You are on page 1of 5

BAHAUDDIN ZAKARIYA UNIVERSITY MULTAN,

LAHORE CAMPUS
Department Of Computer Science
(Synopsis for the degree of MS in Computer Science)

Title: SECURITY MODEL OF CLOUD COMPUTING


FOR STORED DATA

Name of Student: Sana Ullah


Registration No: MSCS14F021

ABSTRACT
The reason for this exploration will be concentrated on user's data security in cloud
computing i.e. data storage security issues, how to minimize unapproved access to data by
proposing security model, then accessible solutions will be exhibited and security model
will be recommended. Cloud computing can be alluded as technology in view of web,
having shared, versatile infrastructure that can be utilized as service by users.
Compositely cloud computing is hardware and software being conveyed by means of
internet as-a service. It is a remarkable advancement innovation getting prominent
because of low cost, adaptability and versatility according to user's requirements. Despite
its prominence, enterprises and large organizations are hesitant to precede onward cloud
computing because of security issue, particularly user's data security. Organizations are
worry over data security problems as their private and sensitive data should be stored by
service supplier at any location worldwide. Numerous security models are reachable but
yet these models don't satisfy the security necessities according to service suppliers.
Cloud is always under assaults of hackers and data availability, integrity and privacy is
compromise. This exploration will present a model keeping in perspective the
requirements of service suppliers (Providers) that improve the data security as far as
availability, integrity and privacy. The propose model will help the hesitant users to
effortlessly choose to move on cloud while understanding the risks connected with cloud
computing.
BAHAUDDIN ZAKARIYA UNIVERSITY MULTAN,
LAHORE CAMPUS

(Department of Computer Science)


(Synopsis for M.S Degree in Computer Science)

Title: SECURITY MODEL OF CLOUD COMPUTING


FOR STORED DATA

Date of Admission : September, 2014


Data of Initiation : after approval
Probable Duration : months

Personnel:
a) Name of Student : Sana
Ullah
b) Registration No :
MSCS14F021
c) Supervisor
I. Mr. Khawaja Tehseen Ahmed : (Supervisor)

Introduction
Cloud computing (CC) is successful solution for using and accessing resources on
internet. It is processable, powerful and storage able solution that provided to users on
demand. CC provides services to the users and it has the capability of reliability and
scalability. The capacity of CC can be improved by addition of additional hardware as per
demand, because the need of cloud is growing day by day. Users can get access of his
applications and data on cloud from anywhere in the world either hosted or his own.
Many users are shared the resources of cloud. These recourses of cloud are provided to
users on demand bases as service. The resources of cloud can be increased or decreased
as on user needs (Tan and Wang, 2012).
Instead of remote server, we can access services of sources which are spreading
over geographically in cloud computing. There is not exact explanation of CC, but we
say that cloud computing is a set of servers which are spreading over geographically also
called master computer. It offers the required services to the users as and when demanded
by the end-users on pay per use policy. Cloud computing has providing main three types
of services; IaaS, SaaS and PaaS. The intense example of cloud computing is Amazon
EC2 bright. The concept of development style of software has been changed by the
invention of Cloud because cloud has become most webs centric. The cloud services are
provided by numerous companies. Presently some major are International Business
Machines (IBM), Google Corporation, M.S (Microsoft), Virtual Machine (VM) ware &
EMC, and Amazon In (Younis and Kifayat, 2013).
Cloud is operating as main three kinds due to privacy that are public, private &
hybrid. Public clouds sources are available publically and it can be used by any user
through internet as and when required. Because its security is most complex tasks so its
not more secure than others. Public clouds are work as virtual data center that liable outer
side of the firewall. Microsoft, Google Drive, Drop box etc are examples of public cloud.
Private cloud is used as privately, has confidential data of users and restricted to particular
company, institute, person or organization etc. Private cloud is not accessible from
outside. It has virtual cloud in the interior of data centers in the rear the firewall. It has
devoted privately space for system within a data centers. Hybrid cloud is a combination
of public and private clouds characteristics. Its to be made of two or more private or
public clouds.
The cloud is inexpensive because of low investment and operational expenditure
and also resources provided to users on demand basis. Therefore it is cost effective
facility. It is using by different machines such as smart phones, Google Glass, PDAs,
desktops and tablet PCs etc. It fulfilled the requirements of users in different manners.
There are two ends of cloud: front and back end. The front end is also called user end
because it used services that provided by back-end. The back end is also called cloud
computing end. These ends are interlinked with each other via internet.

When above said ends send data to insert, delete, modify and share with each
other by internet then the security issue can be occurred. There are many security issues
occurred when users manipulate their data on different ways. Such as when users stored
data on clouds then it may be stored at any other place or transferee and read by others. It
may be hacked by others one. The privacy issues can be raised for users if shared data
displayed on un-expected platform. When users retrieve stored data from cloud its not
matched with old stored data. There are many examples which may lead us to serious
security problems, privacy issues, cyber crime and as well as violation of privacy.

In light of above said issues we should take serious attention to the data security
on clouds. We cant compromise at any cost regarding security and privacy issues. It is
straightforwardly concern to institutes, organization, company and any person assurance
on clouds. It is important to secure data on cloud from unauthorized persons to make
trustable services. There are many security issues that cannot be resolved by single one
therefore I have chosen to minimize unauthorized access and data storage protection.

Objectives:
The major goal of this investigation is to set up security model that will present
encryption-scheme, which will accomplish the necessities (requirement) of cloud service
providers.

Review of Literature
In existing technologies, cloud infrastructure is facing security threat during
accessing and storing data (Carrol, M.,A. Van Der Merwe and P. Kotze, 2011).

The author has investigated on privacy and data protection in cloud computing
and present result as users feel insecure during moving on cloud either it is private/
public/ hybrid. He also present that security and privacy are primarily issues (Chen, D.
and H. Zahoo, 2012).

Authors suggest a security model for cloud and define three layers: Authenticating
Protection, File encryption and recovery of files in fast mood (Zhang, S., H. Yan and X.
Chen, 2012).

Materials and Methods


References
Tan, Y. and X. Wang 2012. Research of cloud computing data security technology.
Consumer Electronics, Communications and Networks (CECNet), nd
International Conference on, IEEE: 2781-2783

Younis, M. Y. A. and K. Kifait 2013. Secure cloud computing for critical infrastructure: A
survey. Liverpool John Moores University, United Kingdom, Tech. Rep

Carrol, M.,A. Van Der Merwe and P. Kotze 2011. Secure Cloud Comuting: Benefits,
Risks and Controls.

Chen, D. and H. Zahoo 2012. Data security and privacy protection issues in cloud
computing. Computer Science and Electronics Engineering (ICCSEE),
International Conference on, IEEE, 1: 647-651

Zhang, S., H. Yan and X. Chen 2012. Research on key technologies of cloud computing.
Computer Science and Information Processing (CSIP), International Conference
on, IEEE: 1126-1128

You might also like