Academic Journals Database
Disseminating quality controlled scientific knowledge

Cloud Security Based On Oracle Storage Using Transparent Table Encryption Technique

ADD TO MY LIST
 
Author(s): Ankita Prakash Baheti | Surendra Vasantrao Patil

Journal: International Journal of Computer & Electronics Research
ISSN 2320-9348

Volume: 2;
Issue: 2;
Start page: 132;
Date: 2013;
Original page

Keywords: security

ABSTRACT
Cloud computing has been visualized as the effective solution to the rising storage costs of IT Enterprises. With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly for enterprises or individual users to frequently update their hardware. Apart from reduction in storage costs data outsourcing to the cloud also helps in reducing the maintenance. In cloud storage user’s data is migrated to large data centers, which are remotely located, to which user does not have any access. However, this unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved. One of the important concerns that need to be addressed is to assure the customer of the reliability i.e. defense of his data in the cloud. As the data is physically not accessible to the user the cloud should provide a way for the user to check if the reliability of his data is maintained or is compromised. In this paper we provide a scheme which gives a proof of data reliability in the cloud which the customer can employ to check the accuracy of his data in the cloud. This proof can be approved upon by both the cloud and the customer and can be incorporated in the Service level agreement (SLA). This scheme encompasses the main issues related to security and confidentiality of user’s data with respect to its location, relocation and availability. This paper outlines brief knowledge about cloud, its services, data storage mechanism, security threats to it and the proposed method to secure the data that is oracle transparent encryption technique. This scheme includes some memory management concepts like partitioning the memory in the regions, segmentation concepts etc.
Why do you need a reservation system?      Save time & money - Smart Internet Solutions