• DocumentCode
    144785
  • Title

    Towards robust, scalable and secure network storage in Cloud Computing

  • Author

    Al-Anzi, Fawaz S. ; Salman, Adnan Ahmed ; Jacob, Noby K. ; Soni, Jignesh

  • Author_Institution
    Compute Eng. Dept., Kuwait Univ., Kuwait City, Kuwait
  • fYear
    2014
  • fDate
    6-8 May 2014
  • Firstpage
    51
  • Lastpage
    55
  • Abstract
    The term Cloud Computing is not something that appeared overnight, it may come from the time when computer system remotely accessed the applications and services. Cloud computing is Ubiquitous technology and receiving a huge attention in the scientific and industrial community. Cloud computing is ubiquitous, next generation´s in-formation technology architecture which offers on-demand access to the network. It is dynamic, virtualized, scalable and pay per use model over internet. In a cloud computing environment, a cloud service provider offers “house of resources” includes applications, data, runtime, middleware, operating system, virtualization, servers, data storage and sharing and networking and tries to take up most of the overhead of client. Cloud computing offers lots of benefits, but the journey of the cloud is not very easy. It has several pitfalls along the road because most of the services are outsourced to third parties with added enough level of risk. Cloud computing is suffering from several issues and one of the most significant is Security, privacy, service availability, confidentiality, integrity, authentication, and compliance. Security is a shared responsibility of both client and service provider and we believe security must be information centric, adaptive, proactive and built in. Cloud computing and its security are emerging study area nowadays. In this paper, we are discussing about data security in cloud at the service provider end and proposing a network storage architecture of data which make sure availability, reliability, scalability and security.
  • Keywords
    cloud computing; data integrity; data privacy; security of data; storage management; ubiquitous computing; virtualisation; Internet; adaptive security; authentication; built in security; client overhead; cloud computing environment; cloud service provider; compliance; confidentiality; data security; data sharing; data storage; information centric security; integrity; middleware; network storage architecture; networking; on-demand access; operating system; pay per use model; privacy; proactive security; remote application access; remote service access; robust scalable secure network storage; server; service availability; service outsourcing; ubiquitous next generation information technology architecture; virtualization; Availability; Cloud computing; Computer architecture; Data security; Distributed databases; Servers; Cloud Computing; Data Storage; Data security; RAID;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Digital Information and Communication Technology and it's Applications (DICTAP), 2014 Fourth International Conference on
  • Conference_Location
    Bangkok
  • Print_ISBN
    978-1-4799-3723-3
  • Type

    conf

  • DOI
    10.1109/DICTAP.2014.6821656
  • Filename
    6821656