0% found this document useful (0 votes)
29 views4 pages

Cloud Protection and Security

This document summarizes a paper on protecting and securing data in cloud computing. It discusses the risks to data security in cloud environments, including data loss, virtualization issues, and risks of public cloud data storage. It also differentiates between data at rest, which refers to stored data accessible via the internet, and data in transit, which is data moving in and out of cloud storage. The best approach to protect data in transit is encryption technology, encrypting data before storing it across different devices and decrypting it when retrieved. Data security in cloud computing depends on the three service models of Infrastructure as a Service, Platform as a Service, and Software as a Service.

Uploaded by

desx redj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views4 pages

Cloud Protection and Security

This document summarizes a paper on protecting and securing data in cloud computing. It discusses the risks to data security in cloud environments, including data loss, virtualization issues, and risks of public cloud data storage. It also differentiates between data at rest, which refers to stored data accessible via the internet, and data in transit, which is data moving in and out of cloud storage. The best approach to protect data in transit is encryption technology, encrypting data before storing it across different devices and decrypting it when retrieved. Data security in cloud computing depends on the three service models of Infrastructure as a Service, Platform as a Service, and Software as a Service.

Uploaded by

desx redj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Special Issue - 2017 International Journal of Engineering Research & Technology (IJERT)

ISSN: 2278-0181
ICPCN - 2017 Conference Proceedings

Protection and Security of Data in Cloud


Computing
3. 4.
1.
E. Poonguzhali 2.
Suhas Rao M V Shanth GK Mujasem Khanum
Department of CSE Department of CSE Department of CSE Department of CSE
AMCEC, Bengaluru AMCEC, Bengaluru
AMCEC, Bengaluru AMCEC, Bengaluru

Abstract- Cloud Computing is the current trend in the modern


technology. Data Security and Data Privacy plays an important
role in Cloud Computing. Data Protection is concerned with all
the aspects of security of data present in the cloud. There are
many data protection methods which are approachable by people
to make sure there is less threats and risks. The data present in
the cloud is sharable and can be accessed by many applications,
but at times it might be risky to expose the data for those
applications which have security loopholes in them. The concepts
of Data at Rest and Data in Transit are discussed briefly.
Different levels of services such as Software as a Service(SaaS),
Platform as a Service(PaaS) and Infrastructure as a
Service(IaaS) are highlighted.

Keywords— Data Security, Cloud Computing, Data Protection, For clouds to be used for the data storage purpose, the
Privacy, Risks and threats doubt which arises is that if we could make use of the third
party service providers of cloud or if we could create a
I. INTRODUCTION organizational internal cloud. When the sensitiveness of the
Cloud computing is a type ofInternetbased computing that data is too high to store on a public cloud, we use internal
provides shared computer processing resources and data to organizational cloud. National security data and other highly
computers and other devices on demand. Cloud computing is confidential data are the examples of data which are not to be
when data is stored in a central server, rather than being stored in public cloud. In public cloud, Data exposure could
distributed locally. For instance, you may log into your iCloud lead to problem which might turn serious. Thus, storing data
account on all of your devices, and your data appears to be in cloud which is internally organized is highly recommended.
stored on each device. In actuality, your data is kept on
Apple's server, and pulled to each device when it is needed. There are various techniques that are used in the world to
Computation in Cloud is service oriented concept and not protect and secure the data. This paper discussesthe threats
application based concept. Thus, being service oriented caused to the data in the cloud and also tells about the various
infrastructure overhead and the cost ownership is reduced. It solutions given by the service providers.
ensures maximum flexibility and the end user gets improved
performance [2, 3]. II. LITERATURE REVIEW
In "Cloud Computing Basics," there are
Privacy and security are the major concerns in usage of information about the different applications which can be
cloud for data [4]. Features of Data such asprivacy, integrity made and developed by using the cloud computing concept. It
and protection must be upheld. Different mechanisms and might be very helpful for the developing world.
policies are used by different service providersdepending on
the type of data, size of data and nature of data. In Cloud Large Enterprises still would not prefer cloud
Computing, the main advantage is that various organizations
can share the data.But, the advantage causes data to be at risk. because of the security concerns and the issues faced in the
Therefore, risk to the data needs to be overcome and thus data cloud environment. To find an optimal solution to all of these
protection is very much required. issues faced, there are many surveys going on and many
service models have been suggested to overcome the issues.

Based on Cloud structure there are many proposed models


on data security and the issues faced in securing the data.
Many software has been developed to enrich the data security
models.

Volume 5, Issue 19 Published by, www.ijert.org 1


Special Issue - 2017 International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
ICPCN - 2017 Conference Proceedings
III. SECURITY RISKS, SECURITY THREATS AND in the cloud which is at rest and Data at Transit means the
CONCERNS IN CLOUD ENVIRONMENT data which is moving in/out of the cloud.
A. Data in Rest
A. Loss of Data or Data Leakage By the means of Internet, if we are able to access the data
An example that can be given for data loss is modifying present in the cloud, then that data is referred to as Data in
or deleting a certain set of data present in the cloud without rest. It also includes live data and backup data as well.
taking the backup of the older version of data. This can lead to
data loss or any other harmful consequences. Other ways B. Data at Transit
through which problems may arise is by forgetting the The data which moves out/in to the cloud is referred to as
encryption keys which may lead to unauthorized access to Data at Transit. The data here could be of the form of a
people. Stealing Data is also one of the major threats in the database or a file stored in the cloud. This data can be used at
computing world. any other location points throughout the world.

