TCLOUD: A Trusted Storage Architecture for Cloud Computing

The cloud storage provides a least cost means of data storage for the small and large enterprises across the globe. But the main barricade to wide spread adoption of cloud storage is the lake of trust in the technology by its user. The data is stored on multiple servers and the location is concealed from the customers and they are no more in control of the data. This distinctive feature of the cloud storage presents many security and trust challenges. In this paper we present a trusted architecture of cloud data storage. The architecture presents a unique way of secure storage and accessing of data from the cloud data center. It also ensured that only authorized user will be able to access the data. Additionally, if there is any violation of the security parameter at the data center, the data will still be safe i.e. the data will be stored in encrypted form.

[1]  Jinjun Chen,et al.  An Authenticated Key Exchange Scheme for Efficient Security-Aware Scheduling of Scientific Applications in Cloud Computing , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[2]  Eric Pardede,et al.  MCDB: Using Multi-clouds to Ensure Security in Cloud Computing , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[3]  Nenghai Yu,et al.  A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.

[4]  Zhidong Shen,et al.  The security of cloud computing system enabled by trusted computing technology , 2010, 2010 2nd International Conference on Signal Processing Systems.

[5]  Elisa Bertino,et al.  Computer Security — ESORICS 96 , 1996, Lecture Notes in Computer Science.

[6]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[7]  L. Youseff,et al.  Toward a Unified Ontology of Cloud Computing , 2008, 2008 Grid Computing Environments Workshop.

[8]  Feng Zhou,et al.  TCLOUD: A Reliable Data Storage Architecture for Cloud Computing , 2013 .

[9]  X. U. Chun-xiang,et al.  Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing , 2012, IACR Cryptol. ePrint Arch..

[10]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[11]  Ashish G. Revar,et al.  Securing user authentication using single sign-on in Cloud Computing , 2011, 2011 Nirma University International Conference on Engineering.

[12]  Xuefeng Zheng,et al.  TCLOUD: A New Model of Data Storage Providing Public Verifiability and Dynamic Data Recovery for Cloud Computing , 2013 .

[13]  Guiran Chang,et al.  A Trust Management Model to Enhance Security of Cloud Computing Environments , 2011, 2011 Second International Conference on Networking and Distributed Computing.

[14]  Weiyi Zhang,et al.  A secured cost-effective multi-cloud storage in cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[15]  Feng Zhou,et al.  TCLOUD: Inter - Node Communication Model Based on Social Trust Framework for Cloud Computing , 2013 .

[16]  Robert L. Grossman,et al.  The Case for Cloud Computing , 2009, IT Professional.

[17]  Raman Maini,et al.  COMPARISON OF DATA ENCRYPTION ALGORITHMS , 2011 .

[18]  Xuefeng Zheng,et al.  Cloud Computing: a Prologue , 2013, ArXiv.

[19]  Saikat Guha,et al.  Privad: Practical Privacy in Online Advertising , 2011, NSDI.

[20]  M.Y. Javed,et al.  A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.

[21]  Xuefeng Zheng,et al.  TCLOUD: Challenges and Best Practices for Cloud Computing , 2013, ArXiv.