Enhanced Security For Protecting Data in Cloud Using Layered Approach
Enhanced Security For Protecting Data in Cloud Using Layered Approach
ISSN No:-2456-2165
Abstract:- The major concerns that keep most Cloud computing's progress is now linked to the
organizations away from cloud computing are Security growing popularity of big data, which leads to new trends
and information authenticity. People are wary about such as industry 4.0 big data analysis. In reality, cloud
providing confidential information to unauthorized computing offers the processing, storage, software, and
parties. Individuals or hackers may intercept and modify networking required to handle big data applications [3][4]
electronic documents. Using a password to encrypt data Cloud computing's progress is now linked to the growing
is risky because hackers can gain access to it and exploit popularity of big data, which leads to new trends such as
it to steal data. As a result, this research provides a industry 4.0 big data analysis.
solution by building a model for protecting data in the
cloud via a layered approach. To implement these The cloud is defined as "a model for enabling
concepts, a web system developed with PHP and MySQL ubiquitous, convenient, on-demand network access to a
was employed. The OODM technique was used for shared pool of configurable resources that can be rapidly
components in the system modules, allowing for easy provisioned and released with minimal management effort
coupling, decoupling, modification, encapsulation, and or interaction from service providers." Citing the National
reuse, as well as easy maintainability. When compared to Institute of Standards and Technology (NIST) [1], the
the previous system, which depended simply on strategic implementation of digital health solutions can bring
passwords for authentication, the new technique about transformative benefits. These solutions, including
developed produces a high level of data security. electronic health records, monitoring equipment, telehealth,
electronic communications, data analysis, and cloud-based
Keywords: Data protection, Cloud computing, layered tools, have the potential to diminish health inequalities and
approach. enhance user well-being by revolutionizing the delivery of
care and health services to patients [5].
I. INTRODUCTION
II. CHARACTERISTICS OF CLOUD
Transferring data manually or semi-automatically COMPUTING
leaves it open to tampering. The electoral body is wary of
publishing online election results for fear that hackers will According to the National Institute of Standards and
attempt to modify the tally. Recent events in developing Technology (NIST), cloud computing has five important
economies suggest that storing data in the cloud is a secure qualities.
option for sharing data electronically.
Self-Service on Demand:
The term "cloud" refers to a network of distant servers Cloud computing enables customers to deploy
that are hosted on the Internet and used to store, manage, computer resources such as servers, storage, and
and process data. Cloud computing allows users to access applications automatically and on demand, without the need
and use computer resources such as servers, storage, and for human interaction from a service provider.
apps through the Internet without the need for local
infrastructure or hardware. Cloud computing resources are available via the
network and may be accessed by a variety of devices,
What cloud computing has done for the IT industry is including PCs, laptops, tablets, and mobile phones.Cloud
revolutionary. This information technology can greatly computing resources are pooled and shared among several
reduce the time and resources required to bring a product to users, allowing for more effective
market. With cloud computing, several users can share
resources like storage space and computations. It's best to Resource utilization and cost reduction as needed,
construct and oversee one's infrastructure. resources can be dynamically assigned and de-allocated.
III. CLOUD COMPUTER DEPLOYMENT storage demand. Examples of recognized private cloud
MODELS instances include Amazon Elastic Cloud Compute, Google
App Engine, Blue Cloud from IBM, and Azure Services
Choosing the appropriate form of Cloud Computing to Platform with Windows [9]. In summary, private clouds are
be implemented by an institution is the first and most crucial renowned for providing services to the general public or
stage since it guarantees a successful Cloud Computing The larger institutions through a third-party provider via the
successful implementation of Cloud Computing in an Internet. It is important to note that client data is not
institution is contingent upon understanding that different publicly exposed, as public cloud providers always ensure
types of Cloud Computing require distinct skills and authorized and authenticated access control for their clients.
resources. Numerous institutions have experienced project Private clouds offer a cost-effective and flexible solution
failures due to selecting the wrong Cloud computing model. [9]. According to Parsi & Laharika [10], the public cloud
To prevent implementation failures, it is crucial for has four fundamental characteristics, which are as follows:
institutions to thoroughly assess their data before
determining the most suitable form of Cloud Computing to A Versatile and Scalable Environment:
adopt. Previous research in Cloud Computing has The public cloud, exemplified by platforms like
categorized deployment models into four distinct types Google App Engine and Amazon Elastic Cloud Computing,
based on their distribution and physical location [1]. provides users with a highly adaptable cloud environment.
Optimal use:
The usual data centers in the server resources are used
from 5% to 20%. The reason for this is the crest loads,
which are ten (10) times more than the normal weight. As a
result, servers are often idle, incurring unnecessary costs. By
extending out to open assets to take care of hosts, the hybrid
cloud could extend server use.
Fig 3 Cloud Computing Service Models can be Depicted in a Hierarchical view [8].