Open Access Open Access  Restricted Access Subscription Access

Cloud Computing Data Security in Cloud Computing for Banking


Affiliations
1 Surana College, Bangalore, India
 

Cloud Computing has been anticipated as the next generation architecture of IT Enterprise. Cloud Computing moves the application software and database to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges. In this paper, we focus on cloud data storage security for banking, which has always been an important aspect of quality services in banking sector. To ensure the correctness of users' data in the cloud, we propose an effective and flexible solution.

As customers we do not need to own the infrastructure, Data can be redundantly store in multiple physical locations. Due to this redundancy the data can be easily modified by unauthorized users which can be stored in the database. This leads to loss of data privacy and security to database. Extensive security and performance analysis shows that the proposed scheme ensures that cyclicredundancy check and time-tested practices and technologies for managing trust relationships in traditional enterprises.These practices include data encryption, strong authentication and fraud detection, etc.


Keywords

Cloud Computing, Application Software, Redundancy, Data Encryption, Strong Authentication and Fraud Detection.
User
Notifications
Font Size

  • http://www.ibm.com/developerworks
  • http://www.jackcola.org
  • https://securosis.com/blog/cloud-datasecuritycycle
  • http://searchtelecom.techtarget.com
  • K. D. Bowers, A. Juels, and A. Oprea,“Proofs of Retrievability: Theory and Implementation,” Cryptology ePrint Ar chive , Repor t 2008/175,2008, http://eprint.iacr.org
  • G. Ateniese, R. Burns, R. Curtmola, J.Herring, L. Kissner, Z. Peterson, and D.Song, “Provable Data Possession at Untrusted Stores,” Proc. Of CCS ’07, pp.598–609, 2007.
  • G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” Proc. Of SecureComm ’08, pp. 1–10, 2008.
  • T. S. J. Schwarz and E. L. Miller, “Store,Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage,” Proc.of ICDCS ’06, pp. 12–12, 2006.
  • M. Lillibridge, S. Elnikety, A. Birrell, M.Burrows, and M. Isard, “A Cooperative Internet Backup Scheme,” Proc.of the 2003 USENIX Annual Technical Conference (General Track), pp. 29–41, 2003.
  • K. D. Bowers, A. Juels, and A. Oprea,“HAIL: A High-Availability and Integrity Layer for Cloud Storage,” Cryptology

Abstract Views: 453

PDF Views: 198




  • Cloud Computing Data Security in Cloud Computing for Banking

Abstract Views: 453  |  PDF Views: 198

Authors

Anand Tanvashi
Surana College, Bangalore, India
B. Shravani
Surana College, Bangalore, India

Abstract


Cloud Computing has been anticipated as the next generation architecture of IT Enterprise. Cloud Computing moves the application software and database to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges. In this paper, we focus on cloud data storage security for banking, which has always been an important aspect of quality services in banking sector. To ensure the correctness of users' data in the cloud, we propose an effective and flexible solution.

As customers we do not need to own the infrastructure, Data can be redundantly store in multiple physical locations. Due to this redundancy the data can be easily modified by unauthorized users which can be stored in the database. This leads to loss of data privacy and security to database. Extensive security and performance analysis shows that the proposed scheme ensures that cyclicredundancy check and time-tested practices and technologies for managing trust relationships in traditional enterprises.These practices include data encryption, strong authentication and fraud detection, etc.


Keywords


Cloud Computing, Application Software, Redundancy, Data Encryption, Strong Authentication and Fraud Detection.

References