A Mutual Approach to Reduce Cost and to Cloud Storage Side Enhance the Security from Client Side
Keywords:
Cloud security, data protection, cost reduction, data storage, C.I.AAbstract
This paper focuses on data leakage problem and
its security in cloud storage technology. It has been seen that
there are still some vulnerabilities in cloud storage which may
results to compromise of C.I.A. This paper brings out, works
on two phase of work to avoid data leakage problem, first
phase is from client side and second phase is done by cloud
provider side.
The data which is stored by client in cloud storage
application have different C.I.A. Some of them are Sensitive
Having high confidentiality rating, some of them are least
confidential but some of them have no confidentiality issue,
which can have public access but require more integrity. In
such situation, the data stored in cloud database with equal
priority is not feasible. This paper has given a concept to store
the data in database after prioritizing and then encrypting
from client side itself. Before Uploading on cloud side, the
client is required to mention criticality of that data. After
Information declaration a matrix is prepared on basis of CIA
analysis of data as desired by user which elaborates the
criticality of data. Criticality is estimated on the basis of C.I.A.
Confidentiality, Integrity and Availability. Based on sensitivity,
data will be encrypted and access control list will be defined..
The second phase removes the problem of file access by
another user who wants to access, as it is encrypted by client
(owner).
The proposed model addresses for reliability in storage
systems (where the key component under investigation is to
maintain the C.I.A.). Our observations and techniques are
instrumental for a wide spectrum of systems, ranging from
distributed storage systems for the enterprise to cloud data
services.
Downloads
Downloads
Published
Issue
Section
License
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.