Cloud Storage & Data Security

Cloud Storage & Data Security

Cloud Storage & Data Security

Cloud computing has emerged as an innovative approach to provide computing services. It offers numerous advantages such as fast deployment, lower costs, pay for use, rapid elasticity, scalability, ubiquitous network access, and greater resiliency. One of the primary uses of cloud computing is for data storage. Cloud storage is a model of networked online storage and can store data on multiple third-party servers. Cloud storage is an evolution of traditional hosted storage technology (FTP, WebDAV, NFS/CIFS) that involves more sophisticated APIs, namespaces, file or data location virtualization, and management tools. Wu et al. (2010) identified several benefits of using cloud storage such as ease of management, cost effectiveness, lower impact outages and upgrades, and simplified planning. So, cloud storage is convenient and offers more flexibility.

According to Borgmann et al. (2012), most cloud storage providers offer two types of services:

Basic cloud storage servicesthey are services mainly offer virtual online disk space that can be used as a normal hard drive for storing all types of data. Users cannot access these services directly. In fact, they are embedded into custom software using application programming interfaces (API). Examples of such basic cloud storage services are Amazon S3 and Google Cloud Storage.

Advanced cloud storage services: these services not only use basic cloud storage services for the actual storage of data but also they provide interfaces such as client or web applications which significantly simplify the use of the service for the customer. Many services may also provide an easy to use API to allow integration of the service’s capabilities into third-party software. An example of advanced cloud storage services is Dropbox.

The number of cloud storage providers has increased dramatically over the last couple of years so choosing the best one is a tough decision. In fact, trust, reliability, security, ease of use, cost and their support are the most important factors in choosing the best cloud storage provider. One of the crucial factors should be considered before choosing a cloud storage provider is the level of security offered by a cloud storage provider and the reputation that comes along with it. In other words, it is crucial for the cloud storage to be equipped with storage security solutions so that the whole cloud storage system is reliable and trustworthy. Unfortunately, majority of cloud storage systems do not provide security guarantees in their Service Level Agreements (SLAs). Lack of security support can be a main obstacle for the adoption of cloud services.

Cloud storage should possess four desirable security properties: confidentiality, integrity, write-serializability, and read freshness (denoted by C, I, W, F). In fact, confidentiality is achieved by encryption, data integrity is protected using message digests, non-reputation is supported by signed message-digests, freshness is achieved by periodic audit, and write-serializability is guaranteed by chain hash.Anonymized - Log - Intel

Many scholars believe that although database and document encryption can be efficient way to improve security, encryption often results in a serious server slowdown. Hence, many companies such as SK Telecom, a leading mobile telecommunication company in South Korea, have adopted another technique, anonymization, to increase the security of data in the public cloud. In fact, data anonymization is the process of changing data so that it can be processed in a useful way, while preventing that data from being linked to individual identities of people, objects, or organizations. So, data anonymization can be an effective way to protect sensitive data.

By Mojgan Afshari

Follow me

Mojgan Afshari

Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia.She currently teaches courses in managing change and creativity and statistics in education at the graduate level. Her research areas include teaching and learning with ICT, school technology leadership, Educational leadership, and creativity. She is a member of several professional associations and editor of the Journal of Education.She has written or co-authored articles in the following journals: Journal of Technology, Pedagogy and Education, The Turkish Online Journal of Educational Technology, International Journal of Education and Information Technologies, International Journal of Instruction, International Journal of Learning, European Journal of Social Sciences, Asia Pacific Journal of Cancer Prevention, Life Science Journal, Australian Journal of Basic and Applied Sciences, Scientific Research and Essays.
Follow me

Latest posts by Mojgan Afshari (see all)

One Response to Cloud Storage & Data Security

  1. As useful as services like Dropbox are, the wild west nature of the web necessitates world class security measures. Any business using the cloud needs to prioritize this when selecting a provider…!

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

What is the 12/12 Program?

This program is designed to better handle the thousands of requests we receive from people looking to submit articles. The 12/12 program is the commitment of 12 articles delivered over a 12-month period.  

