Abstract
Cloud computing, often referred to as simply the cloud, appears as an emerging computing paradigm which promises to radically change the way computer applications and services are constructed, delivered, managed and finally guaranteed as dynamic computing environments for end users. The cloud is the delivery of on-demand computing resources - everything from applications to data centers - over the Internet on a pay-for-use basis. The revolution of cloud computing has provided opportunities for research in all aspects of cloud computing. Despite the big progress in cloud computing technologies, funding concerns in cloud, security may limit a broader adoption. This paper presents a technique to tolerate both accidental and intentional faults, which is fragmentation-redundancy-scattering (FRS). The possibility to use the FRS technique as an intrusion tolerance one is investigated for providing secure and dependable storage in the cloud environment. Also a cloud computing security (CCS) based on the FRS technique is proposed to explore how this proposal can then be used via several scenarios. To demonstrate the robustness of the proposal, we formalize our design and we carry out a security as well as performance evaluations of the approach and we compare it with the classical model. The paper concludes by strongly suggesting future research proposals for the CCS framework.
Highlights
The cloud is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet
The FRS technique consists in fragmenting confidential information in order to produce insignificant fragments and scatter the fragments so obtained in a redundant fashion across a distributed system like data centers according to a particular algorithm [41][43]
Some issues related to data security have been discussed, some concepts related to intrusion tolerance have been quoted
Summary
Cloud computing adoption leads to gain efficiency development, effectiveness deployment and cost saving in purchasing and maintaining infrastructure. This indicates that the cloud industry is promising, except that existing vulnerabilities in this technology will increase the threat of pirates for data security in the cloud computing. The other part of the paper is organized as follows: Section 2 gives a background about cloud computing architecture, discusses about few security issues, threats and challenges of CC, identifies a security technique to protect data from intrusion attacks and poor storage strategies, which is IDA, and discusses current state of data encryption in the cloud.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.