A Unique Approach to Element Management and Secure Cloud Storage Backup for Sensitive Data

نویسنده

  • Srinivas M N
چکیده

With dynamic trends and new developments in hardware and software, and the need to manage them efficiently, designing an Element Management System (EMS) for effective management of Network Element‟s (NE) is a challenging task. Small and medium businesses may not have the required skills or resources to manage their EMS. Large businesses may also want to use EMS services from skilled vendors. With the emergence of cloud computing technology, EMS can be provided as a service, i.e., SaaS (software as service) to different customers. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource confidential and old management data for sharing on public cloud ,i.e., which are not within the same trusted domain. In this proposed scheme, the EMS is provided as a service to different sites of the organization using a private cloud. Sensitive data is stored in the public cloud which comprises of the current configuration of the complete private cloud, important disaster recovery data and management data. This would provide a confidential and secure backup of EMS. This would be useful in the case of natural calamities (tsunami, tornado, earth quake, etc.), terrorist attacks and any other disaster that strikes the private cloud. The clients/data owners, who require management data, can access the data from the public cloud. While accessing data from the public cloud, integrity and confidentiality of the data is preserved by using 2 techniques, namely Attribute Based Encryption (ABE) and Proxy Re-Encryption (PRE).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

An Enhanced Multi-Layered Cryptosystem Based Secure and Authorized Deduplication Model in Cloud Storage System

Data deduplication is an important technique for eliminating redundant data. Instead of taking no. of same files, it store only single copy of file. In most organizations, storage system contains many pieces of duplicate data. For example, the same file may be saved in several different places by different users. Deduplication eliminates these extra copies by saving just one copy of the data an...

متن کامل

Cloud Access Security On File System Using Secure Policies For Jelastic Cloud

Now a days we can outsource data backups offsite to third-party cloud storage services(Jelastic cloud) by which we can reduce data management costs. However, we need to provide security guarantees for the outsourced data, maintained by third parties. In this paper we design and implement FADE, a secure overlay cloud storage system which is able to achieve fine-grained, policy-based access contr...

متن کامل

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

A Way of Key Management in Cloud Storage Based on Trusted Computing

Cloud security has gained increasingly emphasis in the research community, with much focus primary concentrated on how to secure the operation system and virtual machine on which cloud system runs on. We take an alternative perspective to consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012