Abstract

Cloud computing, often referred to as simply the cloud, appears as an emerging computing paradigm which promises to radically change the way computer applications and services are constructed, delivered, managed and finally guaranteed as dynamic computing environments for end users. The cloud is the delivery of on-demand computing resources - everything from applications to data centers - over the Internet on a pay-for-use basis. The revolution of cloud computing has provided opportunities for research in all aspects of cloud computing. Despite the big progress in cloud computing technologies, funding concerns in cloud, security may limit a broader adoption. This paper presents a technique to tolerate both accidental and intentional faults, which is fragmentation-redundancy-scattering (FRS). The possibility to use the FRS technique as an intrusion tolerance one is investigated for providing secure and dependable storage in the cloud environment. Also a cloud computing security (CCS) based on the FRS technique is proposed to explore how this proposal can then be used via several scenarios. To demonstrate the robustness of the proposal, we formalize our design and we carry out a security as well as performance evaluations of the approach and we compare it with the classical model. The paper concludes by strongly suggesting future research proposals for the CCS framework.

Highlights

  • The cloud is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet

  • The FRS technique consists in fragmenting confidential information in order to produce insignificant fragments and scatter the fragments so obtained in a redundant fashion across a distributed system like data centers according to a particular algorithm [41][43]

  • Some issues related to data security have been discussed, some concepts related to intrusion tolerance have been quoted

Read more

Summary

INTRODUCTION

Cloud computing adoption leads to gain efficiency development, effectiveness deployment and cost saving in purchasing and maintaining infrastructure. This indicates that the cloud industry is promising, except that existing vulnerabilities in this technology will increase the threat of pirates for data security in the cloud computing. The other part of the paper is organized as follows: Section 2 gives a background about cloud computing architecture, discusses about few security issues, threats and challenges of CC, identifies a security technique to protect data from intrusion attacks and poor storage strategies, which is IDA, and discusses current state of data encryption in the cloud.

CC architecture
CCS challenges and issues
Related works
Fragmentation-Redundancy-Scattering technqiue
Introduction
Applying FRS for data storage and recovery
The proposal in multi-clouds
SIMULATIONS AND EVALUATIONS OF OUR PROPOSAL
Scenarios and results
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.