Towards Trustworthy Cloud Storage
نویسندگان
چکیده
The success of cloud computing is driven by the tremendous economic benefit offered to companies, private citizens and public administration to deploy, provision and use cloud services in a cost effective manner. The cloud is gaining increasing importance and applicability in numerous application domains. By shaping the way we access, store, and compute on data, the cloud offers a largely profitable business. Forrester projected that providing access to emails, and social networks will solely contribute towards a multi-billion dollar business by 2020. Clearly, the larger are the utility and extent of the cloud and its services, the greater is the advantage in exploiting, abusing and attacking its components. As a matter of fact, Dropbox claims improper access to accounts using stolen passwords led to a spam attack, and Amazon and Gmail outages have left behind millions of disappointed customers not only because of access to their services but also those services (even third party) that depended on their cloud infrastructure. The literature contains a number of similar incidents that threaten the availability of cloud services, the security of the underlying cloud infrastructure, and the privacy of the cloud customers and users. As a matter of fact, a very recent study by the Centre for European Policy Studies concludes that security is not sufficiently addressed by current cloud technology and strongly underlines that “the challenge of privacy in a cloud context is underestimated, if not ignored.” In this paper, we explore the solution space for enhancing the robustness and security of existing clouds. More specifically, we categorize a multitude of cutting edge techniques according to realistic cloud attacker models. Finally, we portray a “service image” that depicts the integration of these various technologies into one single multi-purpose cloud service. The remainder of this paper is organized as follows. In Section 2, we classify the various attacker models. In Section 3, we outline a taxonomy of solutions that enhance the security and dependability of data stored in the cloud. In Section 4, we present a novel service image that combines the described technologies in a single framework.
منابع مشابه
LINCS: Towards building a trustworthy litigation hold enabled cloud storage system
Litigation holds are inevitable parts of modern civil lawsuits that mandate an organization to preserve all forms of documents related to a lawsuit. In current data storage models, this includes documents stored in clouds. However, due to the fundamental natures of today's clouds, incorporating a trustworthy litigation hold management system is very challenging. To make the situation more compl...
متن کاملEfficient Data Integrity and Reliable Storage Accesses in Cloud using Space Comparison Algorithm
It is very challenging part to keep safely all required data that are needed in many applications for user in cloud. Storing our data in cloud may not be fully trustworthy. Since client doesn't
متن کاملResource Allocation Based on Agreement with Data Security in Cloud Computing
Cloud computing system promises to offer subscription oriented computing services to users worldwide. Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers...
متن کاملSecured Data Consistency and Storage Way in Untrusted Cloud using Server Management Algorithm
It is very challenging part to keep safely all required data that are needed in many applications for user in cloud. Storing our data in cloud may not be fully trustworthy. Since client doesn‟t have copy of all stored data, he has to depend on Cloud Service Provider. But dynamic data operations, Read-Solomon and verification token construction methods don‟t tell us about total storage capacity ...
متن کاملTowards Dynamic Remote Data Auditing in Computational Clouds
Cloud computing is a significant shift of computational paradigm where computing as a utility and storing data remotely have a great potential. Enterprise and businesses are now more interested in outsourcing their data to the cloud to lessen the burden of local data storage and maintenance. However, the outsourced data and the computation outcomes are not continuously trustworthy due to the la...
متن کاملImproving Security and Integrity of Data Storage in Cloud Computing By Using Homomorphic Authentication technique
as we seen that, today’s generation of IT has widely use the cloud computing services, that means in future cloud computing will important part of IT enterprise. In which the application software and databases are stored at centralized large data storage. Now in cloud data center, management of data & services may not be fully trustworthy. This new phenomenon brings many security challenges. Th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014