Details

DATA SECURITY MODEL FOR CLOUD COMPUTING

Pooja Dhawan

Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001

76-81

Vol: 3, Issue: 2, 2013

Receiving Date: Acceptance Date:

Publication Date:

Download PDF

Abstract

Cloud Computing may be a way of making the businesses more efficient. It enables to lower the cost of I.T. functions of the business and enables the business managers to focus on the core business. What it does is to shift the information technology function of the business to a remote service provider about whom we may not have any information. The concept of shifting computing to a shared service provider is not new. What is new is that the cost of cloud computing is falling so dramatically, that considering outsourcing to the cloud is no longer rare. In an era of tight budgets, the opportunity to make financial savings means, that the cloud computing looks especially attractive. However data security becomes more and more important in cloud computing as the data is hosted on an unknown remote computer and all the transactions have to be made to this computer. This paper analyses the basic problem of data security in cloud computing. Data security requirements of cloud computing were identified and a data security model is proposed through the analysis of HDFS architecture under the framework of cloud computing.

Keywords: Cloud Computing, HDFS, Data Security, Security Model

References

  1. Rajkumar Buyya Market-Oriented Cloud Computing: Vision, Hype and Reality for Delivering IT Services as Computing Utilities 25-27 Sept.2008,5-13
  2. Jean-Daniel Cryans, Criteria to Compare Cloud Computing with Current Database Technology 2008 doi>10.1007/978-3-540-89403-2_11,114-126
  3. Christopher Moretti, All-Pairs: An Abstraction for Data-Intensive Cloud Computing IEEE 2008[4] Huan Liu, Dan Orban14-18 April 2008,1-11
  4. Mladen A. Vouk Cloud Computing – Issues, Researchand Implementations Journal of Computing and Information Technology - CIT 16, 2008, 4, 235–246
  5. Department of Defense Information Management and Information Technology Strategic Plan2008-2009
  6. Cloud Computing Security: making Virtual Machines Cloud-Ready,www.cloudreadysecurity.com 200
  7. Map Reduce: Simplied Data Processing on Large Clusters Google, Inc2004.
Back

Disclaimer: Indexing of published papers is subject to the evaluation and acceptance criteria of the respective indexing agencies. While we strive to maintain high academic and editorial standards, International Journal of Research in Science and Technology does not guarantee the indexing of any published paper. Acceptance and inclusion in indexing databases are determined by the quality, originality, and relevance of the paper, and are at the sole discretion of the indexing bodies.