You are on page 1of 4

International Journal of Engineering and Techniques - Volume 3 Issue 3, May- June 2017

RESEARCH ARTICLE OPEN ACCESS


A Review of Multiple Layer Security of Cloud Server

Dr. Sandeep Dalal Miss. Neetu Rani


Asst.Professor, DCSA Mtech Student, Reg. No: 1518090112
Maharshi Dayanand University Maharshi Dayanand University

Abstract:
Cloud services are offering the flexible and scalable services. But there is always issue of security. When
data is transferred from centrally located server storage to different cloud the compromise of person and private
data would increase. There is always risk to the confidentiality and availability of data prior to selecting a cloud
vender or choosing own cloud and cloud service migration. Cloud services usually have their security concerns that
must be addressed. In this paper we have discussed the threats to cloud service and data in case of conventional
security system and modern security system and proposed an idea to secure data on cloud using multiple layers of
security

[1] Cloud Computing 2. User at any time can change and


Cloud may be network or internet and it configure the application online
is something that is available at remote 3. Online development tools are
place. It provides services over network offered by cloud computing.
that are public and private. They are 4. Online deployment tools are
used in wide area network, local area provided by cloud computing.
network or virtual private network. 5. Clients are provided platform
Several application like email and web independent access of cloud
based conferencing executes on cloud. resources that are available on
Platform independency is offered by internet.
cloud computing because there is no 6. On-demand self services are
need to install software on personal offered by cloud computing and
computer. So we can say that our there is no need of interaction
business applications are mobile and with cloud service provider.
collaborative due to cloud computing. 7. Cloud computing operates at
There are several services that are high efficiency and it does
making cloud computing more feasible optimum utilization so it is
and easily accessible to the users. highly cost effective.
Cloud computing is providing number of 8. Load Balancing feature of cloud
advantages but there are several risks computing represent that it is
associated with this technology. more reliable.

[3] Need of Cloud Computing


Advantages 1. Its provides 24x7 Support
Cloud computing provides several 2. Cloud computing pay as we use
benefits and they are listed below 3. It has lower Total Cost of owner
1. User on internet could access ship
remote applications in form of 4. Cloud computing provides
utilities. Reliability, scalability,
sustainability.

ISSN: 2395-1303 http://www.ijetjournal.org Page 96


International Journal of Engineering and Techniques - Volume 3 Issue 3, May- June 2017

5. It provides Secure Storage


Management Expenditure.
6. It is capable to Free up Internal
Resources.
7. Such systems are Highly
Automated.
8. These Systems are Utility Based.
9. It allows Easy & Agile
Deployments.
10. Such systems are Device &
Location Independent.

Fig 2 Cloud Server Model

Hybrid Cloud
A Hybrid Cloud could be considered as
combination of public cloud and private
cloud where private cloud does critical
tasks and public cloud does non-critical
tasks.
Service Models
There are three service models in cloud
computing. First is Infrastructure as a
Service, Second one is Platform as a
Service and last one is Software as a
Service.
Fig 1 Cloud Based Delivery [4] Security issues in Cloud computing
[2] Cloud Server model Third party provides data and
Type of access to cloud has been defined infrastructure management in cloud
by Deployment model. There are four computing so the security of cloud is
types of accessibility in cloud that are biggest concern. There is a risk in
public access, private access, Hybrid providing the sensitive data to cloud
access and Community access. service provider. Any security breach
Public Cloud could result in customer or business loss
Access to general public is allowed by so venders provide protection to the
public cloud. Due to openness public accounts.
cloud is less secure Customer cannot switch from one cloud
Private Cloud service provider to another quickly so he
Due to its private nature private cloud is is dependent on cloud service provider
considered more safe and secure. for service. Customer management
Community Cloud interface is usually accessible on
Accessibility to a particular group is network in case of various public cloud
allowed by community cloud. service providers.

