=10. 1109/CCGrid. 2012. 121 http://dx. doi. org/10. 1109/CCGrid. 2012. 121.
  • Kamal Dahbur, Bassil Mohammad, and Ahmad BisherTarakji. 2011. A survey of risks, threats and vulnerabilities in cloud computing. In Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications (ISWSA '11). ACM, New York, NY, USA, , Article 12 , 6 pages. DOI=10. 1145/1980822. 1980834http://doi. acm. org/10. 1145/1980822. 1980834.
  • Rajender K Trivedi and Rajani Sharma. Article: Proposed Framework of Private Cloud Setup in Lab for Teaching and Research. International Journal of Computer Applications 92(1):26-31, April 2014. Published by Foundation of Computer Science, New York,USA.