KEMBAR78
Tracking Security Log Issues Occure in Cloud Environment | PDF
0% found this document useful (0 votes)
37 views1 page

Tracking Security Log Issues Occure in Cloud Environment

Tracking security log issues that occur in cloud environments is important for data security and quality of service. Cloud computing introduces new challenging security threats due to factors such as users frequently updating their data through actions like insertion, deletion, modification, and reordering. Ensuring storage correctness under these dynamic data operations is paramount. Researchers have proposed distributed protocols to ensure storage correctness across multiple servers, but these are not aware of dynamic data operations, limiting their applicability to cloud data storage. An effective and flexible distributed scheme is needed to ensure correctness of users' data in the cloud while supporting dynamic data through the use of erasure correcting codes for file distribution and redundancies. This provides data dependability with less communication and storage overhead than traditional replication techniques

Uploaded by

msodhani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views1 page

Tracking Security Log Issues Occure in Cloud Environment

Tracking security log issues that occur in cloud environments is important for data security and quality of service. Cloud computing introduces new challenging security threats due to factors such as users frequently updating their data through actions like insertion, deletion, modification, and reordering. Ensuring storage correctness under these dynamic data operations is paramount. Researchers have proposed distributed protocols to ensure storage correctness across multiple servers, but these are not aware of dynamic data operations, limiting their applicability to cloud data storage. An effective and flexible distributed scheme is needed to ensure correctness of users' data in the cloud while supporting dynamic data through the use of erasure correcting codes for file distribution and redundancies. This provides data dependability with less communication and storage overhead than traditional replication techniques

Uploaded by

msodhani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

Tracking security log issues occure in Cloud

environment
From the perspective of data security, which has always been an important aspect of quality of
service, Cloud Computing inevitably poses new challenging security threats for number of
reasons. Cloud Computing is not just a third party data warehouse. The data stored in the cloud
may be frequently updated by the users, including insertion, deletion, modification, appending,
reordering, etc. To ensure storage correctness under dynamic data update is hence of paramount
importance. As a complementary approach, researchers have also proposed distributed protocols
for ensuring storage correctness across multiple servers or peers. Again, none of these distributed
schemes is aware of dynamic data operations. As a result, their applicability in cloud data storage
can be drastically limited.
An effective and flexible distributed scheme with explicit dynamic data support to ensure the
correctness of user’s data in the cloud. We rely on erasure correcting code in the file distribution
preparation to provide redundancies and guarantee the data dependability. This construction
drastically reduces the communication and storage overhead as compared to the traditional
replication-based file distribution techniques. Compared to many of its predecessors, which only
provide binary results about the storage state across the distributed servers, the challenge-
response protocol in our work further provides the localization of data error.
A systematic, dedicated approach to Cloud Computing valuation is urgently needed. Previous
work from related fields, like Grid Computing, does not consider all aspects relevant to Cloud
Computing and can thus not be directly applied. Previous approaches tend to mix business
objectives with technological requirements. Moreover, the role of demand behavior and the
consequences it poses on IT requirements needs to be evaluated in a new light. Most important, it
is only possible to value the benefit from Cloud Computing if compared to alternative solutions.
We believe that a structured framework will be helpful to clarify which general business
scenarios Cloud Computing addresses.

You might also like