Data Storage in Cloud Computing

Published on May 2016 | Categories: Documents | Downloads: 58 | Comments: 0 | Views: 607
of 6
Download PDF   Embed   Report

Comments

Content

DATA STORAGE IN CLOUD COMPUTING
N.SWATHY NANDHINI Lecturer/IT, Jayam college of Engineering & Technology,Dharmapuri.

ABSTRACT Cloud envisioned as Computing the next has been

features, Opposing to its predecessors. By utilizing the homomorphism token with distributed verification of ensure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s). INTRODUCTION Cloud computing is a term used to describe both a platform and type of application. A cloud computing platform dynamically provisions, configures,

generation

architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the

reconfigures, and deprovisions servers as needed. Servers in the cloud can be physical machines or virtual machines. Advanced clouds typically include other computing resources such as storage area networks (SANs), network equipment, firewall and other security devices. Cloud

correctness of users’ data in the cloud, we propose distributed an effective and flexible

scheme with two salient

1

computing also describes applications that are extended to be accessible through the Internet. These cloud applications use large data centers and powerful servers that host Web applications and Web services. Anyone with a suitable Internet connection and a standard browser can access a cloud application. Cloud

appending, ordering. Cloud Storage is a model of networked computer data

storage where data is stored on multiple virtual servers, generally hosted by third parties, rather than being hosted on dedicated servers. Hosting companies operate large data centers; and people who require their data to be hosted buy or lease storage capacity from them and use it for their storage needs. The data center operators, in the background, virtualize the resources according to the

computing describes a new supplement, consumption, and delivery model for IT services based on the Internet, and it typically involves over-the-Internet

provision of dynamically scalable and often virtualized resources.Moving data into the cloud offers great

requirements of the customer and expose them as virtual servers, which the customers can themselves manage.

convenience to users since they don’t have to care about the complexities of direct hardware management. DATA STORAGE Cloud computing is not a third party data ware house. The data stored in cloud may frequently updated by the user by insertion, deletion, modification,

Physically, the resource may span across multiple servers.A cloud is a pool of virtualized computer resources.

2

more than a collection of computer resources because a Cloud provides a mechanism to manage those resources. Management includes provisioning,

change requests, reimaging, workload rebalancing, monitoring. A cloud can: 1. Host a variety of different workloads, including batch-style back-end jobs and interactive, user-facing applications 2. Allow workloads to be deployed and scaled-out quickly through the rapid provisioning of virtual machines or Some have a very specific focus, such as storing Web e-mail messages or digital pictures. Others are available to store all forms of digital data. Some cloud storage systems are small operations, while others are so large that the physical equipment can fill up an entire warehouse. The facilities that house cloud storage self-recovering, systems are called data centers. At its most basic level, a cloud storage system needs just one data server connected to the Internet. A client (e.g., a computer user subscribing to a cloud storage service) sends copies of files over the Internet to the data server, which then records the information. When the client wishes to deprovisioning, and

physical machines 3. Support redundant,

highly scalable programming models that allow workloads to recover from many unavoidable hardware/software failures 4. Monitor resource use in real time to enable rebalancing of allocations when needed Cloud computing environments support grid computing by quickly

providing physical and virtual. A cloud is 3

retrieve the information, he or she accesses the data server through a Webbased interface. The server then either sends the files back to the client or allows the client to access and manipulate the files on the server itself. Cloud storage systems generally rely on hundreds of data servers. Because computers occasionally require

redundancies and guarantee the data dependability. This construction

drastically reduces the communication and storage overhead as compared to the traditional replication-based file

distribution techniques. 1. Compared to many of its predecessors, which only provide binary results about the storage state across the distributed servers, the challenge-response protocol in our work further provides the localization of data error. 2. Unlike most prior works for ensuring remote data integrity, the new scheme supports secure and efficient dynamic operations on data blocks, including: update, delete and append. 3. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data

maintenance or repair, it's important to store the same information on multiple machines. This is called redundancy. Without redundancy, a cloud storage system couldn't ensure clients that they could access their information at any given time. PROPOSED SYSTEM It is an effective and flexible distributed scheme with explicit dynamic data support to ensure the correctness of users’ data in the cloud. We rely on erasure correcting distribution code in the file to provide

modification attack, and even server colluding attacks.

preparation

4

EXAMPLES OF CLOUD STORAGE There are hundreds of cloud storage providers on the Web, and their numbers seem to increase every day. Not only are there a lot of companies competing to provide storage, but also the amount of storage each company offers to clients seems to grow regularly.

way.

Here

are

a

few

well-known

companies that offer some form of cloud storage:


CONCERNS ABOUT CLOUD STORAGE The two biggest concerns about

cloud storage are reliability and security. Clients aren't likely to entrust their data to another company without a guarantee that they'll be able to access their information whenever they want and no one else will be able to get at it. To secure data, most systems use a combination of techniques, including:


Encryption, which means they use a complex algorithm to encode information. To decode the encrypted files, a user needs the encryption key. While it's possible to crack encrypted information, most hackers don't have access to the amount of computer

David

S.

Holloway/Getty

Images

These servers store Electronic Health Records (EHR) for the Military Health System, allowing doctors to access health records of patients instantly. You're probably familiar with several providers of cloud storage services, though you might not think of them in that

5

processing power they would need to decrypt information.




CONCLUSION Cloud storage companies live and

Authentication processes, which require to create a user name and password.

die by their reputations. It's in each company's best interests to provide the most secure and reliable service possible. If a company can't meet these basic client expectations, it doesn't have much of a chance -- there are too many other options available on the market.



Authorization practices the client lists the people who are authorized to access information stored on the cloud system. Many corporations have multiple levels of

authorization. Even with these protective measures in place, many people worry that data saved on a remote storage system is

vulnerable. There's always the possibility that a hacker will find an electronic back door and access data. Hackers could also attempt to steal the physical machines on which data are stored. The other big concern, reliability, is just as important as security. An unstable cloud storage system is a liability.

6

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close