21-12-2012, 01:38 PM
SPECIALIZATION IN DATA SECURITY
SPECIALIZATION.doc (Size: 261.5 KB / Downloads: 25)
INTRODUCTION
Cloud storage is an industry term for managed data storage through hosted network (typically Internet-based) service. Several types of cloud storage systems have been developed supporting both personal and business uses.
Personal File Hosting
The most basic form of cloud storage allows users to upload individual files or folders from their personal computers to a central Internet server. This allows users to make backup copies of files in case their originals are lost. Users can also download their files from the cloud to other devices, and sometimes also enable remote access to the files for other people to share.
Hundreds of different providers offer online file hosting services. File transfers work over standard Internet protocols like HTTP and FTP. These services also vary in:
• Storage capacity and network bandwidth quotas.
• Network transfer speeds supported.
• price (some are free or ad-based, while others are based on data usage)
• software interface (some are browser-based while others utilize dedicated -application clients)
Enterprise Storage
Businesses can utilize cloud storage systems as a commercially-supported remote backup solution. Either continuously or at regular intervals, software agents running inside the company network can securely transfer copies of files and database data to third-party cloud servers. Unlike personal data that is generally stored forever, enterprise data tends to quickly grow obsolete and backup systems include retention policies that purse useless data after time limits have passed.
Choosing a Cloud Storage Provider
While using a cloud storage system brings advantages, it also has downsides and involves risk. Selecting the right provider for your given situation is critical. Consider the following:
• Cost. Vendors charge fees for at least their more advanced service offerings. Service plans may be divided into tiers according to usage, with penalty fees charged if you exceed the specified quotas. So-called "free" services can place serious restrictions (quotas) on the amount of data which can be stored in or accessed from the cloud. Carefully consider your storage needs before locking into a subscription: Buy enough capacity and capability to support you and your organization, and try to avoid long-term contracts that can cause serious issues later when your needs grow.
BACKGROUND
Several trends are opening up the era of Cloud Computing, which is an Internet-based development and use of computer technology. The ever cheaper and more powerful processors, together with the “software as a service” (SaaS) computing architecture, are transforming data centers into pools of computing service on a huge scale. Meanwhile, the increasing network bandwidth and reliable yet flexible network connections make it even possible that clients can now subscribe high-quality services from data and software that reside solely on remote data centers. Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understood.
JUSTIFICATION
Cloud computing is becoming popular. More and more project managers will be interacting with cloud computing, either developing clouds, using clouds, or selecting among cloud and non-cloud alternatives to accomplish their projects. Both public and private cloud providers count on data core storage virtualization software to address several aspects of their environment. These include: Reduce short and long-term storage infrastructure costs,
PROBLEM STATEMENT AND OBJECTIVES
Storing important data with cloud storage providers comes with serious security risks. The cloud can leak confidential data, modify the data, or return inconsistent data to different users. This may happen due to bugs, crashes, operator errors, or misconfigurations. So, the cloud data security requires authentication and integrity analysis for the storage data values. Public data auditability and data dynamics model ensures the integrity of data storage in Cloud Computing. In existing project they have introduced the third party auditor (TPA) is allowed to verify the integrity of the dynamic data stored in the cloud. TPA can perform multiple auditing tasks simultaneously. But there is a primary problem to ensure security that’s provides by the third party is not trust based.
We enhance our work to erasure code that provides redundancy by breaking objects up into smaller fragments and storing the fragments in different places. The key is that you can recover the data from any combination of a smaller number of those fragments. In erasure cloud based storage we have proposed a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval,