Architectural Data Security in Cloud Computing

  IJCOT-book-cover
 
International Journal of Computer & Organization Trends  (IJCOT)          
 
© 2014 by IJCOT Journal
Volume - 4 Issue - 4
Year of Publication : 2014
Authors :  Dr.P.K.Rai , Rajesh Kumar Bunkar
DOI :  10.14445/22492593/IJCOT-V10P306

Citation

Dr.P.K.Rai , Rajesh Kumar Bunkar . "Architectural Data Security in Cloud Computing", International Journal of Computer & organization Trends (IJCOT), V4(4):23-27 July - Aug 2014, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract

Cloud Computing sees a methodological and educational shift of computing assessment provision from being provided locally to being provided remotely, and by third-party examine provider. Data that was once housed under the security area of the service user has now been placed under the protection of the service provider. Users have misplaced control over the safety of their data: No longer is our data kept under our own watchful eyes. This paper shows data canter model for cloud computing and architecture of cloud computing.

References

[1]. Brian Hayes. ‘Cloud computing’. In: Commun.ACM 51.7(2008), pp.9–11issn:0001-0782.doi: http://doi.acm.org/10.1145/1364782.1364786.URL:http://portal.acm.org/citation.cfm?doid=1364782.1364786
[2]. Colin Ho. Apache flaw opens systems up to attack English.ZDNetUK.Mar.2010.url:http://www.zdnet.co.uk/news/security-threats/2010/03/08/apache-flaw-pens-systems-up-to-attack-40077943/.
[3]. Daniel Nurmi, Rich Wolski et al. ‘The Eucalyptus Open-Source Cloud- Computing System’. In: CCGRID ’09: Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.ashington, DC, USA: IEEE Computer Society, 2009, pp. 124–131. ISBN:978-0-7695-3622-4.doi: . http://dx.doi.org/10.1109/CCGRID.2009.93
[4]. Dan Hubbard, Michael Sutton et al. Top Threats to Cloud Computing v1.0.Tech. rep. V1.0. Cloud Security Alliance, Mar. 2010Url:http://www. cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf.
[5]. English. Amazon Web Services LLC. url: http://aws.amazon.com/.
[6]. Meiko Jensen, Nils Gruschka and Norbert Luttenberger. ‘The Impact of Flooding Attacks on Network-based Services’. In: ARES ’08: Proceedings of the 2008 Third International Conference on Availability, Reliability and Security. Washington, DC, USA: IEEE Computer Society, 2008, pp. 509–513.isbn:978-0- 7695-3102-1.doi: http://dx.doi.org/10.1109/ARES.2008.16.
[7]. Meiko Jensen, Jorg Schwenk et al. ‘On Technical Security Issues in Cloud Computing’. In: Cloud Computing, IEEE International Conference on 0 (2009), pp.109–116.doi: http://doi.ieeecomputersociety.org/10. 1109/CLOUD.2009.60.
[8]. Philippa J. Broadfoot and Andrew P. Martin. A Critical Survey of Grid Security Requirements and Technologies. Tech. rep. PRG-RR-03-15. Wolf- son Building Oarks Road Oxford OX1 3QD: Oxford University Computing Laboratory, 2003.urlhttp://www.comlab.ox.ac.uk/files/930/RR-03-15.ps.gz.
[9]. Phil Wong. Conversations about the Internet #5: Anonymous Facebook Employee. English. The Rumpus. Jan. 2010. url: http://therumpus. net / 2010 / 01 / conversations - about - the - internet - 5 - anonymous - facebook-employee.
[10]. Siani Pearson. ‘Taking account of privacy when designing cloud comput- ing services’. In: CLOUD ’09: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing. Washington, DC, USA: IEEE Computer Society, 2009, pp. 44–52. isbn: 978-1-4244-3713-9.doi: http://dx.doi.org/10.1109/CLOUD.2009.5071532.
[11]. Thomas Ristenpart, Eran Tromer et al. ‘Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds’. In: 16th ACM Conference on Computer and Communications Security CCS’09. Nov. 2009.
[12]. Odunayo O. Owopetu, Private Cloud Implementation and Security Using EUCALYPTUS and XEN Frameworks.

Keywords
Cloud Architecture, Data Security, Data centre Security issues.