Giving solid data protection to the cloud user while using data applications is a challenging mission. Here we come across a new architecture in cloud computing platform called Data protection in the service, which reduces the pre application development effort to offer data protection in cloud computing, while the rapid development and maintenance are still in consistence. There are many software companies coming forward to develop software, which gives a complete protection to the cloud computing but still there are draw backs in each design. The cloud computing has lot of demand among companies that use multiple data. Cloud computing is nothing but storing the users data in a remote data storage device with the help of cloud server. There are many cloud servers in the present world some charge fee to use the server and some don’t. There are many advantages and disadvantages using this cloud computing. Security is the major issue in cloud computing so in order to rectify the issue, a new system is proposed which is called Data protection as a server, which is discussed in the later context.
Introduction:
In cloud computing the data from the users or the clients are stored in a remote data storage location with the help of Internet. The user anytime and anywhere can access this data, but the only thing is that he should have a device, which is connected to the Internet. Many IT companies are being benefited by this cloud computing. IT companies have large data in exchange and large data to store, they cannot always upgrade the storage device for the addition of every new data so this cloud data storage servers help them to use the cloud storage as their data holding device. There are two sides in cloud computing the first is the technical side and the second is the legal side. The technical side of cloud server is always being monitored. Each server is connected to few other remote servers because if there is any crash in one of the server, all the data, which it holds, is transfers to other server. In cloud computing remote server and end user are not enough it should also have a speed medium, which connects both the parties and does the work in real time that makes the user confident about his data being secure. The other side is the legal side where it deals with the policies of the cloud servers and the end users. This task is a highly risky because if there is any mislead, it deals with huge amount of loss. Cloud computing is completely a new technology to the world and it has lot of challenges to face. Every time each challenge is rectified and made better from its best.
Aims:
To give protection to the data in cloud server.
Make sure the user data is not corrupted.
Data wont leak to any unauthorized users.
User should easily understand the platform or application code is running
The data must be encrypted and easily retrievable by the user
Objectives:
To propose a model which satisfies all the above aims.
To create user-friendly screen for the data entry to handle large volume of data.
To write an application that protects the user data in the cloud server. Providing it with same economics of scale for security and privacy
Giving independent checking for both platform operation and runtime of the application so that the user gains confidence that the data is being handled properly.
Literature Survey:
Literature survey is very important while designing software. Before developing the application it is needed to determine the time, capital, and strength of the subject. After justifying the factors its time to decide which OS and language is used to create the application. Once the application is being build, we need a lot of support from the resources, which can be books, Internet, expertise, and programmers. In order to build a proposed system the above considerations are taken into account. In order to propose a system we need to know the drawbacks of the system that can be known by research, which is in the later context.
From the above picture it is clear that how the cloud computing works. The name cloud computing is originated from the image of cloud as shown in the above figure. Here the medium, which acts as a bridge to the remote server and all the other devices, is INTERNET. Through cloud computing the user can access the data from anywhere. "The idea is to move desktop computing to a service-oriented platform using server clusters and huge databases at datacenters" Prof. Yi Pan (2012). If he doesn’t have space on his device to store the data he can send the data to the cloud server, which is also called remote server. In cloud computing when we need more computing power we can increase the scale of computing server and if we don’t want we can reduce the scale of computing server. In cloud computing we only pay for what we use and with cloud hosting you can stop worrying about the hardware. "Fear of the Cloud" Chow et al (2009) in his book he categorize security concerns into three concerns, availability, security and third party data control.
cloud computing saves time and money. There are four different types of cloud servers
Private cloud computing
Public cloud computing
Hybrid cloud computing
Community cloud computing
"Private cloud computing
It is a data canter that is dynamically provisioned which delivers servicers to the particular businesses. In private cloud the organisations data stays in the organisation server it is not provided on third party (internet) and it makes integration with other systems much easier. Some organisations own them but they also pay for the extra privileges.
Public cloud computing
This cloud server offers anything from a simple personal storage to complex data files of enterprise services. Public cloud consists of data centers owned by service providers and managed the infrastructure and they sell it to the third party. This is where the public cloud scores from a customer’s point of view it got a clear price advantage over private cloud because the cost of infrastructure is share among many users.
Hybrid cloud computing
Hybrid cloud marries the advantages of both the approaches and it’s fundamentally about insuring that works loads are managed are the most appropriate infrastructure.
Community Cloud Computing
The cloud is basically the mixture of one or more public, which is shared by many organization for a same cause (mainly for security). The Body is to be shared by several organizations within specific community with common security, agreement objectives. It is managed by third party or managed internally. Its cost is lesser then public cloud but more than private cloud." (http://en.wikipedia.org/wiki/Cloud_computing).
Project Description
The main aim of the project is to give security and privacy to the data, which is stored in the cloud storage server by using Data protection as a server (DPaaS). "Security has always been the main issue for IT Executives when it comes to cloud adoption" Frank Gens IDC (2008). The main technology used in this proposal is Java Technology that is described in later module.
Module Description:
Cloud computing
Trusted platform module
Third party
User module
Cloud computing
Cloud computing is supplying the dynamically accessible and more virtualized supplies as a service over the Internet. Used need not have the knowledge on who is controlling the technology infrastructure and about the expertise in the ‘cloud’ which supports the user. Cloud computing changed every thing the ways we store information and run applications. Every thing is hosted in the clouds. Instead of hosting data or info in a single desktop computer. Internet is the medium between group of computers and servers to access each other.
