Naresh.G
Abstract-
Cloud
computing
is
emerging
patterns.
Index
terms-
Cloud
Computing,
storage
INTRODUCTION
PERSPECTIVES
Cloud computing is the delivery of the
While the benefits of storage networks have
326
www.iaetsd.in
a) System Model
attacks:
Perimeter
defence
strategies
focus
on
User: who have data to be stored in the cloud
organizations?
[7].
systems.
(CSP): who
has
data theft
o
b) Adversary Model
possibly malicious.
but
so on.
understanding
of
networked
storage
327
www.iaetsd.in
recommended:
which
also
encrypt
authentication
appropriate
permissions
will
enhance
security,
policies,
processes
and
Constant
control
monitoring
of
published
OS
technology
necessary
to
maintain
an
Data Storage
to Storage Network:
Extending
network
perimeter
defence
328
www.iaetsd.in
protocol
NAS appliances
challenge
from
the Storage
data
interfaces
on
not
only
determine
the
Monitor
traffic
patterns
on
the
data
activity
more blocks the data are split into, the poorer the
reliability of traditional data storage
V. CONCLUSION
Implement
authentication
clearly understood.
Implement
strong
authorization
using
Access
REFERENCES
a) Correctness verification
o
http://www.microsoft.com/business/engb/sol
utions/Pages/Cloud.aspx
We
can
correctness
do
that
by integrating the
verification
and
error
329
www.iaetsd.in
[2]
EMC,
Information-Centric
Security.
http://www.idc.pt/resources/PPTs/2007/IT&
Internet_Security/12.EMC.pdf.
[3] End-User Privacy in HumanComputer
Interaction.
http://www.cs.cmu.edu/~jasonh/publications
/fnt-enduser-privacy-in-human-computerinteractionfinal. pdf.
[4] ESG White Paper, the Information-Centric
Security Architecture. http://japan.emc.com/
collateral/analystreports/emc-white-paper
v4-4-21-2006.pdf.
[5] Subashini S, Kavitha V., A survey on
security issues in service delivery models of
cloud computing, Journal of Network and
Computer Applications (2011) vol. 34 Issue
1, January 2011 pp. 1-11.
AUTHORS
First Author
Second Author
330
www.iaetsd.in