Mapping different datatypes ensuring secure cloud storage
نویسندگان
چکیده
In this thesis two generic approaches on how to store different datatypes to a cloud storage are proposed, thereby utilizing Treetank. As part of this thesis implementations for the proposed approaches have been implemented to evaluate their practicability and search out strengths as well as weaknesses. Current cloud storage systems, security concerns towards privacy, stability and integrity of data shared with “the Cloud” is discussed. An overview of Treetank, that originally was designed to be a native XML-Storage and grew into a powerful framework that allows for more than storing XML-structured data, is provided and evaluated since it is a basis for this works implementations. In the last years the system has been extended to support REST and XML as datatypes that are to be stored within Treetank. Files and block-based storage devices are datatypes that are evaluated as candidates of storing data in a cloud storage. Storing files is supported by many cloud storage systems, whereas mapping storage devices utilizing the iSCSI protocol to a cloud storage is a novel approach in this field of work.
منابع مشابه
An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملASIDS - Authenticated Secure and Integral Data Storage in Cloud
The introduction of cloud computing has triggered a change in computer community. The varying requirements of users are faultlessly met by the cloud. The cloud is used for a variety of purposes including storage services. Cloud storage services allow users to store their data and thus reduce space consumption. But security and privacy of data stored in cloud is a major issue faced by the user’s...
متن کاملPublic Auditing For Secure Cloud Storage with HLA
Cloud computing is internet based computing which enables sharing of services. Many users place their data in the cloud. However, the fact that users no longer have physical possession of the possibly large size of outsourced data makes the data integrity protection in cloud computing a very challenging and potentially formidable task, especially for users with constrained computing resources a...
متن کاملVarious Secure Data Sharing Techniques in Public Cloud
This paper presents the various secure data sharing techniques in public clouds. A public cloud allows resources such as applications and storage to be accessible to the public over the internet. Due to the benefits of cloud storage, there has been a growing trend to use the public cloud for secure data sharing and storage. The public cloud storage model should solve the critical issue of data ...
متن کاملA Secure Cloud Gateway based upon XML and Web Services
Storing data in the cloud offers a scalable and easy way to handle large amounts of data guaranteeing availability and scalability by the hosting Cloud Service Providers. The price for the gained availability is uncertainness about the integrity and confidentiality of the data. Even if common approaches provide high availability and end-to-end encryption necessary to achieve Availability and Co...
متن کامل