Data Privacy Preservation Based on Multitenant Isolation in Cloud

Cloud computing is a whole new paradigm that offers a non-traditional computing model for organizations to adopt Information Technology. In Cloud Computing systems, the data is stored on remote server’s access through internet. And the main reason behind its rapid growth is its capability to share resources at various remote location, its flexibility, low cost, scalability etc. which has also helped in its major development but with its growth, the security issues like confidentiality, availability, and integrity becomes a major concern. The security problem related to data’s get amplified under the cloud model.as new dimensions are introduced. This paper provides a secure cloud computing architecture based on multi-tenant isolation using Universal Onaway Hash function (SHA-256) and Universal Unique identifier (UUID) ensuring authentication, confidentiality and integrity. In this paper, it use access control mechanism for authenticating the users, then encrypted hash function for secure transition between client’s side to the server and unique identifier that provide isolation to the file in the server. The scope of the paper is basically for PAAS model of Cloud Computing and Public Cloud.

[1]  Confais Bastien,et al.  Performance Analysis of Object Store Systems in a Fog/Edge Computing Infrastructures , 2016 .

[2]  Wolfgang Ziegler,et al.  Security Infrastructure for On-demand Provisioned Cloud Infrastructure Services , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[3]  Betim Cico,et al.  The proposed model for security in the cloud, controlled by the end user , 2015, 2015 4th Mediterranean Conference on Embedded Computing (MECO).

[4]  Rich Salz,et al.  A Universally Unique IDentifier (UUID) URN Namespace , 2005, RFC.

[5]  Qing Tan,et al.  Multitenancy - Security Risks and Countermeasures , 2012, 2012 15th International Conference on Network-Based Information Systems.

[6]  Marco Cremonini Cloud security risk management , 2016 .

[7]  A. Behl,et al.  An analysis of cloud computing security issues , 2012, 2012 World Congress on Information and Communication Technologies.

[8]  Ebelechukwu Nwafor,et al.  Cloud Service Security & application vulnerability , 2015, SoutheastCon 2015.

[9]  Sonia Gupta,et al.  Multi Tenancy Access Control Using Cloud Service in MVC , 2015 .

[10]  Xiong Luo,et al.  Access Control Model Based on Role and Attribute and Its Implementation , 2016, 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).

[11]  Pratosh Bansal,et al.  Evolution of cloud computing and related security concerns , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).

[12]  Christoph Meinel,et al.  Application of quantitative security metrics in cloud computing , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).