International Journal of Scientific & Engineering Research, Volume 5, Issue 2, February-2014 15

ISSN 2229-5518

A Survey on Cloud Computing

First Author: Kajal Chachapara, Department of Computer Science & Engineering,

TIT Engineering & Technology, RGPV University Bhopal, India, E-mail: kajal.chachapara@gmail.com

Co Author: Prof. Rajesh Nigam HOD, Department of Computer Science & Engineering, TIT Engineering & Technology, RGPV University Bhopal, India.

Abstract—Cloud is popular buzz word now days. It has opened a new way of computing and added new era in technology. A cloud provider provides computing to consumers as per their needs. Provider tries to provide many functions to consumers; file sharing is one of that. W hen user will store file on cloud, user may want to share that file with someone sometime. Security is big concern because cloud computing involves many layers. This survey paper is focused on basics of cloud computing, security issues in cloud and sharing techniques used. This paper observes sharing of files through various layers of cloud computing keeping security in mind.

Index Terms—Cloud computing, Security issues, File sharing.

—————————— ——————————

1 INTRODUCTION

loud computing has provided variety of computing tech- niques. As its providing virtual infrastructure to store and develop different functionalities to consumer securi- ty is big concern. Consumers will store their important
files on cloud and will share that file eventually with others.
Being security and privacy a major concern now days, various
security and encryption algorithms should be implemented
for sharing. There are various encryption and security
algorithms are available that can be used for file sharing. Cur- rent file sharing techniques includes generating a link and provide that link to friends. User can generate link along with permissions, so as per permission defined user can get access to the file of owner. Major concern should be met is security along with sharing. Technique should allow sharing of file with encryption and also should allow defining permissions.
Cloud computing is a computing paradigm that involves outsourcing of computing resources with the capabilities of expendable resource scalability, on-demand provisioning with little or no up-front the new economic model removes the need for the organisation to invest a substantial sum of money for purchase of limited IT resources that are internally man- aged, but rather the organisation can outsource its IT resource requirements to a cloud computing service provider and pay per use. That involves the outsourcing of data and/or compu- ting resources with capabilities for expandable resource scala- bility, on-demand provisioning of computing resources with little or no upfront costs. However, organisational and institu- tional need for better value for money from their IT invest- ments is the key factor driving cloud computing the survey provided important findings such as, the shift in the key driv- ers from cost to the need for IT resource scalability and flexi- bility.

2 LITERATURE SURVEY AND RELATED WORK

1. Suphian Khan, Dr. Praveen Saraswat

Have done abstraction of cloud computing techniques and storage facilities available. They have discussed various service layers of cloud computing. Key aspects they have dis- cussed in this paper were storage performance. They also con- cluded some pros and cons of cloud computing. This paper included cloud driver storage architecture, cloud data man- agement interface and open cloud computing interface. They concluded Google drive as best storage provider now days.

2. Paridhi singhal

Conducted survey on various security issues in cloud
along with policies being used to preserve security, this paper divided security issues in two categories, one is security issues faced by cloud providers and another one is security issues faced by cloud consumers. This paper discussed VM place- ment attacks, hypervisor holes and various security models. This paper has proposed three layer security model. Among three layers, first layer is authentication; second layer is com- bination of encryption and private protection and third layer is fast recovery. Bottom line of paper was security policies should be updated time by time to provide maximum securi- ty.

3. Shahna fathima s, S M Nandhagopal

Proposed a framework to provide privacy manager
for secure data sharing. Framework proposed in this paper
was named cloud information accountability (CIA), which provides end-to-end accountability in highly distributed man- ner. Major motive of this framework was maintaining light- weight and powerful accountability that combines aspect of access control, usage control and authentication. This frame- work includes private and public key generation based on identity based encryption. It involves generating JAR file con-

IJSER © 2014 http://www.ijser.org

International Journal of Scientific & Engineering Research, Volume 5, Issue 2, February-2014 16

ISSN 2229-5518

taining access rules that will imply for authentication.

