SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 8, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1573
Data Security Model Enhancement in Cloud Environment
Abhilash Pulipati1
1
Department of Electronics & Communication Engineering
1
Jawaharlal Nehru Technological University
Abstract—With the rapid developments across the
information technology usage of cloud infrastructure has
increased a lot. There are lots of services offered by cloud
where data storages occupies the primary stand when
compared to rest of the services. Data security across the
cloud is the main aspect to be considered while storing the
data of any organization across a remote location. There are
many parameters to be considered while providing security
to cloud integrity, confidentiality and availability. There was
ample research done in this context where there are many
security models available for all the three aspects discussed.
The main aim of the proposed system is to make the cloud
data server available by blocking unwanted traffic with a
firewall. OPNET simulation is done to evaluate the
performance of the cloud data storage and the corresponding
security issues. From the overall analysis of the results it is
clear that blocking the unwanted web traffic over the cloud
storage security has improved a lot in terms of traffic and
packet managements.
Key words: Data storage, Cloud computing, Cloud data
security, web traffic, firewall.
I. INTRODUCTION
The basic principle of cloud computing belongs to
distributed computing where lots of data centers and web
services. There are many cloud computing service providers
and the major include Microsoft, Yahoo, Google and
Amazon and all these service providers provide data storage
with ample security. There are many architectures of cloud
computing but the most sophisticated architecture of cloud
was proposed by Amazon during the year 2002. The concept
of data storage over servers has taken the cloud computing
technology to a new phase and got popular and huge
response from lots of companies. There are many techniques
to store the data over cloud server and the main aspects
considered here include client’s confidentiality, availability
and integrity of the data stored across a remote server.
Confidentiality plays an important role in storing and
keeping the clients data private where the privacy place a
key role as the data is stored across a remote cloud server.
Confidentiality of the client’s data is maintained by
traditional techniques like legal protection, encryption and
access control. Integrity refers to the level of confidence
against the data that need to be supported across the cloud
and the way data is protected from unauthorized usage.
When the case with availability is considered it refers to the
anticipation against usage of the cloud data by the users.
Users should have access to the data at any point time after
passing through the authentication process. In general data is
stored across the cloud either at single location or as
multiple replicas based on the priority of data. A typical
cloud storage environment is as shown below fig. 1.
Fig. 1: cloud storage architecture
There was lot of research done in terms of cloud data
storage security in terms of confidentiality and integrity.
Availability is equally important as whenever the users want
to either access or upload data to the cloud and there were
some research gaps in this context. Availability of data plays
an important role as this aspect is affected with lot of factors
like network and server traffic over the cloud. In general
performance of the cloud is affected with lot of issues like
nature of the applications being maintained over the cloud
and the corresponding traffic. In general most of the
applications maintained across cloud are web based and
huge web traffic is generated over the network and this
might affect the overall database operations against its
availability to the users. The main focus of this research is to
evaluate the availability of the cloud data and propose a
possible solution that make data access much faster with
ample security and information protection. Proposed
solution can be achieved with a simulation procedure where
an internet based cloud can be simulated where different
applications can be set for better traffic and safety
management. The actual procedure followed to simulate an
internet based cloud is explained in the below section.
II. PROPOSED SOLUTION
As discussed in the previous sections, the main aim of this
study is to evaluate the security of the data storage across
clouds against availability issues. OPNET IT guru is used as
the simulation tool to create an internet based cloud and this
tool provides options to create number of scenarios where
the results can be compared and performance is evaluated.
In this simulation three scenarios are created where the first
scenario has no security constraints. In this scenario have no
firewalls across the simulation and normal working
conditions are simulated.
Data Security Model Enhancement in Cloud Environment
(IJSRD/Vol. 1/Issue 8/2013/0012)
All rights reserved by www.ijsrd.com 1574
Two applications are simulated across the cloud like the
database application and web application. Required
application and profile configurations are created at the node
level and thus now the cloud supports and generates the
database traffic and web traffic. In this scenario data traffic
