A Case Study of Data Security in Cloud Computing

Ensuring the Security and Privacy of Data on Cloud Servers

by Ekta .*, Dr. Yash Pal,

- Published in Journal of Advances and Scholarly Researches in Allied Education, E-ISSN: 2230-7540

Volume 12, Issue No. 2, Jan 2017, Pages 797 - 802 (6)

Published by: Ignited Minds Journals


ABSTRACT

Cloud computing is now a day's turns into the most pulled in marvels to use for vast scale association or for person who require different system administrations with slightest expense. Regularly person's information is put away on public Cloud which is accessible to everybody for access. This major raises some issue inverse to adaptable administrations given by cloud suppliers, similar to Confidentiality, Integrity, Availability, Authorization and some more. As of late, Lots of choices are accessible to secure the data and most ideal courses is to utilize encryption. Encryption can't give enough assurance while thinking about loads of clients' touchy information. It likewise expends more opportunity to perform encryption and unscrambling process for each and every inquiry. Furthermore it is anything but a decent practice to contemplate client driven on the grounds that once client data is transferred on Cloud premises, client doesn't have coordinate authority over this data. Thinking about this reality, we should need to consider the security of client's important information on Cloud server.

KEYWORD

data security, cloud computing, confidentiality, integrity, availability, authorization, encryption, user-driven security, cloud server, data protection

INTRODUCTION

Now a day, everybody is connected with this computerized world by some way and this is the principle purpose for the development of information technology. The primary factor behind this is the easy to use condition that is available from anyplace and whenever. The internet gives office to different gatherings of individuals, for example, agents, analysts, understudies and so forth to finish their works by giving heaps of choices to satisfy their goals. Bunches of clients associate themselves with internet and utilize IT foundation to finish their day to day necessities. As the interest of internet is expanding, the administration gave, for example, Software, Platform, Database services, Storage services and so on through internet likewise step by step increments. Here the imperative terms cloud computing appears which gives enormous measure of various services to its clients through system. As it gives 'Pay as you Go' central client can get most extreme advantages by utilizing this administration for less expensive expense. Cloud is an Internet-based computing technology, where shared assets, for example, software, stage; storage and information are given to clients on interest. Cloud Computing is a computing stage for sharing assets that incorporate foundations, software, applications, and business forms. Cloud Computing is a virtual pool of computing assets. It gives computing assets in the pool for clients through internet. Cloud computing as a rising computing worldview intends to share storage, calculation and services straightforwardly among enormous clients. Current Cloud computing systems presents genuine constraint in ensuring clients' data secrecy. Since clients' touchy data is displayed in decoded structures to remote machines claimed and worked by outsider specialist organizations, the dangers of unapproved divulgence of the clients' delicate data by specialist co-ops might be very high. There are numerous techniques for shielding clients' data from outside aggressors. A methodology is introduced to shielding the secrecy of clients' data from specialist organizations, and guarantees specialist organizations can't gather clients' classified data while the data is prepared and put away in Cloud computing systems. Cloud computing systems give different internet based data storage and services. Because of its many real advantages, including cost viability and high versatility and adaptability, Cloud computing is increasing huge force as of late as another worldview of dispersed computing for different applications, particularly for business applications alongside the fast development of the Internet. With the ascent of the period of "Cloud

to them, and also secure and safe from others? The expression "Cloud" in Cloud computing is the correspondence arrange or a system which is combined with computing framework. Cloud computing framework is gotten to utilizing system which gives software, equipment, handling power and so forth to the client when request is created. Cloud Computing is a virtual pool of computing assets which gives the pool to clients through internet. Cloud Computing gives different services to client by making gathering of groups and networks of PCs. The primary objective behind this is to give services in virtualized way to diminish weight of client to keep up everything independent from anyone else. It likewise alludes to the online computing which furnishes gadgets with shared pool of assets, information or software on interest and pay per-utilize premise. Rather than having neighborhood servers or possess gadgets to oversee applications, individuals utilize sharing computing assets model of Cloud. According to the definition given by the National Institute to Standards and Technology (NIST) "cloud computing is a model for empowering advantageous, on-request organize access to a common pool of configurable computing assets (e.g., networks, servers, storage, applications, and services) that can be quickly provisioned and discharged with insignificant administration exertion or specialist co-op connection‖. Figure 1 Cloud Architecture This study review of the cloud computing wonder by displaying its vision, talking about it scores highlights, and following the mechanical improvements that have made it conceivable. The sector additionally presents some key cloud computing advancements and a few experiences in to improvement of cloud computing situations. services for cell phones are arranged using the conclusion to-end rule. Information and service exchanges are happened between the service suppliers and end-clients. It is joined with Internet-based advances through the explicit models, for instance, Extensible Markup dialect (XML, JavaScript Object Notation (JSON), and Simple Object Access Protocol (SOAP), etc. In today‟s showcase, the bigger piece of "keen gadgets" depends on Apple iOS and Google Android versatile Operating Systems (OS). Rupa P., Douglas B. (2015) They give extreme answers for adaptable stages to satisfy the creating necessities of portable clients. Architects can straightforwardly plot inventive compact applications for adaptable clients. Apple revealed that there are in excess of 75 billion downloads from the AppStore by June 2014, and more than 1.3 million applications open for iOS devices by September 2014. Meanwhile, Google Play came to 25 billion downloads with in excess of 675,000 applications by 26th September 2012.Google did not discharge additional information on the amount of application downloads in the Play advertise. Notwithstanding, the Play business area beats AppStore with in excess of 1 million applications in 2013. The AppBrain gives steady number of available applications in Google Play showcase, and there are 1432174 applications open in the Google Play advertise as of seventeenth December 2014. These portable applications give exceptional solace to people‘s life. Rupa P., Douglas B. (2012) Clients are expanding the enthusiasm of refined applications to achieve more work on their cell phones. The latest advances in versatile correspondence systems and the extending access of PDAs are changing the portable Internet and are empowering end clients with rich versatile experience. In any case, the obliged installed preparing, imperativeness and limit abilities of 15 cell phones are hampering the limit of astute devices to satisfy such demands. For instance, it is inconceivable for a cabin reservation application to continue running on smartphone‘s as remain solitary programming. Since a client needs to download a colossal size database which stores every single related datum, and the cost of activities, for instance, request, refresh and hold from such applications are overwhelming. With an explicit ultimate objective to address these imperatives, Cloud preparing is perceived as a practical arrangement. AlZain M, Pardede E, Soh B & Thom J (2012) There has been a to a great degree clear example towards the assignment of PDA and tablet gadgets that enable clients to run complex applications interfacing with cloud organizations, including media storage facilities, for instance, music spilling, and

that clients will dynamically 18 require driving forward access to cloud applications from an assortment of significantly compact machines. Affiliations are normally made using standard remote bundles information conventions with TCP/IP as the vehicle; their use is reasonably costly. Practically basically, mobile phones have constrained memory, battery life, taking care of execution, accessibility, and available exchange speed when contrasted and work areas, all of which entrap convention layout. Bogdanov A, Mendel F, Regazzoni F, Rijmen V & Tischhauser E (Moriai S) (2014) The client enlistment may fuse a workplace office or a gathering of social colleagues; it is believed to be dynamic and continually progressing, with clients joining and leaving in a relentless and erratic way. Each person from an affirmed client amass is considered to work at an equivalent trust level, yet every information record may require its own specific access assent that may share by any plan of clients. Thusly, there is a many-to-numerous connection between information records and clients in regards to get to rights. For example, a gathering of senior administrators may have permission to an amassing of records, a subset of which may also be accessible to the general population. To the extent the framework show, each client gathering will gain admittance to an accumulation of connected and related records in the cloud called an information fragment. Abraham SE & Gokulavanan R (2013) Portable Cloud computing focuses for using Cloud computing techniques for storage and preparing of information on cell phones to diminish their restriction. It is the blend of portable Internet and Cloud handling. An illustrative example of portable Cloud computing is the way PDA can best utilize the Cloud assets to diminish its vitality use. A computing errand can be either executed on the PDAs or redistributed to the Cloud. Where to process the errand is liable to the overhead exchange offs among count and correspondence while considering the requirements of applications‟ Quality of Service (QoS) and clients" Quality of Experience (QoE) where the QoS insinuates the general execution seen by a client and the QoE suggests the contrast among desires and perceptions for a service from a client. K. Govinda, E. Sathiyamoorthy (2010) Cloud computing has been commonly seen as the future generation‘s handling establishment. It is beneficial by allowing clients to use infrastructure, platforms, and programming given by Cloud servers requiring little to no effort. It compares to another standpoint change in Internet-based services that passes on incredibly adaptable scattered computing stages in which computational assets are offered "as a service". Likewise, Cloud computing engages clients provisioned and released with insignificant organization attempts or service provider‘s affiliations. With the impact of portable applications and the support of Cloud preparing for an assortment of organizations for versatile clients, Mobile Cloud computing is displayed as a mix of Cloud computing into the versatile condition. Versatile Cloud computing brings new sorts of services and comforts for portable clients to misuse Cloud computing. Alexander S. (2012) Cell phones give online information and services to clients from wherever and whenever. Dominant part of the UK portable executives have developed 3G 14 versatile systems and are by and by working ahead on 4G LTE systems which can give enhanced execution contrasted and the 3G systems.