4. Zekeriya Erkin, Thijs veugen, Tomas toft and Reginald

L Lagendijk

In this paper, authors have presented privacy pre- serving K-Means clustering algorithm that can be applied to social networking. It has proposed encryption mechanism for private data of users and sensitive intermediate values and final cluster allocation. As this algorithm is applied to secure data communication in social networking it can also be ap- plied to secure sharing of files among various cloud consum- ers.

5. Keiko Hashizume, David G Rosado, Eduardo Fernadez- medina and Eduardo B Fernandez

In this paper, authors have give sole focus on security issues being faced by cloud providers and cloud users in cloud computing. They have discussed issues related to resources, vulnerabilities, threats and security policy issues. Paper con- cludes security issues layer by layer. Various communication mechanism and issues related to them are abstracted in this paper.

6. Milad Daivandy, Denis Hunich, Rene Jakel, Steffen

Metzger, Ralph Muller Pfefferkorn and Bernd Schuller

In this research paper authors have focused on data
generated in scientific and commercial field. They have given attention to the fact that organizations often users incompati- ble resource manager which in turn leads to poor efficiency. This paper contains base of grid computing, RESTful web ser- vices and WebDEV. This paper proposes federation layer that will allow federation of storage which in turn will allow uni- form access. Author claims that work in this paper will com- plement existing grid computing efforts by facilitating access to storage system not via commonly used grid computing stand- ards.

7. Nelson Gonzalez, Charles Miers, Fernando Redigolo, Marcos Simplicio, Tereza Carvalho, Mats Naslund and Maken Pourzandi

In this paper authors have given taxonomy of security issues in cloud computing. There is various security issues are mentioned like network security issue with scenario then se- curity threats at interface layer and then going to data securi- ty, a major issue. There is also listing of threats related to vir- tualization, governance, compliance and legal issues. They have abstracted whole security measures in different fields as architecture.

8. Sanjiv Kumar Pippal and Dharmedra singh Kushwaha

In this paper author has given concern to, how cloud providers can provide complex heterogeneous computing en- vironment to cloud users. They have proposed multi tenant database architecture along with hoc cloud architecture. Au- thors have considered scenario of organization willing to pro- vide education to remote locations. Proposed system could increase insert update delete with efficiency of 20% to 230% improved. Proposed approach is space efficient and function-
ality improver and provides better reliability. This decompos- es work load and hence does efficient utilization of resources.

9. Jingwei Huang and David M Nicol

In proposed paper author has focused on trust mech- anism being used in cloud computing. They have covered ex- isting trust mechanism and have provided their comments on those. Then they have proposed framework that could be used to establish efficient and more appropriate trust. They have discussed different types of trust like policy based trust, evi- dence based trust, reputation based approach and societal trust. There valuable approach opens a new way of establish- ing trust mechanism in cloud providing more accurate and trust worthy work.

10. Robert Denz and Stephan Taylor

In this survey paper authors have done analysis of current security measures implemented in cloud computing and hypervisor that supports it. Paper suggests that efficient virtualization has lead to many organization providing cloud services more efficiently. Here author has discussed various security issues that arise like vulnerability amplifier, malware prevention and detection. Authors have also abstracted how to increase work load for attacker. This way doubt full opera- tions will take more time which will lead to denial because of time scale.

11. Abhishek Mohta and Lalit kumar Awasthi

In this paper authors have focused on third party au-
ditor that is being used to manage data inside data centres. Author has concluded that these auditors will increase relia- bility but will lead to overhead on data centres at a time of retrieval. Here mechanism is provided which will encrypt con- tent of client ensuring client data is safe at providers. Pro- posed model goes to step by step from encrypting client data then integration of data check mechanism. There is simulation and results to support algorithm.

12. Mrs. Pooja A. Uplenchwar(Kondawar), Mrs. L.H.Patil

This paper abstracts that cloud providing software and services virtually; it opens many security challenges to cloud computing. This paper is focused on storage security issues which in fact consider encryption of data before storing it. Authors have proposed a mechanism where once a cloud user will be revoked whole cloud data will be re-encrypted again and new decryption key will be provided to legal users. Author has proposed time based re-encryption system to overcome network related issues and ensuring more security.

13. Preeti Garg, Dr.Vineet Sharma

In this paper author has taken case of security issues in mobile cloud. Mobile computing is most innovative term of IT and is much popular now days. Paper abstracts comments on security threats on Information disclosure, Tempering, Re- pudiation, Viruses and worms and identity spoofing. In their proposal authors have combined two existing mechanism one of which provides data confidentiality and access control

IJSER © 2014 http://www.ijser.org

International Journal of Scientific & Engineering Research, Volume 5, Issue 2, February-2014 17

ISSN 2229-5518

while other one provides data integrity. Model involves com- munication of Data owner with storage service provider and decryption service provider using message authentication code.

14. R.Balasubramanian and Dr.M.Aramuthan

This paper is giving attention to providing security
mechanism to data while traversing from cloud server to the data owner. Middle security threats are taken in account and security policies are proposed according to that. Various secu- rity problems like malware injection attack, flooding attack and accounting check problems are discussed. Along with that solutions to those attacks are also discussed briefly.

15. Mrs. O.Rajitha, Dr.S.Murali Krishna

This research paper has focused on trusted third par-
ty auditor for secure and dynamic data support. Efficient
computing opens risk related to security which is discussed in this paper. Provable data processing scheme is analysed to propose new system. Proposed architecture involves commu- nication of cloud providers and cloud consumers through third party trust auditor system. Auditor system will contain security policy and identity mechanism for cloud consumers. Concept is providing generated token to authenticated con- sumers to access their data. This will ensure identity and in- tegrity of system and hence will increase security.

3 SUMMERY

Table.1 summarises work done by different authors in differ- ent years in field of cloud computing. Proposed work and fu- ture expansions are listed to better summarise.

Year

Authors

Tech-

niques/Algorith ms

Tools

used

Future work

Oct -

2013

Suphian khan,

Dr.Praveen

Saraswat

Architecture of cloud drive

storage with different mod- els

Not men-

tioned

Efficiency can be poor

as per net- work or in- ternet

June

-

2013

Paridhi

singhal

Storage and

three layer se- curity model

Not

men- tioned

Security

policies need to be updated

April

-

2013

Shahna

Fathima S, S.M.Nandha gopal

Cloud infor-

mation ac- countability framework for privacy man- agement

Java

for JAR file

Indexing for

text files, usage con- trol for exe- cutable and generic ac- countability

April

-

Zekeriya

Erkin, Thijs

Privacy pre-

serving cluster-

Not

men-

Deployment

of privacy

IJSER © 2014 http://www.ijser.org

International Journal of Scientific & Engineering Research, Volume 5, Issue 2, February-2014 18

ISSN 2229-5518

tion spends huge amount for maintenance but cloud compu- ting allows them concentrate on development only. Many au- thors have proposed algorithms and architectures to make cloud computing more efficiently. Main key issues of cloud computing are security threats, resource allocation and shar- ing issues. Virtualization to provide maximum resource pool and grid computing is also proposed. Combination of differ- ent architectures is also proposed to increase efficiency.

Acknowledgments

Here by submitting my research work; I would like to express my gratitude to my guide Professor Rajesh Nigam from Com- puter Science & Engineering - TIT College. I am heartily thankful to him for his constant support and guidelines. I would like to thank all staff of computer department of TIT College for their monitoring and encouragement through the course of my research work.

4 CONCLUSION

Cloud computing is evolution in field of computing. It has relieved cloud consumers from being bothered about infra- structure. Any organization seeking growth need to use com- puting for different jobs, for that running machine efficiently and maintenance of that machinery is big concern. Organiza-

REFERENCES

[1] Suphian Khan, Dr.Praveen Saraswat, “A Novel Approach towards cloud storage and its performance”, International journal of scientific & engineering research, Volume 4, Issue 10, October-2013, ISSN 2229-5518.