Wait! What if I just want to submit one article?

Our popular pay as you go sponsorship program provides the flexibility to submit as you wish and is designed for all budgets.

Contributors

Cloud Infographic – Wearable Tech And Preventative Healthcare

Cloud Infographic – Wearable Tech And Preventative Healthcare

Wearable Tech And Preventative Healthcare There are so many exciting new opportunities available to utilize wearable technology in the future.  Areas such as nanotechnology disease monitoring, crowdfunding to wearable accessories are some excellent examples of the potential. Estimates vary, but appear to suggest that the market will produce between $14-50 Billion over the next few years. Included below

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

Big Data

To Have and Have Not: Big Data Initiatives In Developing Countries

To Have and Have Not: Big Data Initiatives In Developing Countries

Big Data Initiatives In Developing Countries The poor of the developing countries are becoming increasingly connected, to the point where they too are part of the Big Data revolution that’s happening across the globe. It didn’t come with laptops, though, as some supposed it would. Whereas it costs a fortune to connect broadband to a

Big Data In Your Garden: Initiatives For Better Understanding Nature

Big Data In Your Garden: Initiatives For Better Understanding Nature

Big Data in Your Garden Big Data and IoT initiatives are springing up all across the globe, making cities, protesters–and just about everything else–smarter. However, thus far there’s been little attention paid to the interactions between these bizarre technologies and living things other than humans. Biology, that is, human biology is one field where Big

Who Holds the Key to the City: Big Data and City Management

Who Holds the Key to the City: Big Data and City Management

Big Data and City Management Cities like New York, Madrid, and especially Rio de Janeiro are augmented with Big Data-powered initiatives that range from combating crime with predictive analytics (New York & Madrid) to providing real-time data for improved management. Although Big Data is no panacea and is mainly used in conjunction with a greater

Internet of Things

Where’s the Capital of the Internet of Things?

Where’s the Capital of the Internet of Things?

Where’s the Capital? We all know the capitals of fashion are London, New York and Paris, while the capital of film is Hollywood (or Bollywood!) – but what’s the new capital of the internet? Specifically, the internet of things? The answer – according to new research by Ozy – might surprise you. It’s not Tokyo, Seoul,

Smart Cities – How Big Data Is Changing The Power Grid

Smart Cities – How Big Data Is Changing The Power Grid

Smart Cities And Big Data As Anthony Townsend argues in his SMART CITIES, even though the communications industry has changed beyond recognition since its inception, the way we consume power has remained stubbornly anachronistic. The rules of physics are, of course, partially to blame, for making grid networks harder to decentralize, as opposed to communication

Aggregated News

Popular News Sources

Why Microsoft CEO Satya Nadella Loves What Steve Ballmer Once Despised

Why Microsoft CEO Satya Nadella Loves What Steve Ballmer Once Despised

“I don’t want to fight old battles,” says Microsoft CEO Satya Nadella. “I want to fight new ones.” It’s Sunday evening, and Nadella is sitting in a glass-enclosed room at the back of a Japanese restaurant in San Francisco’s North Beach neighborhood, eating sushi with a few reporters. The post Why Microsoft CEO Satya Nadella Loves

Apple sales soar after record-breaking iPhone 6 and 6 Plus launch

Apple sales soar after record-breaking iPhone 6 and 6 Plus launch

The US tech giant reported a 16 per cent jump in iPhone sales between July and September, and the strongest growth in Mac computer shipments in years. Read the source article at dailymail.co.uk About Latest Posts Follow meMojgan AfshariMojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the

Q&A: Intel’s Take on Chinese Startups, Innovation

Q&A: Intel’s Take on Chinese Startups, Innovation

Intel’s venture-capital arm on Tuesday said it would be investing $28 million in five Chinese startups that work on new technologies ranging from wearable devices to iris detection. It is Intel Capital’s first infusion from a $100 million China fund launched in April … Read the source article at WSJ Blogs About Latest Posts Follow meMojgan AfshariMojgan Afshari is a senior