is dominated by the cloud traffic and the availability of
database resources is very less. Two subnets are used where
they act as service providers of clouds, an internet based IP
cloud is used and two Ethernet routers are used to create the
required simulated network. DB query and DB response
time are used as the performance metrics for database,
where HTTP page response is considered for the web
applications. Almost 150 workstations are used and they act
as the end users of the database and web application. In the
second scenario a router is replaced with firewall router and
this now has better security constraints for the database
application. Packet latency is set to 0.05 seconds thus a
perfect packet filtering aspects are issued in this scenario
Third scenario also has firewall routers and few
configurations are made to block the web traffic. Thus web
traffic has some constraints over this scenario and
unauthorized web traffic is blocked and now the database
access has less traffic to the users. Simulation is run for 1
hour and the results are compared for the three scenarios.
Overall simulation setup created with OPNET in the first
scenario is as shown below
Fig. 2: Internet cloud simulation setup for first scenario
Below screen shows the simulation setup for second and
third scenarios
Fig, 3: Simulation setup for second and third scenarios
Below figure shows the changes made to the third scenario
where the web traffic is blocked
Fig. 4: Configurations made to block the unauthorized web
traffic
III. RESULTS
DB query response timeA.
Fig. 5: Graph of DB Query Response Time
From the graph of figure 5 it is clear that database query
response time is more with the firewall scenario and thus the
availability of data is more in this context
Database server point to point utilizationB.
Fig. 6: Graph of Database server point to point utilization
From the above graph of figure 6 it is clear that the overall
cloud utilization rate has increased over the secured
scenario.
Data Security Model Enhancement in Cloud Environment
(IJSRD/Vol. 1/Issue 8/2013/0012)
All rights reserved by www.ijsrd.com 1575
Cloud utilizationC.
Fig. 7: Graph of Cloud Utilization
As the graph shows, Cloud utilization has improved a lot
across the secured scenarios when compared to other
scenarios.
IV. CONCLUSION
The main aim of this research is to enhance the security
model of data storage across cloud computing. There are
many issues to be considered while improving security for
the data storage and in this research availability of data is
considered as the main aspect. OPNET simulation tool is
used for simulating internet based clouds. Three scenarios
are used across the simulation where the first scenario has
no security constraints, second scenario has firewall routers
and the third scenario has configurations that block the
unauthorized web traffic. From the simulation results it is
clear that performance of the database availability is
improved a lot and even the unauthorized web access is
blocked. Database response time, database server utilization
and the overall cloud storage utilization is improved.
ACKNOWLEDGMENT
I would like to thank all my family members and friends
who supported me in developing this research. I am glad to
thank my professor Mr. P Rama Krishna MTECH ECE
department in providing ample research scope and guidance.
REFERENCES
[1] John W. Rittinghouse, James F. Ransome,
“Introduction”, Cloud Computing- Implementation,
management & security, Ed. Taylor & Francis Group,
LLC ,2010, pp.27-29.
[2] Cor-Paul Bezemer, Andy Zaidman, “Multi-Tenant SaaS
Applications: Maintenance Dream or Nightmare?”,
Delft University of Technology Software Engineering
Research Group Technical Report Series, 2010,
http://www.se.ewi.tidelft.nl/techreports, pp 1-5.
[3] Uma Somani, Kanika Lakhani, Manish Mundra,
“Implementing Digital Signature with RSA Encryption
Algorithm to Enhance the Data Security of Cloud in
Cloud Computing”, 2010 1st International Conference
on Parallel, Distributed and Grid Computing (PDGC -
2010), pp.211-216.
[4] Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian,
Aoying Zhou, “Security and Privacy in Cloud
Computing: A Survey”, 2010 Sixth International
Conference on Semantics, Knowledge and Grids, pp.
105-112.
[5] Kevin Hamlen, Murat Kantarcioglu, Latifur Khan,
Bhavani Thuraisingham, “Security Issues for Cloud
Computing”, International Journal of Information
Security and Privacy, 4(2), April-June 2010, pp 39-51.
[6] Jianfeng Yang, Zhibin Chen, “Cloud Computing
Research and Security Issues”, International Conference
on Computational Intelligence and Software
Engineering(CiSE), Wuhan, 10-12 Dec. 2010, pp 1-3.
[7] Shuai Zhang, Shufen Zhang, “Cloud Computing
Research and Development Trend”, 2010 Second
International Conference on Future Networks,ICFN’10
, 2010, pp 93-97
[8] The Force.com Multitenant Architecture:
Understanding the Design of Salesforce.com Internet
Application Development Platform.
http://www.salesforce.com/au/assets/Force.com_Multit
enancy_WP_101508.pdf.
[9] David Banks, John S. Erickson, Michael Rhodes,
“Multitenancy in Cloud-based Collaboration Services”,
Hewlett- Packard Development Company, L.P.,
February 21, 2009 http://www.hpl.hp.com
/techreports/2009/HPL-2009-17.pdf.
[10]“Implementing SaaS Multi-tenancy with EMC
Documentum 6.5- Best Practices planning”, EMC2,
http://www.emc.com/collateral/software/white-
papers/h4701-oem-multitenancywp.pdf.

