Site Loader
Rock Street, San Francisco


Cloud computing
is one of today’s hottest research areas due to its ability to reduce costs
associated with computing while increasing scalability and flexibility for
computing services. Cloud computing platform is a network of servers and the servers
can be physical machines or virtual machines. Cloud computing is a model for
enabling convenient, ubiquitous, on-demand network access to a shared pool of
configurable computing resources such as networks, servers, storage, applications,
and services, that can be rapidly provisioned and released with minimal effort
or service provider interaction. The massive pool of configurable resources in Cloud
is available to consumers as service. These services are generally categorized
into three main categories: Software-as-a-Service (Saas), Platform-as-a-Service
(PaaS) and Infrastructure-as-a-Service (IaaS). Cloud Computing has attractive
characteristics, they are on-Demand Self Service, Broad network access,
Resource pooling, Rapid Elasticity and Measured Service. A Cloud Computing environment
provides the computing resources based on four major deployment models include
Public cloud, Private cloud, Hybrid cloud and Community cloud.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

Data privacy
protection and data retrieval control are the challenging issues to be
addressed in cloud computing. Despite the gains achieved from cloud computing,
the organizations hesitate in adopting Cloud due to security issues and
challenges associated with it. Hence to address these issues, in this research
we will propose a proficient data security model using ECC algorithm.





A cloud
typically contains a virtualized significant pool of computing resources, which
could be reallocated to different purposes. The entire process of requesting
and receiving resources is typically automated and is completed in a while. The
cloud in cloud computing is the set of hardware, software, networks, storage,
services and interfaces that combines to deliver computing as a service.
Sharing of resources, software and information are provided to computers and
other devices on demand. It allows people to do things they want to do on a
computer without the need for them to buy and build an IT infrastructure or to
understand the underlying technology.

Cloud computing
allows computer users to conveniently rent access to fully featured
applications, to software development and deployment environment, also to
processing infrastructure assets such as network-accessible storage data and
processing. Through cloud computing clients can access standardized IT
resources to deploy new applications, services or computing resources quickly
without reengineering their entire infrastructure. The core concept of cloud
computing is reducing the processing burden on the users terminal by constantly
improving the handling ability of the cloud. All of this is available through a
simple internet connection using a standard browser. However there still exist
many problems in cloud computing, a recent survey shows that data security and
privacy risks have become the primary concern for people to shift to cloud
computing. In this research we will certainly discuss about the data security
and cloud protection inside the cloud processing that can be attend by applying
the cryptographic algorithms.





the cloud infrastructure is made available to the general public people or a
large industry group and provided by single service provider selling cloud

· Private cloud: the cloud
infrastructure is operated solely for an organization. The main advantage of
this model is the security, compliance and QoS.

· Community cloud: the cloud
infrastructure is shared by several organizations and supports a specific
community that has shared concerns like security requirements, policy, and
compliance considerations.

· Hybrid cloud: the cloud
infrastructure is a combination of two or more clouds. It enables data
application portability through load balancing between clouds.


service: cloud is large resource and service pool that you can get service or
resource whenever you need by paying amount that you used.

· Ubiquitous network access: cloud
provides services everywhere though standard terminal like mobile phones,
laptops and personal digital assistants.

· Easy use: the most cloud
provider’s offers internet based interfaces which are simpler than application
program interfaces so user can easily use cloud services.

· Business model: cloud is a
business model because it is pay per use of service or resource.

· Location independent resource
poling: the providers computing resources are pooled to serve multiple
customers using multitenant model with different physical and virtual resources
dynamically assigned and reassigned according to demand.


C. CLOUD SOLUTIONS: Infrastructure
as a service: it delivers a platform virtualization environment as a service
rather than purchasing servers, software, data centers.

· Software as a service: it is
software that is deployed over internet and or is deployed to run behind a
firewall in your LAN or PC.

· Platform as a service: this kind
of cloud computing provide development environment as a service. You can use
the middleman’s equipment to develop your own program and deliver it to the
users through internet and servers.

· Storage as a service: this is
database like services billed on a utility computing basis, e.g., gigabyte per

· Desktop as a service: this is
the provisioning of the desktop environment either within a browser or as a
terminal server.



The cloud
services present many challenges to an organization. When an organization
mitigates to consuming cloud services, and especially public cloud services,
much of the computing system infrastructure will now under the control of cloud
service provider. Cloud computing security risk assessment report mainly from
the vendor’s point of view about security capabilities analyzed security risks
faced by the cloud. Here are security risks list.

· Regulatory compliance: cloud
computing providers who refuse to external audits and security certifications.

· Privileged user access:
sensitive data processed outside the organization brings with it an inherent
level of risk.

· Data location: when you use
cloud, you probably won’t know exactly where your data hosted.

· Data segregation: data in the
cloud is shared environment alongside data from other customers. · Recovery: even if you don’t know
where your data is, a cloud provider should tell you what will happen to your
data and service in case of a disaster.

· Investigative support:
investigating inappropriate or illegal activity may be impossible in cloud

· Long term viability: you must be
sure your data will remain available even after such an event.





The cloud
computing is a virtual environment that requires transfer data throughout the
cloud. Therefore, several data storage concern can arise. Typically, users will
know neither the exact location of their data nor the other sources of the data
collectively stored with theirs. To preserve security of your cloud-based
virtual infrastructure, perform security best practice at both the traditional
IT and virtual cloud. To ensure data confidentiality, authentication,
integrity, and availability, the provider should include the following:

· Encryption: the sensitivity of
data may require that the network traffic to and from the virtual machine be
encrypted, using encryption at the host OS software.

· Physical security: keep the
virtual system and cloud management hosts safe and secure behind carded doors,
and environmentally safe.

· Authentication and access
control: the authentication capabilities within your virtual system should copy
the way your other physical systems authenticate. One time password and
biometrics should all be implemented in the same manner. Also authentication
requires while you are sending data or message from one cloud to other cloud.
To provide message authentication we will use digital signatures.

· Separation of duties: as system
get more complex, misconfiguration take place, because lack of expertise
coupled with insufficient communication. Be sure to enforce least privileges
with access controls and accountability.

· Configuration, change control,
and patch management: this is very important and sometimes overlooked in
smaller organizations. Configuration, change control, patch management, and
updated processes need to be maintained in the virtual world as well as
physical world.

· Intrusion detection and
prevention: what’s coming into and going out of your network has to know. A
host based intrusion prevention system coupled with a hypervisor based solution
could examine for virtual network traffic.

Among these
proposed security solutions, we consider in this paper authentication and
encryption for secure data transmission from one cloud to other cloud that
requires secure and authenticated data with elliptic curve cryptography.


Post Author: admin


I'm Dora!

Would you like to get a custom essay? How about receiving a customized one?

Check it out