A Secured Distributed and Data Fragmentation Model for Cloud Storage

Article Preview

Abstract:

The increasing popularity of cloud service is leading people to concentrate more on cloud storage than traditional storage. However, cloud storage confronts many challenges, especially, the security of the out-sourced data (the data that is not stored/retrieved from the tenants own servers). Security not only can keep the data from attacking but also can recover the original data after attack efficiently. Thus, to address the security issue, we proposed a new distributed and data fragmentation model of cloud storage named DDFM (Distributed and Data Fragmentation Model). DDFM aims to provide tenants a secured and integrated cloud storage service with layer-to-layer protection strategy. The layer-to-layer protection strategy of our model includes three main algorithms: the Authentication and Authorization Management Algorithm based on OpenID and OAuth, the Data Fragment Algorithm based on Granular Computing and the Haystack File Storage Algorithm. Considering tenants' security requirement our model DDFM based on these algorithms provided a better decision of cloud storage architecture for our tenants. Furthermore, DDFM can defense most of the network threats and provide a secured way for the third-party applications to access sensitive information that stored on the cloud storage.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2693-2699

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Talasila Sasidhar, Pavan Kumar Illa, and Subrahmanyam Kodukula, A Generalized Cloud Storage Architecture with Backup Technology for any Cloud Storage Providers, International journal of computer application, ISSN: 2250-1797, Issue2, Vol. 2, April (2012).

Google Scholar

[2] Kevin D. Bowers, Ari Juels, and AlinaOprea, HAIL: A High-Availability and Integrity Layer for Cloud Storage, Proceedings of the ACM Conference on Computer and Communications Security, pp.187-198, (2009).

DOI: 10.1145/1653662.1653686

Google Scholar

[3] Hakim Weatherspoon, Patrick Eaton, Byung-Gon Chun, and John Kubiatowicz, Antiguity: exploiting a secure log for wide-area distributed storage, " EuroSys , 07 Proceedings of the 2nd ACM SIGOPS, June 2007, pp.371-384.

DOI: 10.1145/1272996.1273035

Google Scholar

[4] Zhaoji Lin, Ping Lu, Shengmei Luo, Feng Gao, and Jianyong Chen, An On-Demand Security Mechanism for Cloud-Based Telecommunications Service, ZTE Communications, Vol. 9 No. 1, March (2011).

Google Scholar

[5] Runxiu Wu, Shuixiu Wu, and Qing Liu, Data fragment algorithm based on granular compuring, Journal of Computer Applications, June 2007, Vol. 27 No. 6, pp.1388-1391.

DOI: 10.1109/grc.2008.4664726

Google Scholar

[6] Doug Beaver, Sanjeev Kumar, Harry C. Li, Jason Sobel, Peter Vajgel, Finding a needle in Haystack: facebook's photo storage, Proceedings of the 9th USENIX conference on Operating system design and implementation, Article No. 1-8.

Google Scholar

[7] Eric Eldon, Single sign-on service OpenID getting more usage, Available: http: /venturebeat. com/2009/04/14/single-sign-on-service-openid-getting-more-usage.

Google Scholar

[8] Yashaswi Singh, Farah Kandah, Weiyi Zhang , A Secured Cost-effective Multi-Cloud Storage in Cloud Computing, 2011 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2011, pp.619-624, (2011).

DOI: 10.1109/infcomw.2011.5928887

Google Scholar

[9] Danish Jamil, Hassan Zaki, Cloud Computing Security, International Journal of Engineering Science and Technology(IJEST), ISSN : 0975-5462, Vol. 3 No. 4 April (2011).

Google Scholar

[10] Anu Gopalakrishnan, Cloud Computing Identity Management, SETLabs Briefings, Vol. 7 No. 7 (2009).

Google Scholar

[11] Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati, Fragmentation and Encryption to Enforce Privacy in Data Storage,. Springer-Verlag, Lecture notes in Computer Science, (2008).

DOI: 10.1007/978-3-540-74835-9_12

Google Scholar