More Related Content

What's hot (20)

PDF
Efficient technique for privacy preserving publishing of set valued data on c...
ElavarasaN GanesaN
 
PDF
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
 
PDF
Fog Computing: Issues, Challenges and Future Directions
IJECEIAES
 
PDF
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
PDF
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
 
PDF
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
 
PDF
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
 
PDF
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
 
PDF
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
 
PDF
A Security Model for Virtual Infrastructure in the Cloud
Editor IJCATR
 
PDF
Enabling efficient multi keyword ranked
Sakthi Sundaram
 
PPTX
data storage security technique for cloud computing
hasimshah
 
DOCX
A Novel privacy preserving public auditing for shared data in cloud
JAVVAJI VENKATA RAO
 
PDF
Providing Secure Cloud for College Campus
vivatechijri
 
PDF
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
PDF
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
IJNSA Journal
 
PDF
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
IJSRD
 
PDF
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
ElavarasaN GanesaN
 
PDF
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
IJERA Editor
 
PDF
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
 
Efficient technique for privacy preserving publishing of set valued data on c...
ElavarasaN GanesaN
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
IRJET Journal
 
Fog Computing: Issues, Challenges and Future Directions
IJECEIAES
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET Journal
 
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud ...
1crore projects
 
IRJET- Two ways Verification for Securing Cloud Data
IRJET Journal
 
Data Search in Cloud using the Encrypted Keywords
IRJET Journal
 
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
IRJET Journal
 
A Security Model for Virtual Infrastructure in the Cloud
Editor IJCATR
 
Enabling efficient multi keyword ranked
Sakthi Sundaram
 
data storage security technique for cloud computing
hasimshah
 
A Novel privacy preserving public auditing for shared data in cloud
JAVVAJI VENKATA RAO
 
Providing Secure Cloud for College Campus
vivatechijri
 
Security Issues in Cloud Computing by rahul abhishek
Er. rahul abhishek
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
IJNSA Journal
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
IJSRD
 
Privacy Preserving in Cloud Using Distinctive Elliptic Curve Cryptosystem (DECC)
ElavarasaN GanesaN
 
Access Control and Revocation for Digital Assets on Cloud with Consideration ...
IJERA Editor
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
 

Viewers also liked (16)

PDF
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
ijsrd.com
 
PDF
Comparison of Wavelet Watermarking Method With & without Estimator Approach
ijsrd.com
 
PDF
Design and Simulation of Radix-8 Booth Encoder Multiplier for Signed and Unsi...
ijsrd.com
 
PDF
Noise Analysis on Indoor Power Line Communication Channel
ijsrd.com
 
PDF
A Novel Management Framework for Policy Anomaly in Firewall
ijsrd.com
 
PDF
A Collaborative Intrusion Detection System for Cloud Computing
ijsrd.com
 
PDF
Combined use of tap-changing transformer and static VAR compensator for enhan...
ijsrd.com
 
