Harnessing RAID mechanism for enhancement of data storage and security on cloud

Brazilian Journal of Science and Technology - Tập 3 - Trang 1-13 - 2016
Sudipta Sahana1, Rajesh Bose2, Debabrata Sarddar2
1Department of CSE, JIS College of Engineering, Kalyani, Nadia, India
2Department of CSE, University of Kalyani, Kalyani, India

Tóm tắt

As one of the most sought-after technologies in the world today, cloud computing finds a prominent place among researchers, service providers, hardware and software engineers, and consumers alike. Among the key services provided by cloud computing, the most widely used is storage on the cloud. To ensure a high degree of reliability and an almost constant state of availability, cloud storage systems rely on replication of data. Replicating data is not without its costs. In an attempt to mitigate costs of storage, designers have banked on erasure coding practices in lieu of data replication. This has resulted in development of Cloud RAID systems. An ideal Cloud RAID system strikes an optimum balance between performance, storage, and reliability. In addition to this, data security is of paramount interest. In this paper, we introduce an entirely new technique of storing data in cloud networks by file type classification. Combining RAID types with this, our paper proposes a model that is robust and can withstand instances of hard disk failures. Further, we discuss a methodology that is embedded in our proposed framework that supports user authentication for data storage and retrieval. Our Secure User Authenticated Cloud RAID model shields user data from prying eyes and even from unauthorized attempts by the cloud service provider our Secure User Authenticated Cloud RAID architecture.

Tài liệu tham khảo

Abu-Libdeh H, Princehouse L, Weatherspoon H (2010) RACS: a case for cloud storage diversity. In: Proceedings of the 1st ACM symposium on cloud computing, SoCC ’10. ACM, New York, pp 229–240 Addis B, Ardagna D, Panicucci B, Zhang L (2010) Autonomic management of cloud service centers with availability guarantees. In: Proceedings of the 3rd international conference on cloud computing (CLOUD 10). IEEE Press, pp 220–227 Chow R et al (2009) Controlling data in the cloud: outsourcing computation without outsourcing control. In: ACM workshop on cloud computing security Deng J, Hu J, Liu ACM, Wu J (2010) Research and application of cloud storage. In: Proceedings of the 2nd international workshop on intelligent systems and applications (ISA 10). IEEE Press, pp 1–5 Feel HTA, Khafagy MH (2011) OCSS: ontology cloud storage system. In: Proceedings of the first international symposium on network cloud computing and applications (NCCA 11). IEEE Press, pp 9–13 Hao L, Han D (2011) The study and design on secure-cloud storage system. In: Proceedings of the international conference on electrical and control engineering (ICECE 11). IEEE Press, pp 5126–5129 He Q, Li Z, Zhang X (2010) Study on cloud storage system based on distributed storage systems. In: Proceedings of the international conference on computational and information sciences (ICCIS 11). IEEE Press, pp 1332–1335 Jayasinghe D, Pu C, Eilam T, Steinder M, Whalley I, Snible E (2011) Improving performance and availability of services hosted on IaaS clouds with structural constraint-aware virtual machine placement. In: Proceedings of the international conference on services computing (SCC 11). IEEE Press, pp 72–79 Koletka R, Hutchison A (2011) An architecture for secure searchable cloud storage. In: Proceedings of the international conference on information security South Africa (ISSA 11). IEEE Press, pp 1–7 Liu W (2012) Research on cloud computing security problem and strategy. In: Proceedings of the 2nd international conference on consumer electronics, communications and networks (CECNet 12). IEE Press, pp 1216–1219 Machida F, Andrade E, Kim DS, Trivedi KS (2011) Candy: component-based availability modeling framework for cloud service management using SysML. In: Proceedings of the 30th IEEE symposium on reliable distributed systems (SRDS 11). IEEE Press, pp 209–218 Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of ACM conference on computer and communications security (CCS 2009), pp 199–212 Sahana RBS, Sarddar D (2015) An enhanced storage management scheme with search optimization for cloud data center. Int J Appl Eng Res. 10(12):32141–32150. ISSN: 0973-4562 Srinivasan J, Wei W, Ma X, Yu T (2011) EMFS: email-based personal cloud storage. In: Proceeding of the 6th international conference on networking, architecture and storage (NAS 11). IEEE Press, pp 248–257 Widjajarto A, Supangkat SH, Gondokaryono YS, Prihatmanto AS (2012) Cloud computing reference model: the modelling of service availability based on application profile and resource allocation. In: Proceedings of the international conference on cloud computing and social networking (ICCCSN 12). IEEE Press, pp 1–4 Wu J, Ping L, Ge X, Wang Y, Fu J (2012) Cloud storage as the infrastructure of cloud computing. In: Proceedings of the international conference on intelligent computing and cognitive informatics (ICICCI 10). IEEE Press, pp 380–383 Zhang D, Sun F, Cheng X, Liu C (2011) Research on hadoop-based enterprise file cloud storage system. In: Proceedings of the 3rd international conference on awareness science and technology (iCAST 11). IEEE Press, pp 434–437 Zhang X, Du H, Chen J, Lin Y, Zeng L (2011) Ensure data security in cloud storage. In: Proceedings of the international conference on network computing and information security (NCIS 11). IEEE Press, pp 284–287