You are on page 1of 4

International Journal of Computer Trends and Technology (IJCTT) - volume4Issue4 April 2013

Security Through Multiple Unrelated Clouds in Cloud Computing


#1 V. Akhila, #2 Nikita Mahajan, #3 B.V.SriRam, #4 Dr.N.Srinivasu
Department of Computer Science and Engineering, K.L.University, Vaddeswaram, India.
#1 Student, #2 Student, #3 Student, #4 Professor,

Abstract:
Cloud Computing is the latest technology that is used by many organizations in this competitive world. As many organizations are using cloud computing, the major issue that has arised is security. In single cloud there are many security issues and the possibility of malicious insiders is also high. But in multi clouds the security issues has become less for the users and for the people in the research group. As the multi clouds provide the solutions rose in the security of a single cloud the movement towards multi clouds is increased. The multi cloud deals with the security issues like data integrity, data intrusion and service availability in the cloud. Eventhough we cannot assure complete security in the multi clouds. This is because if the hacker attacks the server which is related to the multi cloud environment he can easily hack our valuable information. This paper surveys about security in unrelated clouds and gives further more solutions to achieve more security level than in multi clouds. Cloud access security deals with the issues where the data is located and who is accessing it. In unrelated clouds, it is difficult to the attacker to find that from which cloud the user access his information. The clouds which are not related to each other can provide more security to the users. If the servers in a cloud environment are unrelated to each other then the security level will be increased.

Cloud Computing is the latest technology that is used by many organizations and many cloud providers have been arise. Many organizations came forward to establish cloud providers for the users. The users have to trust the cloud provider to secure his data. Cloud providers should address privacy and security issues as a matter of high and urgent priority. In unrelated clouds the security can be achieved by more than one cloud server. The possibility of entering a malicious insider into the cloud will be reduced. This is because the cloud provider from which the user is accessing his data is difficult to be known to the unauthorized users. The privacy issues for security will be achieved through the various authentication techniques maintained by different cloud providers in the unrelated cloud environment. When user is interacting with many clouds which are from different sub cloud providers of different cloud servers then the security level will be increased.

2. Background:
2.1. Cloud Components: Cloud Computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services). There are five characteristics, three delivery models and four deployment models in cloud environment architecture [9]. The five characteristics are On-demand self-service, Location independent resource pooling, Broad network access, Rapid Elasticity and Measured service. The three delivery models are infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS) [3]. The deployment models are public, private, hybrid and community models.

Keywords:
Single cloud, Multi clouds, Unrelated Clouds, Data Integrity, Data Intrusion, Service Availability, Cloud Architecture.

General terms:
Security, Hacker, Attacks

2.2. Single Cloud:

1. Introduction:

In single cloud environment, a third party authentication is used where the information is encrypted and stored in the

ISSN: 2231-2803

http://www.ijcttjournal.org

Page 479

International Journal of Computer Trends and Technology (IJCTT) - volume4Issue4 April 2013

server. The decryption techniques are known to the user. But it is a failure model because the hacker can easily decrypt the text and steal the information of the user.

2.3. Multi Clouds: In multi clouds the security levels are enhanced and the solutions for security risks like data integrity, data intrusion and service availability have been answered. But if the hacker knows the cloud provider that the user is accessing his data then he can easily hack the data. So the existing techniques in the multi clouds provide the security upto a certain level but not completely. The Depsky System model which consists of cloud of clouds can solve the security problems by using the secret sharing algorithm [9]. The further extension of the related work is given by the multiple unrelated cloud architecture.

Windows Azure enables you to quickly build, deploy and manage applications in Windows Server and Linux virtual machines. In Windows Azure, there are several datacenters where the service availability is more. The users will get appropriate service without any delay. Microsoft SQL Azure provides data services, including a relational database, reporting, and data synchronization with mobile users, remote offices, and business partners. By deploying to SQL server database the users can maintain their data without deploying them to other formats. Google App Engines frictionless development environment makes it easy to build, iterate and scale the mobile backend on Googles infrastructure. App Engine applications are easy to build, easy to maintain, and easy to scale as the traffic and data storage needs grow.

2.4. Multiple Unrelated Clouds: The clouds are not related to any single or multi clouds in unrelated cloud environment. Each cloud location is different from other clouds. So it is difficult to the hacker to find the cloud server from which the user is accessing his information. Now a days research is being done in the field of security for cloud computing. The users can achieve more security by using unrelated clouds. Maintaining the database plays an important role in the unrelated clouds. In other hands unrelated clouds can integrate with other cloud providers and the data can be accessed from any cloud server. The data that is stored will be in same format in any other cloud server.

