{"title":"使用不可变数据分散保护迁移后的云数据存储","authors":"Rajesh Kumar C, Aroul Canessane R","doi":"10.1109/INCET57972.2023.10170274","DOIUrl":null,"url":null,"abstract":"Cloud computing has emerged as a technology behemoth with applications in a wide range of fields. When data is being migrated from offline data centres and stored in multiple cloud environments part of the control is always with the Cloud Service Providers(CSPs) leads to security concerns. The data stored in the cloud may sometimes be compromised even though the CSPs may take precautions to avoid such situations. In this paper, we discuss securely storing the data using the data dispersion technique by breaking the data into multiple segments and combining it with encryption along with replication. The division of data and storing it in the cloud helps in protecting the complete data even if an attacker tries to access the data it will not be easy for him to make sense of the retrieved data because the data is already being encrypted and combined with dispersion and replication adds to the complexity of retrieval. Security is achieved as the dispersed data is spread across multiple locations which makes it difficult for an attacker to get all the segments. In most scenarios be able it depends on traditional encryption techniques alone to protect the data. Here, We propose focusing more on how data is stored in the cloud to relieve the system of costly computational methodologies. In this strategy, the trade-off between security and the data retrieval time must also be considered.","PeriodicalId":403008,"journal":{"name":"2023 4th International Conference for Emerging Technology (INCET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Securing Data storage in Cloud after Migration using Immutable Data Dispersion\",\"authors\":\"Rajesh Kumar C, Aroul Canessane R\",\"doi\":\"10.1109/INCET57972.2023.10170274\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing has emerged as a technology behemoth with applications in a wide range of fields. When data is being migrated from offline data centres and stored in multiple cloud environments part of the control is always with the Cloud Service Providers(CSPs) leads to security concerns. The data stored in the cloud may sometimes be compromised even though the CSPs may take precautions to avoid such situations. In this paper, we discuss securely storing the data using the data dispersion technique by breaking the data into multiple segments and combining it with encryption along with replication. The division of data and storing it in the cloud helps in protecting the complete data even if an attacker tries to access the data it will not be easy for him to make sense of the retrieved data because the data is already being encrypted and combined with dispersion and replication adds to the complexity of retrieval. Security is achieved as the dispersed data is spread across multiple locations which makes it difficult for an attacker to get all the segments. In most scenarios be able it depends on traditional encryption techniques alone to protect the data. Here, We propose focusing more on how data is stored in the cloud to relieve the system of costly computational methodologies. In this strategy, the trade-off between security and the data retrieval time must also be considered.\",\"PeriodicalId\":403008,\"journal\":{\"name\":\"2023 4th International Conference for Emerging Technology (INCET)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 4th International Conference for Emerging Technology (INCET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INCET57972.2023.10170274\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 4th International Conference for Emerging Technology (INCET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCET57972.2023.10170274","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing Data storage in Cloud after Migration using Immutable Data Dispersion
Cloud computing has emerged as a technology behemoth with applications in a wide range of fields. When data is being migrated from offline data centres and stored in multiple cloud environments part of the control is always with the Cloud Service Providers(CSPs) leads to security concerns. The data stored in the cloud may sometimes be compromised even though the CSPs may take precautions to avoid such situations. In this paper, we discuss securely storing the data using the data dispersion technique by breaking the data into multiple segments and combining it with encryption along with replication. The division of data and storing it in the cloud helps in protecting the complete data even if an attacker tries to access the data it will not be easy for him to make sense of the retrieved data because the data is already being encrypted and combined with dispersion and replication adds to the complexity of retrieval. Security is achieved as the dispersed data is spread across multiple locations which makes it difficult for an attacker to get all the segments. In most scenarios be able it depends on traditional encryption techniques alone to protect the data. Here, We propose focusing more on how data is stored in the cloud to relieve the system of costly computational methodologies. In this strategy, the trade-off between security and the data retrieval time must also be considered.