B. Virtualization
Virtualization software allows you to run other Operating
Systems completely inside your installed OS. Allocation and
de-allocation of resources is the main risk in virtualization.
Problems may arise if the OS doesn’t clear the memory before
performing every new task. Memory needs to cleared just after
that particular task is finished. If not, Data will be exposed
which is very big problem.

C. Public Cloud Data Storage


Fig a : Data at Rest and in Transit.
In Public Cloud, Data storage is very much risky. Hackers
try and target public cloud which has less privacy. Thus we The best way to protect Data at Transit is by
are recommended to use private clouds. Encryption technology. The proposed solution is to add a
program to encrypt the data before being fragmented and
C. Multitenancy duplicated on the different storage devices and integrate the
Resources such as memory, storage, CPU etc. could be decryption functionality in restitution program so that the
used by multiple users and this will lead to multitenancy encrypted data will then be decrypted by the restitution
which is a major risk in the cloud computing world. Private program to present them to the user. Since the size of data to
clouds also sometimes lead to accidental leakage of data to store is generally big, we should use the symmetric encrypting
algorithm with the same cryptographic key to both decrypt and
other users if multiple users access the same resources at a
encrypt the data.
time. One system failure may cause other systems failures and
access to private systems become easier.

IV. CLOUD DATA SECURITY


In cloud computation, data security is not only concerned
with encryption but also many other processes. Data security
requirements is related by and totally depends on these three
level of service models, i.e. IaaS, PaaS, and SaaS.
Data is said to be at risk if it is in one of the forms, Data in
Rest and Data at Transit. Data in Rest refers to the stored data

Volume 5, Issue 19 Published by, www.ijert.org 2


Special Issue - 2017 International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
ICPCN - 2017 Conference Proceedings
V. MAJOR SECURITY CHALLENGES B. Stream Cipher
The major challenges involved are: The mechanism depends on the current state of cipher and
thus its called state cipher. The encryption process is
performed on each bit rather than block of data at a time.
• Isolation failure

• Malicious attacks from management internally

• Insecure or incomplete data deletion

• Data interception

• Compromise of management interface

VI. ENCRYPTION PROCESS


There might be different techniques to Data in rest and Data at Fig d: Stream Cipher Mechanism
Transit. The keys used to encrypt data in data at transit is for a
lesser period of time but the keys used for encryption for data The data is now in stream of encrypted bits which later
in rest can be of longer time. Thus, it shows the difference of again needs to be decrypted by using a key of decryption and
usage of keys. an algorithm of it which produces back the plain text from the
cipher text.

C. Using AES as an encryption algorithm to crypt data


AES is abbreviated as Advanced Encryption Standard which
is a symmetric encryption algorithm. The Encryption and
Decryption algorithm is stated below.

Inp : table T1 , key K1


Out : table T1 altered
FuncAES (T1, K1)
Fig b: Basic Cryptography Process Start
KeyExpansionFunc (K1, TK1);
In the cryptographic process, the plain text is converted to AddKeyRoundFunc (T1, TK1 [0];
cipher text by usage of a key called as encryption key. The for (j = 1; j<NR; j + +)
cipher text which is resulted after the encryption process is Round (T1, TK1 [j]);
next decrypted by usage of a key known as decryption key. FinalRoundFunc(T1, TK1 [NR]);
The types of cryptography process are: End
Encryption algorithm
A. Block Ciphers
In data Encryption, an algorithm and a cryptographic key
is applied for a block of data rather than applying it for each Decryption(T1, K1)
bit at a given time. {
At the end of this mechanism, cipher text is formed which KeyExpansionFunc(K1, RK);
again needs to be decrypted in order to bring it back to the AddRoundKeyFunc(State, RK[NR]);
human understandable form. for (j=NR-1; j>0; j--)
{
InvShiftRowsFunc(T1);
InvSubBytesFunc(T1);
AddRoundKeyFunc(T1, RK[j]);
InvMixColumnFunc(T1);
}
InvShiftRowsFunc(Outp);
InvSubBytesFunc(Outp);
AddRoundKeyFunc(Outp,RK[0]);
}
Decryption Algorithm
Fig c: Block Cipher Mechanism

Volume 5, Issue 19 Published by, www.ijert.org 3


Special Issue - 2017 International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
ICPCN - 2017 Conference Proceedings
REFERENCES
VII. CONCLUSION
[1] J. Srinivas, K. Reddy, and A. Qyser, “Cloud Computing
Several security issues were highlighted and Basics,” Build. Infrastruct. Cloud Secur., vol. 1, no.
September 2011, pp. 3–22, 2014.
appropriate measures were suggested to be followed. All [2] M. A. Vouk, “Cloud computing - Issues, research and
the concepts namely Virtualization, Public cloud data implementations,” Proc. Int. Conf. Inf. Technol.Interfaces,
storage, Multitenancy were briefed. The encryption ITI, pp. 31–40, 2008.
[3] P. S. Wooley, “Identifying Cloud Computing Security
process was explained and the different mechanisms of Risks,” Contin. Educ., vol. 1277, no. February, 2011.
encryption were discussed. The different states of data are [4] A. Alharthi, F. Yahya, R. J. Walters, and G. B. Wills,
shown. An AES model was displayed which could be “An Overview of Cloud Services Adoption Challenges in
Higher Education Institutions,” 2015.
followed by people around the world. Block Cipher and [5] MostaphaDerfouf, "Vulnerabilities and storage security in
Stream Cipher mechanisms were shown with the cloud computing", 2015.
diagrams in detail. [6] Dr.K.B.PriyaIyer, "Analysis of cloud security", 2016

Volume 5, Issue 19 Published by, www.ijert.org 4

You might also like