PDF
Ijsrdv1 i4019
ijsrd.com
 
PDF
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
ijsrd.com
 
PDF
To Perform SIL And PIL Testing on Fast Dynamic System using Economical AVR Co...
ijsrd.com
 
PDF
Macromodel of High Speed Interconnect using Vector Fitting Algorithm
ijsrd.com
 
PDF
Use of Linear Regression in Machine Learning for Ranking
ijsrd.com
 
PDF
DESIGN OPTIMIZATION AND VALIDATION THROUGH FE ANALYSIS OF PARALLEL MOTION FENDER
ijsrd.com
 
PDF
Gesture Recognition using Wireless Signal
ijsrd.com
 
PDF
Implementation and Performance Analysis of a Vedic Multiplier Using Tanner ED...
ijsrd.com
 
PDF
IaaS Resource Usage Monitoring In cloud
ijsrd.com
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
ijsrd.com
 
Comparison of Wavelet Watermarking Method With & without Estimator Approach
ijsrd.com
 
Design and Simulation of Radix-8 Booth Encoder Multiplier for Signed and Unsi...
ijsrd.com
 
Noise Analysis on Indoor Power Line Communication Channel
ijsrd.com
 
A Novel Management Framework for Policy Anomaly in Firewall
ijsrd.com
 
A Collaborative Intrusion Detection System for Cloud Computing
ijsrd.com
 
Combined use of tap-changing transformer and static VAR compensator for enhan...
ijsrd.com
 
Ijsrdv1 i4019
ijsrd.com
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
ijsrd.com
 
To Perform SIL And PIL Testing on Fast Dynamic System using Economical AVR Co...
ijsrd.com
 
Macromodel of High Speed Interconnect using Vector Fitting Algorithm
ijsrd.com
 
Use of Linear Regression in Machine Learning for Ranking
ijsrd.com
 
DESIGN OPTIMIZATION AND VALIDATION THROUGH FE ANALYSIS OF PARALLEL MOTION FENDER
ijsrd.com
 
Gesture Recognition using Wireless Signal
ijsrd.com
 
Implementation and Performance Analysis of a Vedic Multiplier Using Tanner ED...
ijsrd.com
 
IaaS Resource Usage Monitoring In cloud
ijsrd.com
 
Ad

Similar to Data Security Model Enhancement in Cloud Environment (20)

PDF
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Hossam Al-Ansary
 
PDF
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
 
PDF
Paper id 212014106
IJRAT
 
PDF
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
 
PDF
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
PDF
J0423066069
ijceronline
 
PDF
Security in multi cloud data storage with sic architecture
eSAT Journals
 
PDF
Security in multi cloud data storage with sic
eSAT Publishing House
 
PDF
Ms3422732277
IJERA Editor
 
PDF
Paper id 712019116
IJRAT
 
PDF
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
 
PDF
F017414853
IOSR Journals
 
PDF
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
pharmaindexing
 
PDF
5. ijece guideforauthors 2012 edit sat
IAESIJEECS
 
PDF
Preserving Privacy Policy- Preserving public auditing for data in the cloud
inventionjournals
 
PDF
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
PDF
Cloud Data Security and Secure Data Sharing Methods
IJCSIS Research Publications
 
PDF
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
 
PDF
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
PDF
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
ijtsrd
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Hossam Al-Ansary
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
IRJET Journal
 
Paper id 212014106
IJRAT
 
Cloud Auditing With Zero Knowledge Privacy
IJERA Editor
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Editor IJMTER
 
J0423066069
ijceronline
 
Security in multi cloud data storage with sic architecture
eSAT Journals
 
Security in multi cloud data storage with sic
eSAT Publishing House
 
Ms3422732277
IJERA Editor
 
Paper id 712019116
IJRAT
 
Cloud Computing Using Encryption and Intrusion Detection
ijsrd.com
 
F017414853
IOSR Journals
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
pharmaindexing
 
5. ijece guideforauthors 2012 edit sat
IAESIJEECS
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
inventionjournals
 
Towards Achieving Efficient and Secure Way to Share the Data
IRJET Journal
 
Cloud Data Security and Secure Data Sharing Methods
IJCSIS Research Publications
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET Journal
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Enhancing Availability of Data in Mixed Homomorphic Encryption in Cloud
ijtsrd
 