ISSN: 2395-1303 http://www.ijetjournal.org Page 97


International Journal of Engineering and Techniques - Volume 3 Issue 3, May- June 2017

Data security must be considered in Encryption Decryption


cloud because data is frequently
transferred over Internet. The basic Plain Cipher Plain
mechanisms to protect data over cloud text Text text
are data auditing, data access control,
data authentication and data
authorization. Key Key

Data
Auditing
Fig 4 Encryption and Decryption
process

[6] OBJECTIVE OF RESEARCH


Data Data Data
Access Security Authoriz
Control on cloud ation
The objective of research is to provide
security to cloud environment by
providing additional security layer. In
this research we would
Data 1. Establish cloud based data
Authenti transmission environment.
cation
2. Perform the data transmission in
Fig 3 Data Security on cloud cloud server and clients.
3. Investigate the security loop
[5] Cryptography holes to existing security
Cryptography is the process of hiding mechanisms.
plan data or information in form of 4. Providing better security to cloud
cipher text. It is the process used to keep environment using cryptography
information safe and hidden. Modern to secure data from cryptanalyst.
Cryptography is the combination of 5. Provide data transmission
computer science, mathematics and security using socket and port
electrical engineering. based programming.
It is used in computer passwords and
ATM Cards and e-commerce sites. [7] FUTURE SCOPE AND
During data transmission data is CONCLUSION
encrypted before data is transferred. Cloud has provided flexible and scalable
The encrypted data is known as cipher services. But there would issue of
text. This modification makes the data security due to data transfer from one
non readable. To understand this data cloud server storage to another cloud.
user have to decrypt the data. This research would reduce the risk to
Cryptanalysis is process of studying the confidentiality and availability of
cipher text in order to find hidden data. data prior to selecting a cloud vender or
choosing own cloud. The security
concerns of cloud services have been
addressed in our research. In this
research we would provide modern
security system and proposed an idea to

ISSN: 2395-1303 http://www.ijetjournal.org Page 98


International Journal of Engineering and Techniques - Volume 3 Issue 3, May- June 2017

secure data on cloud using multiple security concerns & solutions for
layers of security. cloud computing ”, 2012, Journal
of Cloud Computing: Advances,
Reference Systems & Applications
doi:10.1186/2192-113X-1-11The
electronic version of this article
1. Peter mill & Tim grance, “The
is complete one & could be
NIST Definition of Cloud
found online
Computing”, 2011, National
7. .CSA “Security Guidance for
Institute of Standards &
Critical Areas of Focus in Cloud
Technology ,Gaitherbsburg,MD
Computing”, (2009), Tech. rep.,
20899-8930, NIST Special
Cloud Security Alliance.
Publication 800-145.
8. Rowstron & P. Druschel. Pastry:
2. Ellen Messmer, “New security
Scalable, distributed object
demands arising for
location & routing for large-scale
virtualization, cloud computing”,
peer-to-peer systems. Accepted
2011, security-demands-arising-
for Middleware, 2001, 2001.
for-virtualization—cloud
9. Ben Y. Zhao, John Kubiatowicz,
computing.html
& Anthony Joseph. Tapestry: an
3. .Sumedha Kaushik & Ankur
infrastructure for fault tolerant
Singhal, “Network Security
wide-area location & routing.
Using Cryptographic
April 2001.
Techniques” 2012, volume 2,
10. Andr´ea W. Richa C. Greg
Issue 12.
Plaxton, Rajmohan Rajaraman.
4. Charles Miers, Fernando
Accessing nearby copies of
Redigolo & Marcos Simplicio,
replicated objects in a distributed
“A quantitative analysis of
environment. In Proceedings of
current security concerns &
ACM SPAA, pages 311– 320,
solutions for cloud computing ”,
June 1997.
2012, Journal of Cloud
11. Stefan Saroiu, P. Krishna
Computing: Advances, Systems
Gummadi & Steven D. Gribble.
& Applications electronic
A Measurement Study of Peer-
version of this article is
to- Peer File Sharing Systems.
5. Rabi Prasad Padhay, “An
July 2001.
Enterprise CSSloud Model for
12. Ion Stoica, Robert Morris, David
Optimizing IT Infrastructure”,
Karger, M. Frans Kaashoek, &
2012, International Journal of
Hari Balakrishnan. Chord: A
Cloud Computing & Services
peer-to-peer lookup service for
Science (IJ-CLOSER) Vol.1,
internet applications. August
6. Nelson Gonzalez, et. al. , “A
2001.
quantitative analysis of current

ISSN: 2395-1303 http://www.ijetjournal.org Page 99

You might also like