International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 3 | Issue 1 | Year 2012 | Article Id. IJCTT-V3I1P125 | DOI : https://doi.org/10.14445/22312803/IJCTT-V3I1P125

Secured Storage of Outsourced Data in Cloud Computing


Chiranjeevi Kasukurthy, Ch. Ramesh Kumar

Citation :

Chiranjeevi Kasukurthy, Ch. Ramesh Kumar, "Secured Storage of Outsourced Data in Cloud Computing," International Journal of Computer Trends and Technology (IJCTT), vol. 3, no. 1, pp. 144-148, 2012. Crossref, https://doi.org/10.14445/22312803/IJCTT-V3I1P125

Abstract

Cloud computing is an emerging technology that allows users to utilize on-demand computation, storage, data and services from around the world. Cloud data storage redefines the security issues targeted on customer’s outsourced data (data that is not stored/retrieved from the costumers own servers). In this work we observed that, from a customer’s point of view, relying upon a solo SP for his outsourced data is not very promising. In addition, providing better privacy as well as ensuring data availability, can be achieved by dividing the user’s data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block. In this paper, we propose a secured cost-effective multi-cloud storage (SCMCS) model in cloud computing which holds an economical distribution of data among the available SPs in the market, to provide customers with data availability as well as secure storage. Our results show that, our proposed model provides a better decision for customers according to their available budgets.

Keywords

Cloud computing, Linear programming, Data storage.

References

[1] M. Armbrust, A. Fox, R. Grifth, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A berkeley view of cloud computing. Technical report, University of California at Berkeley, February 2009.
[2] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic. Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 25(6):599– 616, 2009. [3] P. Mell, T. Grance, “Draft NIST working definition of cloud computing”, Referenced on June. 3rd, 2009, Online at http://csrc.nist.gov/groups/SNS/cloud-computing/index.html,  2009.
[4] Amazon.com, “Amazon s3 availablity event: July 20, 2008”, Online at http://status.aws.amazon.com/s320080720.html, 2008.
[5] M. Arrington, “Gmail Disaster: Reports of mass email deletions”, Online at http://www.techcrunch.com/2006/12/28/gmail- isasterreportsofmass-email-deletions/, December 2006.
[6] The Official Google Blog, “A new approach to China: an update”, online at  http://googleblog.blogspot.com/2010/03/new-approach-to- chinaupdate. html, March 2010.
[7] N. Gruschka, M. Jensen, “Attack surfaces: A taxonomy for attacks on cloud services”, Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, 5-10 July 2010. 
[8] J. Du, W. Wei, X. Gu, T. Yu, “RunTest: assuring integrity of dataflow processing in cloud computing infrastructures”, In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS ’10), ACM, New York, NY, USA, 293-304.
[9] P. F. Oliveira, L. Lima, T. T. V. Vinhoza, J. Barros, M. M´edard, “Trusted storage over untrusted networks”, IEEE GLOBECOM 2010, Miami, FL. USA.
[10] A. Shamir, “How to share a secret”, Commun. ACM 22, 11(November 1979).
[11] “A Mordern Language for Mathematical Programming”, Online at http://www.ampl.com.