Ad

More from ijsrd.com (20)

PDF
IoT Enabled Smart Grid
ijsrd.com
 
PDF
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
PDF
IoT for Everyday Life
ijsrd.com
 
PDF
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
PDF
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
PDF
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
 
PDF
A Study of the Adverse Effects of IoT on Student's Life
ijsrd.com
 
PDF
Pedagogy for Effective use of ICT in English Language Learning
ijsrd.com
 
PDF
Virtual Eye - Smart Traffic Navigation System
ijsrd.com
 
PDF
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
ijsrd.com
 
PDF
Understanding IoT Management for Smart Refrigerator
ijsrd.com
 
PDF
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
ijsrd.com
 
PDF
A Review: Microwave Energy for materials processing
ijsrd.com
 
PDF
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
ijsrd.com
 
PDF
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
ijsrd.com
 
PDF
Making model of dual axis solar tracking with Maximum Power Point Tracking
ijsrd.com
 
PDF
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
ijsrd.com
 
PDF
Study and Review on Various Current Comparators
ijsrd.com
 
PDF
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
ijsrd.com
 
PDF
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 
IoT Enabled Smart Grid
ijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
IoT for Everyday Life
ijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
ijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
ijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
ijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
ijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
ijsrd.com
 
A Review: Microwave Energy for materials processing
ijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
ijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
ijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
ijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
ijsrd.com
 
Study and Review on Various Current Comparators
ijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 

Recently uploaded (20)

PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PPTX
Hashing Introduction , hash functions and techniques
sailajam21
 
PDF
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PPT
Oxygen Co2 Transport in the Lungs(Exchange og gases)
SUNDERLINSHIBUD
 
PPTX
Green Building & Energy Conservation ppt
Sagar Sarangi
 
PDF
Zilliz Cloud Demo for performance and scale
Zilliz
 
PDF
IoT - Unit 2 (Internet of Things-Concepts) - PPT.pdf
dipakraut82
 
PDF
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
PDF
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
ijait
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PPTX
Innowell Capability B0425 - Commercial Buildings.pptx
regobertroza
 
PPTX
UNIT DAA PPT cover all topics 2021 regulation
archu26
 
PPTX
Presentation on Foundation Design for Civil Engineers.pptx
KamalKhan563106
 
PDF
BioSensors glucose monitoring, cholestrol
nabeehasahar1
 
PDF
ARC--BUILDING-UTILITIES-2-PART-2 (1).pdf
IzzyBaniquedBusto
 
PDF
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PDF
POWER PLANT ENGINEERING (R17A0326).pdf..
haneefachosa123
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
Hashing Introduction , hash functions and techniques
sailajam21
 
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
Oxygen Co2 Transport in the Lungs(Exchange og gases)
SUNDERLINSHIBUD
 
Green Building & Energy Conservation ppt
Sagar Sarangi
 
Zilliz Cloud Demo for performance and scale
Zilliz
 
IoT - Unit 2 (Internet of Things-Concepts) - PPT.pdf
dipakraut82
 
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
ijait
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
Innowell Capability B0425 - Commercial Buildings.pptx
regobertroza
 
UNIT DAA PPT cover all topics 2021 regulation
archu26
 
Presentation on Foundation Design for Civil Engineers.pptx
KamalKhan563106
 
BioSensors glucose monitoring, cholestrol
nabeehasahar1
 
ARC--BUILDING-UTILITIES-2-PART-2 (1).pdf
IzzyBaniquedBusto
 
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
POWER PLANT ENGINEERING (R17A0326).pdf..
haneefachosa123
 

