Data Security In Cloud Computing

Read Complete Research Material

DATA SECURITY IN CLOUD COMPUTING

Data Security in Cloud Computing

Table of Contents

Table of Contents2

1.Introduction3

1.1 Statement of Problem3

1.2 Aims and Objectives6

1.3.Approach and Methodology6

chapter II8

2.0 Literature Review8

2.2 Cloud Computing Security Issues11

2.3 Technical Security Issues13

2.4Requirements of Data Security in Cloud Computing16

chapter III21

3.0 First Approache21

3.1 Data Access Procedure21

3.2 Dynamics in user Access Rights23

3.3 Dynamics in Outsourced Data25

5.1.4. Integrity27

3.4 Analysis of Overhead29

3.5 Conclusion30

3.6 Summary31

chapter IV33

4.0 Second Approach:33

4.1 Data Security model for Cloud Computing33

4.1 Conclusion36

4.2 Summary37

chapter V38

5.0 Third Approach38

Ensuring Data Storage Security in Cloud Computing38

5.1 Challenge Token Preparation40

5.2 Correctness Verification and Error Localization42

5.3 File Retrieval and Error Recovery44

5.4 Providing Dynamic Data Operation Support45

5.4.1 Update Operation46

5.6 Summary46

Chpater VI47

6.1. Recommendation47

6.2. Future Work47

chapter VII48

7.0 Conclusions48

Chapter 1

1.Introduction

1.1 Statement of Problem

Cloud computing, which allows for highly scalable computing applications, storage, and platforms, is increasing in importance throughout government information technology (IT) strategy. Cloud computing providers offer a variety of services to individuals, companies, and government agencies, with users employing cloud computing for storing and sharing information, database management and mining, and deploying web services, which can range from processing vast datasets for complicated scientific problems to using clouds to manage and provide access to medical records (Hand, 2007). Recently, President Barack Obama and Chief Technology Officer (CTO) Vivek Kundra have both expressed the vision to explore the cloud as a key component in the federal IT transformation, and therefore agency use of cloud computing capabilities has increased ([Jackson, 2009] and [Miller, 2009b]).

Although many benefits are reported in cloud computing use, a great deal of risk is associated with the implementation, management, and use of cloud computing technologies. In a government context, both tangible risks (such as the risk of unauthorized access, infrastructure failure, or unavailability) and intangible risks (such as confidence in the technologies capabilities, and public access) are introduced along with the functionality and benefits provided by cloud applications. The government's ability to manage these risks will be a key determinant in the success of cloud computing.

This paper discusses the nature of cloud computing and risk management in a governmental context. The risks associated with cloud computing are identified, focusing on both the tangible and intangible risks which can present challenges for IT management. We argue that much evidence exists that cloud computing has become a strategic direction for many government agencies and is already employed in critical areas of the government's IT infrastructure. However, a prudent and in-depth risk management program must accompany the use of this new technology in order to prevent unwanted technical consequences, and even greater problems from a government information management perspective. “Cloud” computing has been receiving much attention as an alternative to both specialized grids and to owning and managing one's own servers. Currently available articles, blogs, and forums focus on applying clouds to industries outside of biomedical informatics. In this article, we describe the fundamentals of cloud computing and illustrate how one might evaluate a particular cloud for biomedical purposes. Typically, laboratories purchase local servers for computation- or data-intensive tasks that cannot be performed on desktop ...
Related Ads