Prospects of cloud computing as a technology which optimizes resources, reduces complexity and provides cost effective solutions to its consumers is well established. Future of cloud is ‘cloud of clouds’ where cloud service providers (CSPs) collaborate with each other to provide ever scalable solutions to their customers. However, one most restricting factor towards use of cloud by its consumers is their concerns about data security. Most sensitive to any organization is its data, which thus necessitates a trustworthy framework which could give confidence to these organizations to put their sensitive data on cloud. This paper, therefore, proposed a data security framework which is based on data security controls, driven against the possible data related threats emerging from various inter-cloud use cases. It is a very systematic derivation of data security controls, consolidated as a data security framework. Further in this study, is a proposed mechanism, which can enable CSPs to view compliance to data security controls and overall trustworthiness of other CSPs; thus, enabling them to decide level of interaction that they might feel appropriate to undertake depending upon their data security commitments to their consumers. A Data Security Compliance Monitor service is proposed which measures the compliance to data security framework. This service is also connected with Data Trust as a Service, which measures the trustworthiness of a cloud based on its Total Compliance Value, Users’ Feedback Rating, SLA Rating, Cloud Security Auditor Rating and Incidents History Value. CSPs who subscribe to Cloud Trust as a Service would be able to view Trustworthiness of other CSPs, yet they would be bound to provide access to the service to measure theirs as well. This new approach to data security in inter-cloud is a mix of data security controls, their measure of compliance and based on this, a service, which recommends how much trust can be placed on a CSP for handling data. The proposed solution thus promotes use of inter-cloud for data related requirements.
Data deduplication began to emerge approximately ten years ago, but has only recently become a important technology and also it is one of important data compression techniques to eliminate duplicate copies of data. Different from traditional deduplication systems, the differential privileges of users are further considered in duplicate check besides the data itself. Here new deduplication constructions supporting authorized duplicate check in this hybrid cloud architecture are presented. Security analysis demonstrates that our scheme is secure in terms of the definitions specified in the proposed security model. We show that our proposed authorized duplicate check scheme incurs minimal overhead compared to normal operations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.