Research Article | OPEN ACCESS
Secure Cloud Data Storage Services in the Hybrid Cloud
1Mahdi Mollahasani, 1Raheleh Kooshesh and 2Mahdiyeh Barzegar
1Department of Computer Engineering and Software Engineering,
UCTI-Staffordshire Universiti, Kuala Lumpur, Malaysia
2Department of Computer Engineering and Information Technology,
Amirkabir University of Technology, Tehran, Iran
Research Journal of Applied Sciences, Engineering and Technology 2014 10:2172-2174
Received: July 28, 2013 | Accepted: August 20, 2013 | Published: March 15, 2014
Abstract
Cloud storage is a model of networked online storage where data is stored in virtualized pools of storage which are generally hosted by third parties. Hosting companies operate large data centers and people who require their data to be hosted buy or lease storage capacity from them. The data center operators, in the background, virtualize the resources according to the requirements of the customer and expose them as storage pools, which the customers can themselves use to store files or data objects. Physically, the resource may span across multiple servers. The safety of the files depends upon the hosting websites. Lack of control on the data and privacy issues are the biggest obstacles to holding valuable personal and business-critical information in the cloud. Encryption and integrity control is one of the most obvious solutions to address these concerns, however it costs additional complexity of the system and service usage and may impact data access performance. In this study, we will discuss about security challenges in hybrid cloud storage and explain how to preserve security in them.
Keywords:
Cloud computing, encryption, hybrid cloud, leveraging a hybrid model, secure cloud, secure storag, storage service,
References
-
Cong, W., Q. Wang, K. Ren, N. Cao and W. Lou, 2012. Toward secure and dependable storage services in cloud computing. IEEE Transactions on Serv. Comput., 5(2): 220-232.
CrossRef
-
Jinhui, Y., S. Chen, S. Nepal, D. Levy and J. Zic, 2010. TrustStore: Making amazon S3 trustworthy with services composition. Proceeding of 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing (CCGrid). Melbourne, VIC, pp: 600-605.
-
Kaufman, L., 2009. Data security in the world of cloud computing. IEEE Secur. Priv., 7: 61-64.
CrossRef
-
Miller, E.L., W.E. Freeman, D.D.E. Long and B.C. Reed, 2002. Strong security for network-attached storage. Proceeding of Conference on File and Storage Technologies (FAST), pp: 1-13.
-
Nepal, S., 2011. DIaaS: Data Integrity as a Service in the cloud. Proceeding of IEEE International Conference on Cloud Computing (CLOUD), Washington, DC., pp: 308-315.
CrossRef
-
Robert Koletka, A.H., 2011. An architecture for secure searchable cloud storage. Proceeding of Information Security South Africa (ISSA). Johannesburg, pp: 1-7.
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
|
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
|
Information |
|
|
|
Sales & Services |
|
|
|