Data Security Essay Example
Data Security Essay Example

Data Security Essay Example

Available Only on StudyHippo
  • Pages: 4 (838 words)
  • Published: June 8, 2017
  • Type: Article
View Entire Sample
Text preview

Cloud Computing is considered the future of IT Enterprise architecture, as opposed to traditional solutions in which the IT services are controlled physically, logically, and by personnel. Instead, Cloud Computing transfers application software and databases to large data centers, whose management of data and services may not be entirely trustworthy. However, this unique attribute presents new security challenges that have not been fully comprehended. This article focuses on cloud data storage security, a crucial aspect of service quality. To ensure the accuracy of users' data in the cloud, we propose a flexible and effective distributed scheme with two distinctive features that oppose its predecessors.

By using homomorphic tokens and distributed verification of erasure-coded data, our scheme integrates storage correctness insurance and data error localization. This allows for identification of misbehaving server(s) while also supporting secure and efficient dynamic operations on data blo

...

cks such as update, delete, and append. Through extensive security and performance analysis, our proposed scheme has been proven highly efficient and resilient against Byzantine failure, malicious data modification attack, and server colluding attacks. Cloud Computing is experiencing growth due to various trends.

Advancements in processor technology and software as a service (SaaS) computing architecture have enabled cloud computing vendors like Amazon Simple Storage Service (S3) and Amazon Elastic Compute Cloud (EC2) to transform data centers into large-scale computing service pools. This shift towards cloud computing is facilitated by reliable, flexible network connections and expanded network bandwidth that allow users to subscribe to high-quality services from remote data centers. As a result, users enjoy greater convenience by eliminating the need to manage complex hardware directly.

Despite offering vast storage and customizable computing resources, cloud-based online services ar

View entire sample
Join StudyHippo to see entire essay

shifting the responsibility of data maintenance away from local machines. Consequently, users rely entirely on their cloud service providers to ensure data availability and integrity. Unfortunately, the recent downtime of Amazon's S3 is a clear example of the potential risks associated with cloud computing [2]. Additionally, Cloud Computing introduces new security threats due to the users' lack of control over their data, making traditional cryptographic protection methods ineffective.

Checking the accuracy of cloud data storage is difficult without full visibility of the data. This task is made more complex by the range of user data types and the need for long-term protection. It's important to note that Cloud Computing extends beyond third-party data warehousing and involves ongoing updates such as insertion, deletion, modification, and reordering, making it even harder to guarantee correct data in the cloud.

Ensuring data storage accuracy and accommodating dynamic updates is essential. However, traditional measures for preserving integrity are inadequate, posing a challenge. Cloud Computing addresses this by utilizing multiple data centers that operate from a distributed perspective. These centers redundantly store a user's information at several physical sites for enhanced protection against threats to data accuracy.

Developing distributed protocols for storage correctness assurance is essential to achieving a secure and robust cloud data storage system in the real world. Unfortunately, this crucial area remains largely unexplored in literature. Recent research highlights the importance of ensuring remote data integrity, but existing techniques that verify storage correctness without requiring user possession of data cannot address all security threats within cloud data storage due to their focus on single server scenarios and inability to consider dynamic data operations. To supplement these methods, researchers have proposed

distributed protocols that ensure storage correctness across multiple servers or peers. However, none of these schemes can handle dynamic data operations, which may limit their applicability to cloud data storage.

This paper presents a distributed scheme that supports dynamic data while ensuring the accuracy of user data in the cloud. We use erasure-correcting code to provide redundancies during file distribution, resulting in reduced communication and storage costs compared to replication-based techniques. Additionally, our scheme utilizes homomorphic tokens and distributed verification to achieve storage correctness insurance and error localization for erasure-coded data. This allows for almost guaranteed detection and identification of misbehaving servers when data corruption is detected during storage correctness verification.

Our work is a pioneering effort in the realm of Cloud Computing with regards to distributed data storage. The key contribution of our work is the provision of binary results regarding the state of storage across all distributed servers. Furthermore, our challenge-response protocol also enables us to locate errors in the data. Unlike prior works, our new scheme allows for secure and efficient dynamic operations such as updates, deletions, and append operations on data blocks. Our proposed scheme has undergone extensive security and performance analysis to test its efficacy against a range of attacks such as Byzantine failures, malicious data modification, and even server collusion attacks. The subsequent sections of our paper will introduce the system model, adversary model, design goals, and notations.

The detailed description of our scheme is outlined in Sections III and IV, followed by a security analysis and performance evaluations in Section V. An overview of related work is provided in Section VI, and concluding remarks for the entire paper are given in

Section VII.

Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New