The following characteristics are shown by cloud computing:
Agility (quick to comprehend) improves with the user ability to re provision technology resources.
Multi tenancy (serving multiple) sharing of assets and cost.
Utilization and efficiency improvements for systems that are used around 20% only.
Reliability (trusting) cloud computing is suitable for business progress and disaster recovery. Multiple non-functioning sites are automatically removed from server.
Security could improve because the data is centralized, increased security focused resources. But some times there will be loss of control over complex data and the absence of security for stored data. Security is sometimes good or better then regular systems. The providers are solving the security issues, which are not affordable by the customers. Here in cloud computing the complexity of security issues is greatly increased because the data is distributed on a wide area and in multiple tenant system. Many people get access to a single server and multiple data is stored in single server there will be a chance of misleading some ones data to some other. Sometimes user access to the security audit logs may be difficult or impossible. This motivates the users to install a private cloud to regain their control over infrastructure and avoid losing data or information security.
Maintenance of cloud storage computing is very easy because they do not need to be installed on each users computers and can be accessed from different places.
Trusted Platform Module
Trusted platform module (TPM) the name it self says that it deals with a secure crypto processor which is added to the data that helps to protect the information
Disk encryption is a method that converts the data into code, and makes it unreadable which protects the information from unauthorized people. Disk encryption is software that encrypts every bit of data that goes to store in hard disk or disk volume. This disk encryption avoids unwanted users from accessing the data storage. There is an option which is called full disk encryption that is used to encrypt the whole hard disk it can encrypt bootable operating systems but it wont encrypt master boot record there are some hard ware based full disk encryption which can encrypt the whole boot system including master boot record
Third Party Auditor
Here in the module, the auditor views all the data of the user and checks the data and also sometimes changes the data in case of necessary. Auditor has full access to the data and he can view the data without the key. Admin provides permission to the auditor. Once the data is viewed by the auditor and after auditing the data it is stored in the cloud.
User Module
With the help of the secure key the user gets access to view the data, which is stored in large amounts in the cloud. The administrator provides the secure key after the data is encrypted. Using TPM encryption of data is done. User stores the data after it is verified, viewed and corrected by the auditor. User again can view data but this time the administrator provides the message to user only to change the data.
Existing System:
Cloud computing ensures easier maintenance, instant scaling, cheap cost, and availability of service anywhere and anytime. "In cloud computing, everything is delivered as a Service (XaaS), from testing and security, to collaboration and metamodeling" Bhaskar P (2011). But there is a major task to make sure and construct confidence that the cloud securely handles the user data. A survey of Microsoft recently found that "58 percent of the public and 86 percent of business leaders are excited about the possibilities of cloud computing. But more then 90 percentage are worried about its security, availability, and privacy of their data as it rest in the cloud" Lance Whitney (2010). The main concern of the existing system is the Security. There is no security for a data in cloud servers one can easily hack the data from the cloud server.
The above figure shows the basic protocol of cloud computing. Here the host is connected to the router, which is connected to the network cloud also called as Internet and further connected to the cloud router that is connected to the cloud server. The issue is that, is privacy and security is given to the data stored in cloud server?.
There are three main advantages in cloud computing they are scalability, instant, and saving money. There are also dis advantages in using cloud computing like retrievability of data, timely access, hacking of data Out of all the issues, security is the major concern in cloud computing.
Proposed System:
The new proposed system in cloud computing paradigm is, DATA PROTECTION AS A SERVER (DPaaS) is a suit of security primitives offered by the cloud-computing platform, which enables data security, privacy, and offers evidence of privacy to the data owner, even in the presence of possibly negotiated or malicious application. Here using encryption, logging in, and key management data in cloud server is made secured. "Symmetric Encryption permits a user to selectively search the data that the user hosted in the cloud" Curtmola (2006). The data is encrypted and saved in the server only the user can decrypt the data.
Macintosh HD:Users:samuelgodi:Movies:Hitchcock.2012.WEBRip.Xvid.AC3-VoXHD:PP :doc:Screen Shot 2013-04-20 at 11.51.14.png
DATA PROTECTION AS A SERVER (DPaaS)
The system proposes that whenever the user stores the data in the cloud server it should go through few steps to secure and make the data privacy in the server. In a normal scenario the user logs into his cloud server account and stores the data and there is no guarantee that the data is given security and privacy in the stored location. There is no information given to the user after he stores the data in the storage location. So in order to secure the data the following procedure is followed. First the user logs into his account and uploads the data, which has to be stored. Second comes the auditor where it views all the user data, secure the user data with encryption code and possible changes or no changes are made and then it is stored in the cloud server. And finally the administrator updates status of the data by notifying the user with a key, if at all he wants to edit or view his data. When the user wants to retrieve or view the data again, it is administrator that gives access to the user to view data when the user inputs the correct key that is sent by the administrator. Once the key is accepted the user can view his data. This builds the confidence in the user while using the cloud server. This proposed system minimizes the risks in the cloud computing. It provides encryption and key for the user to view to the data in cloud server. This system helps data from being viewed by hackers and unauthorized persons. The following figure gives the idea of proposed system.
System requirements:H/W System configuration
Processor
Article name: Data Protection As A Server Computer Science essay, research paper, dissertation
Make Assignments Great Again
24/7 customer support: science/80294-data-protection-as-a-server-computer-science.html