2.5. Cloud Service Providers Examples: Here we take some examples of cloud service providers like Amazon S3, Windows Azure, Google App Engine to demonstrate their cloud services to ensure security. For example, if we take Amazon cloud provider; data stored in Amazon S3 is secure by default; owners have access to the Amazon S3 resources they create. Amazon S3 supports multiple access control mechanisms, as well as encryption for both secure transit and secure storage on disk. So the user can access to it anytime. The users account will be in safe hands and completely trusted. Figure 1 : Cloud Architecture providing service for different Clients

3. Related Work:
According to Jaya Prakash et al. [3] a multi cloud system must be developed so that the data is replicated into different cloud providers to reduce the service availability risk or loss of data. The multi clouds are cloud of clouds in which every single cloud contains its own interface. But there is a chance

ISSN: 2231-2803

http://www.ijcttjournal.org

Page 480

International Journal of Computer Trends and Technology (IJCTT) - volume4Issue4 April 2013

that if the attacker finds the main server from which the users access their data then he can easily hack the data. To overcome this security risk, in a multiple unrelated cloud architecture there are many clouds from different cloud providers which are not related to each other. Sangdo Lee et al. [1] proposed a rain cloud system model in which the rain cloud library deals with different cloud interface providers. Here the data format is accepted by each cloud. The data storage for a big rain cloud system is demonstrated. The further security issues can be recovered by the multiple cloud architecture. Mohammad A.Alzain et al. [5] considered a multi cloud database model and compared it with Amazon cloud for data retrieval. He concluded that when compared to a single cloud a multi cloud database is better for the data storage and retrieval. The service availability and data integrity are maintained here. But the data intrusion still remained as a security threat. According to paper [6] on Secure Cloud computing across multiple sensitivity levels, the work is related to multilevel and multi-cloud access to the enterprise level. It proposed that for secure cloud computing the global use of cross domain solutions is necessary. Anil Kurmus et al. [7] proposed an operating system based multi-tenancy architecture based on a light weight separation of OS resources by the kernel. This provides the security from the attacks by a malicious customer. The threats against the confidentiality and integrity of data under unauthorized data access can be implemented by this architecture.

providers which have their own domain. They constitute to form a multi cloud where multiple users can access their data at the same time. The drawbacks in a single cloud like data intrusion, service availability and data integrity can get overcome by using this architecture. Several clients can access their information stored in the cloud at any time without any time delay. The user can perform data transactions in his multiple unrelated cloud infrastructure. The attack of malicious users into the cloud and to steal the data is a difficult task in this infrastructure. The environment is developed in a way such that it is impossible to hacker or the attacker to know about the cloud server from which the user is accessing his data.

4. Unrelated Multiple Cloud Computing:


The system architecture consists of several clients who access their accounts from different unrelated cloud service providers. They are from different cloud servers which provide service to the users at the same time and can be accessed from any place. Figure 2 : Unrelated Multiple Cloud Architecture 4.1. Multiple Unrelated Cloud Architecture: In multiple unrelated cloud architecture we can find different servers which have their own authentication and proprietary services. The architecture consists of different cloud service

ISSN: 2231-2803

http://www.ijcttjournal.org

Page 481

International Journal of Computer Trends and Technology (IJCTT) - volume4Issue4 April 2013

5. Conclusion:
The use of computing resources as a delivered service is an important development in the world. At present Cloud Computing is a promising paradigm for delivering IT services as computing utilities. People around the world are making use of different cloud services provided by many companies. Security is the important factor that everyone thinks before choosing a cloud provider. The security issues can be solved by using multiple unrelated cloud architecture. Many users are provided with data security so that it may leads to the integration of many companies to form a big cloud storage.

Security, Department of Computer Science and Engineering, K.L.University, Vaddeswaram. [4] Cloud Security and Compliance: A Primer, A SANS White paper, August 2010, Written by Dave Shackle ford. [5] Mohammed A. AlZain, Ben Soh and Eric Pardede, MCDB: Using Multi-Clouds to Ensure Security in Cloud Computing, Department of Computer Science and Computer Engineering, LaTrobe University, Bundoora 3086, Australia. [6] Secure Cloud Computing across Multiple Sensitivity Levels, a white paper by Ratheon Trusted Computer Solutions, 12950 Worldgate Drive, Suite 600 Herndon, VA 20170. [7] Anil Kurmus, Moitrayee Gupta, Roman Pletka, Christian Cachin, and Robert Haas, A Comparison of Secure Multitenancy Architectures for File system Storage Clouds, Department of Computer Science and Engineering, UCSD. [8] Security in Private Database Clouds, An Oracle White Paper, July 2012. [9] Mohammed A. AlZain , Eric Pardede , Ben Soh , James A. Thom, Cloud Computing Security From Single to Multi Clouds, Department of Computer Science and Computer Engineering, La Trobe University, Bundoora 3086, Australia.

References:
[1] Sangdo Lee, Hyoungyill Park, Yongtae Shin: Cloud computing Availability: Multi-clouds for Big data Service, Department of Computing, Soongsil University, 511 SangdoDong, Dongjak-Gu, Seoul, Korea. [2] A Multi-Level Security Model for Partitioning Workflows over Federated Clouds by Paul Watson, Technical Report, September 2011. [3] S. Jaya Prakash, Dr K.Subramanyam, U.D.S.V. Prasad, Multi Clouds Model For Service Availability And

ISSN: 2231-2803

http://www.ijcttjournal.org

Page 482

You might also like