CHARACTERISTICS OF CLOUD:

In my Dissertation work this segments incorporate cloud computing qualities, services models, organization models, advantages, and difficulties. Figure 2 Cloud Computing Popularity The qualities of cloud computing incorporate on-request self-administration, expansive system get to, asset pooling, fast versatility and estimated benefit. On-request self-benefit implies that clients (generally associations) can ask for and deal with their own computing assets. Expansive system gets to enables services to be offered over the Internet or private networks. A straightforward importance of Pooled assets a client draw from a pool of computing assets, normally in remote data focuses. Services can be make for bigger or littler depends of client necessity and utilization of an administration is estimated and clients are charged as needs be.

TYPES OF CLOUD COMPUTING:

Cloud computing technology conveys the computing assets through internet. In cloud computing technology, the computing assets are

dependent on use. They possessed and worked by the cloud suppliers. Person to person communication services, email services, online storage services, and so forth are every one of the few best models for public clouds. The cloud infrastructure of private clouds bargains totally for a specific organization, and is taken care of by that organization or an outsider. Eucalyptus, VMware, Elastra, Microsoft, and so on are each of the couple of good precedents for private clouds. The community clouds, shares the services of at least two organizations and is reachable to that gather as it were. The infrastructures of the community clouds are dealt with by service suppliers or the gathering of organizations. Crossover clouds are the clouds that consolidate a few strategies for assets.

There are three service models dependent on cloud computing which are SaaS, PaaS and IaaS. The SaaS signifies the Software as a Service, PaaS indicates the Platform as a Service and IaaS means the Infrastructure as a Service. Types of Cloud Computing are 1. Software as a service (SaaS): SaaS is conveyance application on the Internet. Without the software introducing and support, the services get to is immediate through the Internet, without mediation of software complexities and the board of equipment. 2. Platform as a Service (PaaS): PaaS speak to a layered piece of the software. In PaaS, the creating condition is joined and the services are given, which are utilized in building higher service levels. The applications can be worked by the client itself and chips away at the infrastructure of the supplier. It offers an officially characterized of working systems and application servers, similar to LAMP platform which means Linux, Apache, MySQL and PHP, Ruby, J2EE,etc. 3. Infrastructure as a Service (Iaas): The basic storage and computing functionalities are given by the IaaS. The clients compose the software‟s to the infrastructure. Amazon, 3 Tera, Go Grid, and so on are dew best instances of IaaS.

CLOUD DEPLOYMENT MODELS:

Here I am present a short presentation of cloud organization show , these all the model are essentially give the offices to client to utilize the cloud benefit in the plain lower cost and without need of some other infrastructure . This is demonstrate the information or cloud technology that ready to move this to in cloud condition with is help of these open client required this . There are three Cloud models which organizations can browse, which are public Cloud computing, private Cloud computing and half breed Cloud computing. These cloud organization demonstrate are as per the following: Private Cloud: This administration of cloud computing is done in disconnected way now here no need of internet offices in the private cloud demonstrate oversee and work with outsider inspector . Figure 3 Organization of Private Cloud.

Private Cloud Computing then again, Private Cloud computing consoles the association that their information and procedures are more secure since everything is overseen inside. As per the National Institute of Standards and Technology (NIST) a private Cloud is a Cloud infrastructure that is worked exclusively for an association. The association or an outsider can oversee it. Private Clouds can exist nearby or off-site Typically private Clouds are utilized when touchy data is included. Figure 2 underneath gives a fundamental representation of an association utilizing a private Cloud.

Public Cloud : This is a Public cloud now here in this administration display public cloud is oversee and compose it's precedent are Amazon cloud benefit. The National Institute of Standards and Technology characterizes a public Cloud as a Cloud infrastructure that is made accessible to the overall population or a substantial industry gathering. Public Clouds are possessed by the organization(s) moving Cloud services. Figure 1.8 beneath gives an essential outline of an association utilizing a public Cloud, Public Cloud computing implies depending on outsiders to offer effective IT services

Figure 4 Organizations of Public Cloud Services Hybrid Cloud – This is the mix of two cloud is call Hybrid cloud in half breed cloud is the information are put away in private cloud condition after the controlled by a program running in on the public cloud condition . Half breed Cloud computing is a blend of both private and public services. Community Cloud – The primary center is community Cloud is security and data will be partaken in efficient way its objective to give a security prerequisites cloud approach, and consistence report. This is for the most part done by the outsider reviewer. G-Cloud – G-implies Government this based for Government Cloud service this is a sort of Private cloud that will be handle by Government field just .In this cloud condition principle assignment is finished by government organizations .

