Home   >   CSC-OpenAccess Library   >    Manuscript Information
A proposed Solution: Data Availability and Error Correction in Cloud Computing
Anil Gupta, Parag Pande, Aaftab Qureshi, Vaibhav Sharma
Pages - 405 - 413     |    Revised - 01-09-2011     |    Published - 05-10-2011
Volume - 5   Issue - 4    |    Publication Date - September / October 2011  Table of Contents
MORE INFORMATION
KEYWORDS
Cloud Computing, Security issues, Cloud Security, Cloud architecture
ABSTRACT
Cloud Computing is the hottest technology in the market these days, used to make storage of huge amounts of data and information easier for organizations. Maintaining servers to store all the information is quite expensive for individual and organizations. Cloud computing allows to store and maintain data on remote servers that are managed by Cloud Service Providers (CSP) like Yahoo and Google. This data can then be accessed through out the globe. But as more and more information of individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. In this paper we discussed security issues and requirements in the Cloud and possible solutions of some the problems. We develop an architecture model for cloud computing to solve the data availability and error correction problem.
CITED BY (2)  
1 Yadav, V., & Aggarwaal, P. (2014). A Survey on Security in Cloud Computing.
2 Dogra, N., & Kaur, H. (2013). Cloud Computing Security: Issues and Concerns. International Journal of Emerging Technology and Advanced Engineering, 3(3).
1 Google Scholar 
2 Academic Journals Database 
3 CiteSeerX 
4 Bielefeld Academic Search Engine (BASE) 
5 Scribd 
6 SlideShare 
7 PdfSR 
A. Singh, M. Srivatsa, and L. Liu. “Search-as-a-Service: Outsourced Search over Outsourced Storage”. ACM TRANSACTIONS ON THE WEB, 3(4), September 2009.
Anil Gupta, Aaftab Qureshi, Parag Pande,”Cloud Computing Characteristics and Service Models: our own interpretation”.
Apache Hadoop, 2009. http://hadoop.apache.org/.
Å. A. Nyre and M. G. Jaatun. “Privacy in a semantic cloud: What’s trust got to do with it?”. In The First International Conference on Cloud Computing, pages 107–118, 2009.
B. Blakley and C. Heath. SECURITY DESIGN PATTERNS, 2004. The Open Group Security Forum.
CARMEN, 2009. http://www.carmen.org.uk/.
Condor DAGman, 2009. http://www.cs.wisc.edu/condor/dagman/. [18] D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov. “The eucalyptus open-source cloud-computing system”. In Proceedings of Cloud Computing and Its Applications, October 2008.
D. Chen, X. Huang, and X. Ren. “Access control of cloud service based on ucon”. In The First International Conference on Cloud Computing, pages 559–564, 2009.
D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov. “The eucalyptus open-source cloud-computing system”. In Proceedings of Cloud Computing and Its Applications, October 2008.
E. B. Fernandez, J. Wu, M. M. Larrondo-Petrie, and Y. Shao. On building secure scada systems using security patterns. In CSIIRW ’09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research, pages 1–4, New York, NY, USA, 2009. ACM.
G. Zhao, J. Liu, Y. Tang, W. Sun, F. Zhang, X. ping Ye, and N. Tang. “Cloud computing: A statistics aspect of users”. In The First International Conference on Cloud Computing, pages 347–358. Springer, 2009.
Gansen Zhao, et al., “Deployment Models: Towards Eliminating Security Concerns from Cloud Computing” IEEE 2010, pp 189-195.
J. Dean and S. Ghemawat. “Mapreduce: simplified data processing on large clusters”. Commun. ACM, 51(1):107–113, 2008.
K. J. Hughes. “Domain Based Security: enabling security at the level of applications and business processes”, 2002. www.qinetiq.com.
Kresimir Popovic, et al., “Cloud “Computing issues and challanges” MIPRO 2010 May 24-28 Opatija, Croatia, pp 344-349.
L. Hu, S. Ying, X. Jia, and K. Zhao. “Towards an approach of semantic access control for cloud computing”. In The First International Conference on Cloud Computing, pages 145–156, 2009.
L. Kaufman. “Data security in the world of cloud computing”. IEEE SECURITY & PRIVACY, 7(4), July- August 2009.
L. Yan, C. Rong, and G. Zhao. “Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography”. In The First International Conference on Cloud Computing, pages 167–177, 2009.
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. “Above the clouds: A Berkeley view of cloud computing”. Technical Report UCB/EECS- 2009-28, EECS Department, University of California, Berkeley, Feb 2009.
M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly.“Dryad: distributed data-parallel programs from sequential building blocks”. In EuroSys ’07: Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007, pages 59–72, New York, NY, USA, 2007. ACM.
M. Schumacher, E. Fernandez, D. Hybertson, and F. Buschmann. SECURITY PATTERNS: INTEGRATING SECURITY AND SYSTEMS ENGINEERING. John Wiley & Sons, 2005.
Nimbus. “Introduction to nimbus”, 2009. http://workspace.globus.org/clouds/nimbus.html. [3] S. Beco, A. Maraschini, and F. Pacini. “Cloud computing and RESERVOIR project”. NUOVO CIMENTO DELLA SOCIETA ITALIANA DI FISICA C-COLLOQUIA ON PHYSICS, 32(2), Mar-Apr 2009.
S. Beco, A. Maraschini, and F. Pacini. “Cloud computing and RESERVOIR project”. NUOVO CIMENTO DELLA SOCIETA ITALIANA DI FISICA C-COLLOQUIA ON PHYSICS, 32(2), Mar-Apr 2009.
S. Creese, P. Hopkins, S. Pearson, and Y. Shen. “Data protection-aware design for cloud services”. In The First International Conference on Cloud Computing, pages 119–130, 2009.
S. Pearson, Y. Shen, and M. Mowbray. “A privacy manager for cloud computing”. In The First international Conference on Cloud Computing, pages 90–106, 2009.
T. Heyman, K. Yskout, R. Scandariato, and W. Joosen. “An analysis of the security patterns andscape”. In SESS ’07: Proceedings of the Third International Workshop on Software Engineering for Secure Systems, page 3, Washington, DC, USA, 2007. IEEE Computer Society.
T. Uemura, T. Dohi, and N. Kaio. “Availability analysis of a scalable intrusion tolerant architecture with two detection modes”. In The First International Conference on Cloud Computing, pages 178–189, 2009.
Wikipedia” www.wikipedia.org”.
Associate Professor Anil Gupta
Maharaja Ranjit Singh College - India
anil_sg@yahoo.com
Mr. Parag Pande
Shri Satya Sai Institiute of Science and Technology, - India
Mr. Aaftab Qureshi
Shri Satya Sai Institiute of Science and Technology, - India
Mr. Vaibhav Sharma
Maharaja Ranjit Singh College - India


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS