全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Analysis of Secured Cloud Data Storage Model for Information

DOI: 10.4236/jsea.2024.175017, PP. 297-320

Keywords: Cloud, Data, Information Model, Data Storage, Cloud Computing, Security System Data Encryption

Full-Text   Cite this paper   Add to My Lib

Abstract:

This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model; the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts; Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system.

References

[1]  Nikita, G. and Toshi, S. (2018) Cloud Computing—SPI Framework, Deployment Models, Challenges. International Journal of Emerging Technology and Advanced Engineering, 4, 19-25.
[2]  Ara, R., Rahim, A., Roy, S. and Prodhan, D.U.K. (2020) Cloud Computing: Architecture, Services, Deployment Models, Storage, Benefits and Challenges. International Journal of Trend in Scientific Research and Development, 4, 837-842.
[3]  Ajoudanian, S. and Ahmadi, M.R. (2022) A Novel Data Security Model for Cloud Computing. International Journal of Engineering and Technology, 4, 326-329.
https://doi.org/10.7763/IJET.2012.V4.375
[4]  What Is Data Security? Definition, Solutions and How to Secure Data.
https://www.ibm.com/topics/data-security
[5]  Singh, K. (2022) Efficiency and Security of Data with Symmetric Encryption Algorithm. International Journal of Advance Research in Computer Science and Software Engineering, 2, 1-9.
[6]  Data Integrity (2021). Wikipedia.
https://en.wikipedia.org/w/index.php?title=Data_integrity&oldid=1009067843
[7]  Heyong, W., Wu, W. and Feng-Kwei, W. (2022) Enterprise Cloud Service Architectures. Information Technology and Management, 13, 445-454.
https://link.springer.com/article/10.1007/s10799-032-0139-4
[8]  Chakradhara, C.R., Mogasala, L. and Kumar, Y.R. (2020) Cloud: Computing Services and Deployment Models. International Journal of Engineering and Computer Science, 2, 12.
[9]  Vadym, M. and Artem, V. (2021) Security Risk Analysis for Cloud Computing Systems. The 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Vol. 3, Czech Republic, 15-17 September 2011, 340-347.
[10]  Rahul, B. and Nitin, C. (2023) Cloud Computing: Service Models, Types, Database, and Issues. International Journal of Advanced Research in Computer Science and Software Engineering Research, 3, 605-701.
[11]  Narayana, K.E., Sailesh, K. and Jayashree, K. (2019) A Review on Different Types of Deployment Models in Cloud Computing. International Journal of Innovative Research in Computer and Communication Engineering, 5, 1475-1481.
[12]  Tinankoria, D. and Babak, B.R. (2018) Cloud Computing: A review of the Concepts and Deployment Models. International Journal of Information Technology and Computer Science, 6, 50-68.
https://doi.org/10.5815/ijitcs.2017.06.07
[13]  Mohammed, U. (2019) A Survey on Authentication in Cloud Computing for Data Storage Security. International Journal of Advanced Research, Ideas, and Innovations in Technology, 3, 118-121.
[14]  Kingson, J. (2018) What Is a Cloud Computing Framework? Benefits and More.
https://www.knowledgehut.com/blog/cloud-computing/cloud-computing-frameworks
[15]  Mohanakrishnan, R. (2021) What Is Community Cloud? Definition, Architecture, Examples, and Best Practices.
https://www.spiceworks.com/tech/cloud/articles/what-is-community-cloud/
[16]  Chakradhara, C.R., Mogasala, L. and Kumar, Y.R. (2018) Cloud: Computing Services and Deployment Models. International Journal of Engineering and Computer Science, 2, 3389-3392.
[17]  NIST (2011) Cloud Deployment Implications. International Journal Computer Science, 2, 134-140.
[18]  Merino (2019) Cloud Service Models. Journal of Computer Engineering, 1, 38-45.
[19]  Hashizume, et al. (2020) Information Technology and Computer Science. Journal of Internet Services and Applications, 2, 120-128.
[20]  Arokia, P.R. and Shanmugapriyaa, R.S. (2022) Evolution of Cloud Storage as Cloud Computing Infrastructure Service. Journal of Computer Engineering, 1, 38-45.
https://doi.org/10.9790/0661-0113845
[21]  Rountree, D. and Castrillo, I. (2014) Cloud Service Models.
https://www.sciencedirect.com/science/article/pii/B9780124059320000049
[22]  Eric and Bob (2020) Infrastructure as a Service (IaaS). 33-35.
[23]  Dahbur, K., Mohammad, B. and Tarakji, A.B. (2021) A Survey of Risks, Threats and Vulnerabilities in Cloud Computing. Proceedings of International Conference on Intelligent Semantic Web Services and Applications, Amman, April 2011, 1-6.
[24]  Subashini, S. and Kavitha, V. (2021) A Survey on Security Issues in Service Delivery.
[25]  https://www.fingent.com/blog/cloud-service-models-saas-iaas-paas-choose-the-right-one-for-your-business/
[26]  Ju, J., Wang, Y., Fu, J., Wu, J. and Lin, Z. (2020) Research on Key Technology in SaaS. International Conference on Intelligent Computing and Cognitive Informatics, Washington, DC, 384-387.
[27]  ENISA (2019) CRM Services and Web Content Delivery Service.
[28]  Mohammed, B.E. (2022) Deployment of Cloud-Based Applications Excluding Software Layers and Hardware Buying and Maintenance Cost.
[29]  Pranita, P.K. and Ubale, E.V.S. (2023) Cloud Computing Security Issues.
[30]  Shital, A. (2018) Data Storage Access via Web Services APIs on Non-Persistent Network Connections.
[31]  https://issuu.com/ijiras/docs/paper_3_1cfc4f054b8358
[32]  https://www.scribd.com/document/170495769/IJETTCS-2018-08-24-111
[33]  Devenie, C. (2018) Different Types of Storage for Different Problems.
https://www.ibm.com/support/pages/different-types-storage-different-problems
[34]  Arockiam, L. and Monikandan, S. (2019) Data Security and Privacy in Cloud Staorage Using Hybrid Symmetric Encryption Algorithm. International Journal of Advanced Research in Computer and Communication Engineering, 2, 3064-3070.
[35]  Siani (2022) Data Privacy Protection.
[36]  Apalina, et al. (2018) Issues of Cloud Computing in Regards to Trust.
[37]  Mohit, M. and Rajeev, B. (2019) Applying Encryption Algorithm for Data Security and Privacy in Cloud Computing. IJCSI International Journal of Computer Science Issues, 10, 367-370.
[38]  Han, J., et al. (2012) Data Classification. International Journal of Advanced Research in Computer and Communication Engineering, 10-18.
https://www.researchgate.net/publication/301078184_Classification
[39]  Kilany (2013) Pattern Classification for General Model Building Procedure.

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413