CLOUD SECURITY CONTROLS:

Cloud security design is successful just if the right protective executions are set up. An effective cloud security design ought to perceive the issues that will emerge with security the executives. The security the executives tend to these issues with security controls. These controls are set up to shield any shortcomings in the framework and diminish the impact of an assault. While there are numerous sorts of controls behind cloud security engineering, they can as a rule be found in one of the accompanying classes:- 1. Preventive control: Preventive controls fortify the framework against episodes, for the most part by decreasing if not really disposing of vulnerabilities. Solid verification of cloud clients, for example, makes it more outlandish that unapproved clients can get to cloud systems, and more probable that cloud clients are decidedly distinguished. to any occurrences that happen. In case of an assault, a detective control will flag the deterrent or remedial controls to address the issue. Framework and system security checking, including interruption recognition and avoidance courses of action, are commonly utilized to recognize assaults on cloud systems and the supporting interchanges infrastructure. 3. Corrective controls: Restorative controls diminish the results of an occurrence, typically by restricting the harm. They become effective amid or after an episode. Reestablishing framework reinforcements with the end goal to remake a traded off framework is a case of a restorative control. 4. Dimensions of cloud security: It is for the most part prescribed that information security controls be chosen and actualized concurring and in extent to the dangers, regularly by surveying the dangers, vulnerabilities and effects.

CONCLUSION:

Even Cloud computing provides numerous advantages to user but still due to security issues many users hesitate to adopt it as well the service provider may have a issue about un authorized access. So, to solve issue related to both user and service provider, we developed a new framework by proposing combination of encryption and obfuscation technique together. Before sending data on Cloud encryption, it provides security to the data which is on transition in the network by which user ensures the confidentiality of his data. We have proposed a secure storage sever which keep track of user keys as well hash of the document uploaded on the server. For the Cloud providers, efficient obfuscation technique is proposed by which the secret information of Client like password, contact details etc. are not tempered by third party, The steps for algorithm are also figured out which ensure the efficient working of operations. We have also provided detailed analysis about the outcome produced by the implemented model by considering very important parameters like time and security.

REFERENCES:

1. Priyank R., Varun S., Priyanka C. (2014). ―Data Protection in Cloud Computing ―in IJITEE, ISSN: 2278-3075, Volume-3, Issue-3. 2. Rupa P., Douglas B. (2015). ―Privacy Preserving Collaborative Filtering using

3. Rupa P., Douglas B. (2012). ―Privacy Preserving Collaborative Filtering using Data Obfuscation‖ In International Conference on Granular Computing IEEE. 2012. 4. AlZain M., Pardede E., Soh B. & Thom J. (2012). ‗Cloud computing security: from single to multi-clouds‘, 45th Hawaii International Conference on System Science (HICSS), 2012 pp. 5490-5499. 5. Bogdanov A., Mendel F., Regazzoni F., Rijmen V. & Tischhauser E., Moriai S. (2014). ALE: AES-Based Lightweight Authenticated Encryption, in Fast Software Encryption, vol. 8424, Springer Berlin Heidelberg, pp. 447-466. 6. Abraham S.E. & Gokulavanan R. (2013). ‗Ensuring Privacy and Security in Data Sharing under Cloud Environment‘, International Journal of Computer Applications Technology and Research, vol. 2, no. 2, pp. 188-194. 7. K. Govinda, E. Sathiyamoorthy (2010). ―Building Trust and Confidentiality in Cloud computing Distributed Data Storage‖, West African Journal of Industrial & Academic Research, Vol. 6 No.1 March 2010, pp. 78-83. 8. Alexander S. (2010). ―Venus verification for untrusted cloud storage‖ In CCSW '10 Proceedings of the 2012 ACM workshop on Cloud computing security workshop. 9. Hongwei L., Xiaodong L., Haomiao Y., Xiaohui L., Rongxing L. & Xuemin S. (2014). ‗EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid‘, IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 8, pp. 2053-2064. 10. Kaitai L., Man Ho A., Liu JK, Susilo W., Wong D.S., Guomin Y., et. al. (2014). ‗A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing‘, IEEE Transactions on Information Forensics and Security, vol. 9, no. 10, pp. 1667-1680. 11. Lee K. (2012). ‗Security threats in cloud computing environments‘, International Journal of Security and Its Applications, vol. 6, no. 4, pp. 25-32.

Corresponding Author Ekta*

Research Scholar of OPJS University, Churu, Rajasthan