Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Framework for Multilevel Privacy and Backup of Cloud Storage with CDMBackupSim

1C. Saravanakumar and 2C. Arun
1Faculty of Computer Science and Engineering, St. Joseph’s Institute of Technology, Sathyabama University, OMR, Chennai, Tamilnadu, India
2Department of Electronics and Communication Engineering, R.M.K College of Engineering and Technology, Chennai, Tamilnadu, India
Research Journal of Applied Sciences, Engineering and Technology  2015  8:572-582
http://dx.doi.org/10.19026/rjaset.9.1441  |  © The Author(s) 2015
Received: May ‎26, ‎2014  |  Accepted: July ‎19, ‎2014  |  Published: March 15, 2015

Abstract

Cloud computing gives an enormous support to an individual and enterprise which can improve their needs in the global market. The customer's data are stored in different location in the cloud either in same or different region. These data should be handled securely from requester to provider end. The cloud security involves protecting and controlling the data, application and associated infrastructures by imposing the policies, technologies etc. The privacy is used to secure processing and handling the personal data in the cloud is not disclosed by the unauthorized parties. The cloud suffers a reliability issues due to lack of security and privacy over the data. The security levels are confined into a particular boundary which does not cover all access levels. The privacy information of various levels is handled by introducing a multilevel privacy technique for protecting user's data in various boundaries. The proposed framework gives an alert whenever the data are accessed by the Cloud Service Provider (CSP) or any other parties, so this will help the Cloud Service User (CSU) to know the status of data. The proposed work is simulated by introducing CDMBackupSim simulator which has various modules and it gives the simulated result for testing process.

Keywords:

Cloud privacy, cloud security , cloud storage , deployment models, distributed systems,


References

  1. Acronis, 2014.Retrieved form: http:// www.acronis. com/homecomputing/trueimage/?utm_source = 6549527&utm_medium = affiliates&utm_cam paign = cj # add-cloud-storage #cloud-storage.
  2. Bertino, E., F. Paci, R. Ferrini and N. Shang, 2009. Privacy-preserving digital identity management for cloud computing. Bull. IEEE Comput. Soc. Tech. Comm. Data Eng., pp: 1-7.
  3. Bitcasa, 2014. Retrieved form: http://info.bitcasa.com /BCo re1.html?utm_source = cj&utm_medium = affiliate, 2014.
  4. Brian, O., T. Brunschwiler, H. Dill, H. Christ and B. Falsafi et al., year. White Paper Cloud Computing. White Paper SATW, pp: 1-51.
  5. Brodkin, J., 2008. Gartner: Seven cloud-computing security risks. Cloud computing is picking up traction with businesses, but before you jump into the cloud, you should know the unique security risks it entails. July 02, pp: 1-2.
  6. Carbonite, 2014.Retrieved form: http://www. carbonite. com/lp/aff/cj-buy1.aspx?cm_mmc = affiliate-_-CJ-_-Non-Discount+Areyou +at+risk $%$3F-_-6549527&c3 ch = Affiliate &c3nid = 65495 27, 2014.
  7. Cloud Performance, 2014.Retrieved form: http:// www. ektron. com/Blogs/Udaiappa-Ramachandran/ Which-Cloud-Compa ring Microsoft-Azure-and-Amazon-Web-Services/ (Accessed on: 13.4.14, 2014).
  8. CrashPlan, 2014. Stepped-Up Security.
    Direct Link
  9. Fisher, T., 2014. A Full Review of Backblaze, an Online Backup Service.
    Direct Link
  10. Grobauer, B., T. Walloschek and E. Stöcker, 2011. Understanding cloud computing vulnerabilities. IEEE Secur. Priv., 9(2): 50-57.
    CrossRef    
  11. Hewitt, C., 2008. ORGs for scalable, robust, privacy-friendly client cloud computing. IEEE Internet Comput., 12(5): 96-99.
    CrossRef    
  12. Jaeger, P.T., J. Lin and J.M. Grimes, 2010. Cloud computing and information policy computing in a policy cloud? J. Inform. Technol. Pol., 5(3): 269-283.
    CrossRef    
  13. Jansen, W. and T. Grance, 2011. Guidelines on Security and Privacy in Public Cloud Computing. NIST Special Publication 800-144, pp: 1-80.
  14. Kanndukuri, B.R., R Paturi and A. Rakshit, 2009. Cloud security issues, advanced software technologies, IIIT, Pune, India. Proceeding of IEEE International Conference on Services Computing, pp: 527-520.
  15. Katzan, H., 2010. On the privacy of cloud computing. Int. J. Manage. Inform. Syst., 14(2): 1-12.
  16. Krautheim, F.J., 2009. Private virtual infrastructure for cloud computing. Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud'09, pp: 1-5.
  17. Leavitt, N., 2009. Is cloud computing really ready for prime time? Computer, 42(1): 15-20.
    CrossRef    
  18. Livedrive, 2014.Retrieved form: http://www.live drive.com/?AID = 10709106&PID=6549527 & tid = af filiatecj, 2014.
  19. Mell, P. and T. Grance, 2010. Effectively and Securely Using the Cloud Computing Paradigm. NIST, Information Technology Laboratory 10-7-2009 With Minor comments by Dr. Yesha Sivan, (As part of the Cloud Panel in Web 2010), pp: 1-93.
  20. Mozy, 2014.Retrieved form: https://mozy.com/ product/mozy/personal # frame_Free?ref = 451c76 aa, 2014.
  21. Online Backup Service Feature Comparison, 2014.Retrieved form: http://pcsupport.about.com/od/ backup/a/online-backup-comparison.htm.
  22. Oujani, A., 2014. A Survey on Cloud Computing Simulations and Cloud Testing.
    Direct Link
  23. Pallis, G., 2010. Cloud computing-the new frontier of internet computing. IEEE Internet Comput., 14(5): 70-73.
    CrossRef    
  24. Ryan, M.D., 2011. Cloud computing privacy concerns on our doorstep. Communi. ACM, 54(1): 36-38.
    CrossRef    
  25. SOS, 2014.Retrieved form: http://www.sosonline backup.com/?AID = 10923174 and PID = 6549527 and src = CJ_6549527, 2014.
  26. SpiderOak, 2014.Retrieved form: Available: https://spideroak.com/,2014.
  27. SugarSync, 2014.Retrieved form: https://www. sugarsync. com/offers/affiliate1/index.2.html? utm_medium = Affiliate and utm_source = Commission Junction and utm_campaign = CommissionJunction_ Affiliatebannerlink.
  28. Wei, Y. and M.B. Blake, 2010. Service-oriented computing and cloud computing: Challenges and opportunities. IEEE Internet Comput., 14(6):72-75.
    CrossRef    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved