INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.6, No.10, Sep. 2014

A Smart and Generic Secured Storage Model for Web based Systems

Full Text (PDF, 709KB), PP.48-56


Views:70   Downloads:3

Author(s)

P.Iyappan, V.PrasannaVenkatesan

Index Terms

Cloud Computing;Data Integrity;Auditability;Accountability;Data Storage;Data Dynamics

Abstract

Nowadays, Recent developments shows that, Cloud computing is a milestone in delivering IT services based on the Internet. Storage as a Service is a type of business model which rents storage space for smaller companies or even for individuals. The vendors are targeting secondary storage by promoting this service which allows a convenient way of managing backups instead of maintaining a large tape library. The key advantage of using Storage service is cost savings of hardware and physical storage spaces. In securing Storage as a Service model, there is a need for a middleware to monitor the data transmission among cloud storage and various clients. The objective of the system aims at developing a smart and integrated dynamic secured storage model which acts as a middleware in supporting all the primary security goals such as confidentiality, data integrity, and accountability. This proposed model will provide secured data dynamics, access controls and auditability. The secured data dynamics is done by Boneh Franklin-Identity Based Cryptography. This model enhances the accounting model in adding indexing policies and provides security in the audit logs through password based cryptography along with AES. This is a generic middleware assisting the basic security features for any cloud environment, so that it can be equipped for any type of system. The main advantage of the proposed system is to reduce the time complexity in encryption and decryption process and also to provide higher degree of security. We also leveraged the implementation of this middleware in a mail server environment with drive option which poses file storage and enables file sharing among the drive users.

Cite This Paper

P.Iyappan, V.PrasannaVenkatesan,"A Smart and Generic Secured Storage Model for Web based Systems", IJCNIS, vol.6, no.10, pp.48-56, 2014. DOI: 10.5815/ijcnis.2014.10.06

Reference

[1]Irshad Ahmad Mir, S.M.K Quadri, “Analysis and Evaluating Security of Component-Based Software Development: A Security Metrics Framework”, I. J. Computer Network and Information Security, DOI: 10.5815/ijcnis.2012.11.03, 2012.

[2]Charles Babcock, “Management Strategies for the Cloud Revolution How Cloud Computing Is Transform”, Tata McGraw Hill, 2010.

[3]Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, “Ensuring Data Storage Security in Cloud Computing,” International workshop on Quality of Service”, July 2009.

[4]Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou, “Toward Secure and Dependable Storage Services in Cloud Computing “, IEEE Transactions on Services Computing, June 2012.

[5]Kumarjit Banerjee, Satyendra Nath Mandal, Sanjoy Kumar Das, “Improved Trial Division Technique for Primality Checking in RSA Algorithm, PP.51-57, DOI: 10.5815/ijcnis.2013.09.07, 2013.

[6]Kuyoro S.O, Ibikunle F & Awodele O, “Cloud Computing Security Issues and Challenges”, International Journal of Computer Networks, 2011.

[7]Miao Zhou, YiMu, WillySusilo, JunYan, LijuDong, “Privacy enhanced data outsourcing in the cloud”, Journal of Network and Computer Applications, February 2012.

[8]Nir Kshetri, “Privacy and Security Issues in Cloud Computing: The Role of Institutions and Institutional Evolution”, Journal on Telecommunications Policy, 2012.

[9]Pradnyesh Rane, “Securing SaaS Applications: A Cloud Security Perspective for Application Providers,” Information Systems Security, 2010.

[10]Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, Jin Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing”, IEEE Transactions on Parallel and Distributed Systems, May 2011. 

[11]Rajkumar Buyya, James Broberg, Andrzej Goscinski, “Computer Computing Principles and Paradigms”, John Wiley & Sons, 2011.

[12]Ristenpart T, Tromer E, Shacham H, Savage S, “Hey, you, get off of my cloud: exploring information leakage in third- party compute clouds”, CCS, 2009.

[13]Rohit Bhadauria, Rituparna Chaki, Nabendu Chaki and Sugata Sanyal, “A Survey on Security Issues in Cloud Computing”, IEEE Communications Surveys and Tutorials, September 2011.

[14]Seccombe A, Hutton A, Meisel A, Windel A, Mohammed A and Licciardi A. “Security guidance for critical areas of focus in cloud computing”, Cloud Security Alliance, 2009.

[15]Smitha Sunderswaran, Anna C. Squicciarini, Dan Lin, “Ensuring Distributed Accountability For Data Sharing In The Cloud”, IEEE Transactions on Dependable and Secure Computing, August 2012.

[16]Subashini S, Kavitha V, “A Survey on Security Issues in Service Selivery Models of Cloud Computing”, Journal of Network Computer Application, December 2010.

[17]W. Li, L. Ping, X. Pan, “Use trust management module to achieve effective security mechanisms in cloud environment,” International Conference on Electronics and Information Engineering, 2010.

[18]Zaigham Mahmood, Richard Hill, “Cloud Computing for Enterprise Architectures”, Computer Communications and Networks – Springer”, 2011.