Data Security Model Enhancement in Cloud Environment

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 8, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1573 Data Security Model Enhancement in Cloud Environment Abhilash Pulipati1 1 Department of Electronics & Communication Engineering 1 Jawaharlal Nehru Technological University Abstract—With the rapid developments across the information technology usage of cloud infrastructure has increased a lot. There are lots of services offered by cloud where data storages occupies the primary stand when compared to rest of the services. Data security across the cloud is the main aspect to be considered while storing the data of any organization across a remote location. There are many parameters to be considered while providing security to cloud integrity, confidentiality and availability. There was ample research done in this context where there are many security models available for all the three aspects discussed. The main aim of the proposed system is to make the cloud data server available by blocking unwanted traffic with a firewall. OPNET simulation is done to evaluate the performance of the cloud data storage and the corresponding security issues. From the overall analysis of the results it is clear that blocking the unwanted web traffic over the cloud storage security has improved a lot in terms of traffic and packet managements. Key words: Data storage, Cloud computing, Cloud data security, web traffic, firewall. I. INTRODUCTION The basic principle of cloud computing belongs to distributed computing where lots of data centers and web services. There are many cloud computing service providers and the major include Microsoft, Yahoo, Google and Amazon and all these service providers provide data storage with ample security. There are many architectures of cloud computing but the most sophisticated architecture of cloud was proposed by Amazon during the year 2002. The concept of data storage over servers has taken the cloud computing technology to a new phase and got popular and huge response from lots of companies. There are many techniques to store the data over cloud server and the main aspects considered here include client’s confidentiality, availability and integrity of the data stored across a remote server. Confidentiality plays an important role in storing and keeping the clients data private where the privacy place a key role as the data is stored across a remote cloud server. Confidentiality of the client’s data is maintained by traditional techniques like legal protection, encryption and access control. Integrity refers to the level of confidence against the data that need to be supported across the cloud and the way data is protected from unauthorized usage. When the case with availability is considered it refers to the anticipation against usage of the cloud data by the users. Users should have access to the data at any point time after passing through the authentication process. In general data is stored across the cloud either at single location or as multiple replicas based on the priority of data. A typical cloud storage environment is as shown below fig. 1. Fig. 1: cloud storage architecture There was lot of research done in terms of cloud data storage security in terms of confidentiality and integrity. Availability is equally important as whenever the users want to either access or upload data to the cloud and there were some research gaps in this context. Availability of data plays an important role as this aspect is affected with lot of factors like network and server traffic over the cloud. In general performance of the cloud is affected with lot of issues like nature of the applications being maintained over the cloud and the corresponding traffic. In general most of the applications maintained across cloud are web based and huge web traffic is generated over the network and this might affect the overall database operations against its availability to the users. The main focus of this research is to evaluate the availability of the cloud data and propose a possible solution that make data access much faster with ample security and information protection. Proposed solution can be achieved with a simulation procedure where an internet based cloud can be simulated where different applications can be set for better traffic and safety management. The actual procedure followed to simulate an internet based cloud is explained in the below section. II. PROPOSED SOLUTION As discussed in the previous sections, the main aim of this study is to evaluate the security of the data storage across clouds against availability issues. OPNET IT guru is used as the simulation tool to create an internet based cloud and this tool provides options to create number of scenarios where the results can be compared and performance is evaluated. In this simulation three scenarios are created where the first scenario has no security constraints. In this scenario have no firewalls across the simulation and normal working conditions are simulated.