[2] Paridhi Singhal, “Data Security models in cloud computing” International journal of scientific & engineering research, Volume 4, Issue 6, June-2013, ISSN 2229-5518.

[3] Shahna Fathima S, S.M.Nandhagopal, “Privacy manager for data sharing in the cloud” International Journal of Scientific & Engineering Research, Volume

4, Issue 4, April-2013, ISSN 2229-5518.

[4] Zekeriya Erkin, Thijs veugen, Tomas toft and Reginald L Lagendijk, “Privacy preserving distributed clustering” EURASIP journal on information security, a SpringerOpen journal.

[5] Keiko Hashizume, David G Rosado, Eduardo Fernadez-medina and Edu- ardo B Fernandez, “An analysis of security issues for cloud computing”, Journal of internet services and applications, a SpringerOpen journal

[6] Milad Daivandy, Denis Hunich, Rene Jakel, Steffen Metzger, Ralph Muller Pfefferkorn and Bernd Schuller, “Heterogeneous resources federation with a centralized security model for information extraction”,Journal of internet ser- vices and applications, a SpringerOpen journal.

[7] Nelson Gonzalez, Charles Miers, Fernando Redigolo, Marcos Simplicio, Tere- za Carvalho, Mats Naslund and Maken Pourzandi, “A quantitative analysis of current security concerns and solutions for cloud computing” Journal of cloud computing, a SpringerOpen journal.

[8] Sanjiv Kumar Pippal and Dharmedra singh Kushwaha, “A simple, adaptable and efficient heterogeneous Multi-tenant database architecture for ad hoc cloud computing”, Journal of cloud computing, a SpringerOpen journal.

[9] Jingwei Huang and David M Nicol, “Trust mechanism for cloud computing”, Journal of cloud computing, a SpringerOpen journal.

[10] Robert Denz and Stephan Taylor, “A survey on securing the virtual cloud”, Journal of cloud computing, a SpringerOpen journal.

[11] Ailixier Aikebaier, Tomoya Enokido and Makoto Takizawa, “Trustworthy group making algorithm in distributed systems”, Human centric computing and information science, a SpringerOpen journal.

[12] Dr.Pradeep K.Deshmukh, Mrs. Vrushali R.Desale, Prof.Rushali A.Deshmukh, “Investigation of TPA (third party auditor role) for cloud data security”, In- ternational Journal of Scientific & Engineering Research Volume 4, Issue 2,

February-2013, ISSN 2229-5518.

IJSER © 2014 http://www.ijser.org

International Journal of Scientific & Engineering Research, Volume 5, Issue 2, February-2014 19

ISSN 2229-5518

[13] Abhishek Mohta and Lalit kumar Awasthi, “Cloud data security while using third party auditor”, International Journal of Scientific & Engineering Re- search Volume 3, Issue 6, June-2012, ISSN 2229-5518.

[14] Mrs. Pooja A. Uplenchwar (kondawar), Mrs. L.H.Patil, “Data security in unreliable cloud using access control and access time”, International Journal of Scientific & Engineering Research Volume 4, Issue 12, December-2013, ISSN 2229-5518.

[15] Preeti Garg, Dr.Vineet Sharma, “Secure data storage in mobile cloud compu-

ting”, International Journal of Scientific & Engineering Research Volume 4, Is- sue 4, April-2013, ISSN 2229-5518.

[16] R.Balasubramanian and Dr.M.Aramuthan, “Security problems and possible security approaches in cloud computing’ International Journal of Scientific & Engineering Research Volume 3, Issue 6, June-2012, ISSN 2229-5518.

[17] Mrs. O.Rajitha, Dr.S.Murali Krishna, “Secure dynamic data support and trusted third party auditor in cloud computing” International Journal of Sci- entific & Engineering Research Volume 4, Issue 10, October-2013, ISSN 2229-

5518.

IJSER © 2014 http://www.ijser.org