Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Secure Cloud Data Storage Services in the Hybrid Cloud

1Mahdi Mollahasani, 1Raheleh Kooshesh and 2Mahdiyeh Barzegar
1Department of Computer Engineering and Software Engineering, UCTI-Staffordshire Universiti, Kuala Lumpur, Malaysia
2Department of Computer Engineering and Information Technology, Amirkabir University of Technology, Tehran, Iran
Research Journal of Applied Sciences, Engineering and Technology  2014  10:2172-2174
http://dx.doi.org/10.19026/rjaset.7.512  |  © The Author(s) 2014
Received: July 28, 2013  |  Accepted: August 20, 2013  |  Published: March 15, 2014

Abstract

Cloud storage is a model of networked online storage where data is stored in virtualized pools of storage which are generally hosted by third parties. Hosting companies operate large data centers and people who require their data to be hosted buy or lease storage capacity from them. The data center operators, in the background, virtualize the resources according to the requirements of the customer and expose them as storage pools, which the customers can themselves use to store files or data objects. Physically, the resource may span across multiple servers. The safety of the files depends upon the hosting websites. Lack of control on the data and privacy issues are the biggest obstacles to holding valuable personal and business-critical information in the cloud. Encryption and integrity control is one of the most obvious solutions to address these concerns, however it costs additional complexity of the system and service usage and may impact data access performance. In this study, we will discuss about security challenges in hybrid cloud storage and explain how to preserve security in them.

Keywords:

Cloud computing, encryption, hybrid cloud, leveraging a hybrid model, secure cloud, secure storag, storage service,


References

  1. Cong, W., Q. Wang, K. Ren, N. Cao and W. Lou, 2012. Toward secure and dependable storage services in cloud computing. IEEE Transactions on Serv. Comput., 5(2): 220-232.
    CrossRef    
  2. Jinhui, Y., S. Chen, S. Nepal, D. Levy and J. Zic, 2010. TrustStore: Making amazon S3 trustworthy with services composition. Proceeding of 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing (CCGrid). Melbourne, VIC, pp: 600-605.
  3. Kaufman, L., 2009. Data security in the world of cloud computing. IEEE Secur. Priv., 7: 61-64.
    CrossRef    
  4. Miller, E.L., W.E. Freeman, D.D.E. Long and B.C. Reed, 2002. Strong security for network-attached storage. Proceeding of Conference on File and Storage Technologies (FAST), pp: 1-13.
  5. Nepal, S., 2011. DIaaS: Data Integrity as a Service in the cloud. Proceeding of IEEE International Conference on Cloud Computing (CLOUD), Washington, DC., pp: 308-315.
    CrossRef    
  6. Robert Koletka, A.H., 2011. An architecture for secure searchable cloud storage. Proceeding of Information Security South Africa (ISSA). Johannesburg, pp: 1-7.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved