DOI QR코드

DOI QR Code

A Novel Methodology for Auditing the Threats in Cloud Computing - A Perspective based on Cloud Storage

  • 투고 : 2024.02.05
  • 발행 : 2024.02.29

초록

Cloud computing is a technology for delivering information in which resources are retrieved from the internet through a web-based tools and applications, rather than a direct connection with the server. It is a new emerging computing based technology in which any individual or organization can remotely store or access the information. The structure of cloud computing allows to store and access various information as long as an electronic device has access to the web. Even though various merits are provided by the cloud from the cloud provides to cloud users, it suffers from various flaws in security. Due to these flaws, data integrity and confidentiality has become a challenging task for both the storage and retrieval process. This paper proposes a novel approach for data protection by an improved auditing based methodology in cloud computing especially in the process of cloud storage. The proposed methodology is proved to be more efficient in auditing the threats while storing data in the cloud computing architecture.

키워드

참고문헌

  1. Wang, J.-J.; Mu, S. Security issues and countermeasures in cloud computing. In Proceedings of the 2011 IEEE International Conference on Grey Systems and Intelligent Services (GSIS), Nanjing, China, 15-18 September 2011; pp. 843-846.
  2. L. Chang, L. Chin, A.Y. Chang, J. C .Chun, - Information security issue of enterprises adopting the application of cloud computing,║ IEEE 2010 Sixth International Conference on Networked Computing and Advanced Information Management (NCM),pp 645-649, Aug. 2010.
  3. R. Maggiani, "Cloud computing is changing how we communicate," 2009 IEEE International Professional Communication Conference, pp 1-6, Jul. 2009.
  4. L. Geng F. David Z. Jinzy D. Glenn, -Cloud computing: IT as Service, -IEEE computer society IT Professional,‖ Vol. 11, pp.10-13, Apr.2009.
  5. Aman Bakshi, Yogesh B. Dujodwala, -Securing cloud from DDoS Attacks using Intrusion Detection System in Virtual Machine,║ ICCSN '10 Proceeding of the 2010 Second International Conference on Communication. Softwareand networks, pp. 260-264, 2010.
  6. B. R. Kandukuri, R. V. Paturi and A. Rakshit, -Cloud Security Issues,║ 2009 IEEE International Conference on Services Computing, pp. 517-520,Sep. 2009.
  7. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I.Stoica, and M. Zaharia ,-A view of cloud computing,‖ Communication of the ACM, vol. 53, no. 4, pp.50-58, 2010.
  8. J. Yuan and S. Yu, -Secure and constant cost public cloud storage auditing with deduplication,║ in IEEE Conference on Communications and Network Security (CNS) , 2013, pp. 145-153.
  9. S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, -Proofs of ownership in remote storage systems,║ inProceedings of the 18th ACM Conference on Computer and Communications Security . ACM, 2011, pp. 491-50