  • 2. Data Security Model Enhancement in Cloud Environment (IJSRD/Vol. 1/Issue 8/2013/0012) All rights reserved by www.ijsrd.com 1574 Two applications are simulated across the cloud like the database application and web application. Required application and profile configurations are created at the node level and thus now the cloud supports and generates the database traffic and web traffic. In this scenario data traffic is dominated by the cloud traffic and the availability of database resources is very less. Two subnets are used where they act as service providers of clouds, an internet based IP cloud is used and two Ethernet routers are used to create the required simulated network. DB query and DB response time are used as the performance metrics for database, where HTTP page response is considered for the web applications. Almost 150 workstations are used and they act as the end users of the database and web application. In the second scenario a router is replaced with firewall router and this now has better security constraints for the database application. Packet latency is set to 0.05 seconds thus a perfect packet filtering aspects are issued in this scenario Third scenario also has firewall routers and few configurations are made to block the web traffic. Thus web traffic has some constraints over this scenario and unauthorized web traffic is blocked and now the database access has less traffic to the users. Simulation is run for 1 hour and the results are compared for the three scenarios. Overall simulation setup created with OPNET in the first scenario is as shown below Fig. 2: Internet cloud simulation setup for first scenario Below screen shows the simulation setup for second and third scenarios Fig, 3: Simulation setup for second and third scenarios Below figure shows the changes made to the third scenario where the web traffic is blocked Fig. 4: Configurations made to block the unauthorized web traffic III. RESULTS DB query response timeA. Fig. 5: Graph of DB Query Response Time From the graph of figure 5 it is clear that database query response time is more with the firewall scenario and thus the availability of data is more in this context Database server point to point utilizationB. Fig. 6: Graph of Database server point to point utilization From the above graph of figure 6 it is clear that the overall cloud utilization rate has increased over the secured scenario.
  • 3. Data Security Model Enhancement in Cloud Environment (IJSRD/Vol. 1/Issue 8/2013/0012) All rights reserved by www.ijsrd.com 1575 Cloud utilizationC. Fig. 7: Graph of Cloud Utilization As the graph shows, Cloud utilization has improved a lot across the secured scenarios when compared to other scenarios. IV. CONCLUSION The main aim of this research is to enhance the security model of data storage across cloud computing. There are many issues to be considered while improving security for the data storage and in this research availability of data is considered as the main aspect. OPNET simulation tool is used for simulating internet based clouds. Three scenarios are used across the simulation where the first scenario has no security constraints, second scenario has firewall routers and the third scenario has configurations that block the unauthorized web traffic. From the simulation results it is clear that performance of the database availability is improved a lot and even the unauthorized web access is blocked. Database response time, database server utilization and the overall cloud storage utilization is improved. ACKNOWLEDGMENT I would like to thank all my family members and friends who supported me in developing this research. I am glad to thank my professor Mr. P Rama Krishna MTECH ECE department in providing ample research scope and guidance. REFERENCES [1] John W. Rittinghouse, James F. Ransome, “Introduction”, Cloud Computing- Implementation, management & security, Ed. Taylor & Francis Group, LLC ,2010, pp.27-29. [2] Cor-Paul Bezemer, Andy Zaidman, “Multi-Tenant SaaS Applications: Maintenance Dream or Nightmare?”, Delft University of Technology Software Engineering Research Group Technical Report Series, 2010, http://www.se.ewi.tidelft.nl/techreports, pp 1-5. [3] Uma Somani, Kanika Lakhani, Manish Mundra, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010), pp.211-216. [4] Minqi Zhou, Rong Zhang, Wei Xie, Weining Qian, Aoying Zhou, “Security and Privacy in Cloud Computing: A Survey”, 2010 Sixth International Conference on Semantics, Knowledge and Grids, pp. 105-112. [5] Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham, “Security Issues for Cloud Computing”, International Journal of Information Security and Privacy, 4(2), April-June 2010, pp 39-51. [6] Jianfeng Yang, Zhibin Chen, “Cloud Computing Research and Security Issues”, International Conference on Computational Intelligence and Software Engineering(CiSE), Wuhan, 10-12 Dec. 2010, pp 1-3. [7] Shuai Zhang, Shufen Zhang, “Cloud Computing Research and Development Trend”, 2010 Second International Conference on Future Networks,ICFN’10 , 2010, pp 93-97 [8] The Force.com Multitenant Architecture: Understanding the Design of Salesforce.com Internet Application Development Platform. http://www.salesforce.com/au/assets/Force.com_Multit enancy_WP_101508.pdf. [9] David Banks, John S. Erickson, Michael Rhodes, “Multitenancy in Cloud-based Collaboration Services”, Hewlett- Packard Development Company, L.P., February 21, 2009 http://www.hpl.hp.com /techreports/2009/HPL-2009-17.pdf. [10]“Implementing SaaS Multi-tenancy with EMC Documentum 6.5- Best Practices planning”, EMC2, http://www.emc.com/collateral/software/white- papers/h4701-oem-multitenancywp.pdf.