Istrazivanja i projektovanja za privreduJournal of Applied Engineering Science

Preventing data loss even when the security system compromise


DOI: 10.5937/jaes16-15732
This is an open access article distributed under the CC BY-NC-ND 4.0 terms and conditions. 
Creative Commons License

Volume 16 article 510 pages: 125 - 131

Renu S
Noorul Islam University, Kumaracoil, Thuckley, Tamil Nadu, India

Dr.S H Krishna Veni
Noorul Islam University, Kumaracoil, Thuckley, Tamil Nadu, India

Storage as a service will diminish the risk of data storage but it leads to the era of data storage security. Studies show that multi cloud or inter cloud or clouds of cloud storage are eminent techniques which reduce the traditional risk of storage cloud. Replicating all data into numerous clouds will lead to monetary detriment as well as gigantic growth of electronic data. Inorder to overcome this horrible situation we have proposed a clouds tree to store fi les into multiple locations. Clouds tree is a hierarchical arrangement of public CSPs. There is no interconnection or confi guration between CSPs but the relation is depends on fi le storage. The fi les which are more sensitive and capable to achieve business continuity are needed to store multiple locations. File splitting, encryption and storing different CSPs are the technique behind this work. Double or triple authentication schemes are provided to access sensitive or private data.

View article

C.D.Giulio, R.Sprabery, C.Kamhoua, K.Kwit, R.H.Campbell and M.N.Bashir Cloud Standards in Comparison: Are New Security Framework s Improving Cloud Security?” ,Cloud Computing (CLOUD) IEEE 10th international Conference ,Honolulu, USA.,2017.

M. A. Aman and E.K.Cetinkaya (2017) Towards Cloud Security Improvement with Encryption Intensity Selection, Design of Reliable Communication Networks, 13 International Conferences, Munich, Germany,2017.

Q.Li, L.Wang and T.Kim, Mobile-based continuous user authentication system for cloud security , Network Infrastructure and Digital Content, IEEE International Conference ,Beijing,China,2017.

Carlos André Batista de Carvalho, Miguel Franklin De Castro and Rossana Maria De Castro Andrade(2017) Secure Cloud Storage Service for Detection of Security Violations,Cluster, Cloud and Grid computing,17 I EEE /ACM International Conferece,Madrid, Spain, 2017.

Ayad F.Barsoum and M.Anwar HAssa,(2015) Provable Multicopy Dynamic Data Possession in Cloud Computing Systems,IEEE Transactions on Information Forensics and Security,Vol. 10,Issue : 3,pp.485-497,2015

Sanjay K. Madria, Security and Risk Management in the Cloud ,Computer , Vol. 49,9,pp-110-113,2016.

Y.Chen,L.Wang,C.Liao, Eavesdropping Prevention or Network Coding Encrypted Cloud Storage System, IEEE Transactions on Parallel and Distributed Systems,Vol.27,8,pp-2261-2273,2015.

S.Namasudra and P.Roy,(2017) Time Saving protocol for data accessing in cloud computing“,IET Communications, Vol.11,issue.10, pp.1558-1565,2017

H.Chen,X.Zhu, D.Qiu,L.Liu, and Z.Du ,(2017)” Scheduling for Workfl ows with Security –Sensitive Intermediate Data by Selective Tasks Duplication in Clouds“, IEEE Transactions on Parallel and Distributed Systems, Vol. 28,Issue:9, PP. 2674-2688,2017.

M.Ali, R.Dhamotharan, E.Khan, S.U.Khan, A.V.Vasilakos, A.Y.Zomaya, SeDaSC:Secure Data Sharing in Clouds, IEEE Systems Journal, Vol.11,issue:2, pp. 395-404,2017.

J.Li, D.Lin, A.C.Squicciarini, J.Li,and C.Jia, Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds, IEEE Transactions on Cloud Compputing, Vol.5,Issue: 3,pp.499 -509,2017.

Renu.S and Dr.S H Krishnaveni,(2017)An Enhanced CIA tree Using String Matching Algorithms, IJAER, Vol.12, No.16, pp-6123-6126, Sep 2017.

A.Bessani, M. Correia, B. Quaresma, F. André and P. Sousa, "DepSky: dependable and secure storage in a cloudof-clouds", ACM Transactions on Storage, Vol. 9, No. 4, Article 12, 2013.

Metz, C. DDoS attack rains down on Amazon cloud. The Register. http://www.theregister.co.uk/2009/10/05/amazon bitbucket outage/

Raphael, J. The 10 worst cloud outages (and what we can learn from them). Infoworld. http://www. infoworld.com/d/cloud-computing/the-10-worst-cloud-outages-and-what-we-can-learnthem-902,2011.

Sarno,(2009) , Microsoft says lost sidekick data will be restored to users. Los Angeles Times.2009.

Muhammed A.ALZain , Eric Pardede,Ben Soh, James A Thom,Cloud Computing Secuirty: From Single to Multi-Clouds,45th Hawaii International Conference on System Science,pp- 5490-5499,2012.

K.D. Bowers, A. Juels and A. Oprea,HAIL: A high-availability and integrity layer for cloud storage