Analysis of Secured Cloud Data Storage Model
Analysis of Secured Cloud Data Storage Model
https://www.scirp.org/journal/jsea
ISSN Online: 1945-3124
ISSN Print: 1945-3116
Keywords
Cloud, Data, Information Model, Data Storage, Cloud Computing,
DOI: 10.4236/jsea.2024.175017 May 28, 2024 297 Journal of Software Engineering and Applications
E. N. Ekwonwune et al.
1. Introduction
1.1. Background of the Study
Securing Cloud Data Storage using UTF ((Unicode) Transformation Format)
base 64 algorithm. There is increasing attention given to computing in cloud in
the academia and commercial environments recently. Many researchers have
recognized the potentiality of storage of data in cloud data, which defines Data
Storage as a Service (DaaS) concept. However, the tremendous growth of data
has also increase desire for many institutions and organizations to put into con-
sideration where to preserved, manage and access data promptly, and how these
data could be secured properly. Computing in cloud is recent paradigm resulting
from years of scientific research on distributed computing, virtualization, net-
working, and web software services. It is natural evolution of the widespread
adoption of virtualization, service-oriented architecture, autonomic and utility
computation [1]. This area of computing is in support of creating new level of
applications running on fault resistant hardware devices that include smart
phones; mobile devices and tablets or Personal Digital Assistants (PDAs); using
cloud storage technology in data storability. This new technology is needed in
our institutions as education demand is constantly increasing due to advances
and positive change of e-campus solutions.
Furthermore, it is imperative for e-campus systems to meet the recent trend in
technology. Education institutions are thrilled at the capability of institutions to
take their salient data from management and physical infrastructure and give
attention to core competencies of the innovation of storability of data in the
cloud. The agility provided by computing in cloud excites institutions the most.
However, various institutions of learning, organizations, and individuals, dealing
with astronomical data are concerned more on the computing in cloud, is asso-
ciated security risks, particularly in storage of data, as improperly secured data
may make them experience partial loss of control of system that ordinarily they
should be highly accountable for. Among the rapidly growing areas of informa-
tion technology is cloud. Computing in cloud technology offers the ultimate
combination of hosting platform and internet storage services Computing in
cloud provides scalable and cheap computing infrastructure, which delivers qua-
litative services when needed, and helps in implementing online applications for
quality output. Ultimately, computing in cloud goal is the provision of scalable
and cheap computing infrastructure when needed that also delivers high level
quality services. It came with internet, which has provided easy access to compu-
ting sites that are remote. This frequently uses web-oriented applications or
tools, which users have full access to via web browsers which gives the feeling
that they have the program installed on remote hosts systems.
The National Institutes of Standards and Technology (NIST) gave more ob-
jectives and coherent definition of computing in cloud, as a model that enables
convenient, accessibility to configurable pool of computing resources shared on
networks inclusively, web servers, storage applications that are readily provided
and made available the least effort of management or interactions of providers of
web services. Typical providers of computing in cloud deliver applications for
business that are common online, and that could be accessed via Web browsers,
while storing the software and the data on the server. Many people see compu-
ting in cloud as service that is needed in different ways and one in every three
persons utilizes it. Many people are continuously transferring data into cloud for
its flexibility. It is adjudged to be an application to successfully use in organiza-
tions for its application, which allot room for large data storage and easy acces-
sibility to the stored data when required. Due to the increasing level of people
storing their important and personal data in cloud, storing the data safely is also
becoming a serious concern. Data security under storage is preventing many or-
ganizations, multinationals, and institutions from transferring their data that are
sensitive to cloud.
Cloud computing took the world by storm, now recognized as one, if not
the most popular technology in the Information Technology (IT) Indus-
tries. Day by Day, a wide range of companies and businesses are becoming
more habituated to using many applications of cloud computing because of
its compensation as-you-use nature, where clients need not to worry about
purchasing assets such as hardware, programs, framework etc., as cost is
reduced drastically when compared to the traditional model of computing
and the ease at which IT infrastructure solution offered [2]. Cloud compu-
ting can be termed as providing information technology resources when
demanded through the internet. The whole concept of its operation is in the
notion that the work done (data and software) on the client side can be
transferred to an unseen cluster of resources on the internet [3]. Cloud
computing being a virtual environment has its special security threats and
these threats are by far different from the threats in physical systems. This
has led to companies and businesses refusing to fully adopt moving to cloud
computing environment. In this study, these security concerns will be
properly examined and improved upon to be able to give those with doubt
the trust to fully embrace cloud computing.
“Data integrity is the maintenance of and the assurance of data accuracy and
consistency over its entire life cycle” [6]. Data integrity also make sure that data
is kept safe from third party force and the data is always accurate and reliable ir-
respective of the period of time it has been stored or how regularly the data is
being accessed. Every business and organization invests heavily to keep their
confidential data from unauthorized modification thereby enforcing different
policies to achieve this.
Electronic Business used interchangeably with e-business is define as the
overall term that envelops all form that uses of Digital information and commu-
nication technology to help and streamline business measures (E-Business, n.d.).
With the 24 hour/7 days availability of the internet, and the global exposure and
related legal risks associated with the absence of territorial boundaries as well as
business hour limitations provide a strong possibility that customers from around
the world will visit sites.
Today’s technical and legal landscape presents formidable challenges to per-
sonal data privacy. First, our increasing reliance on Web services causes personal
data to be cached, copied, and archived by third parties, often without our
knowledge or control. Second, the disclosure of private data has become com-
mon place due to carelessness, theft, or legal actions. Our research seeks to pro-
tect the privacy of past, archived data such as copies of emails maintained by an
email provider against accidental, malicious, and legal attacks. Specifically, we
wish to ensure that all copies of certain data become unreadable after a us-
er-specified time, without any specific action on the part of a user, and even if an
attacker obtains both a cached copy of that data and the user’s cryptographic
keys and passwords.
A Salient concept of data storability is encryption in trusted environment be-
fore using cloud storage resource. There are range of encryption algorithms,
which have proven secure, which can perform encryption/decryption operations
e.g., AES, Serpent and blowfish. Theoretically, algorithms for symmetric key
cryptography and asymmetric key cryptography are used for secure data storing
in cloud but the latter is slower than the former. However, for performance
measurement, symmetric algorithms are preferred. Encryption guarantees con-
fidentiality of stored data and detects any corruption in data.
Major issue of secure storage is management of keys for encryption, because
once data is encrypted, keys become the true bits to secure, and if keys are depo-
sited in environment not trusted with data, an intruder can access data and keys
to decrypt confidential data. The cryptography method for protecting informa-
tion is called encryption.
The major debacle to encryption is that data are not hidden, because data en-
crypted although unreadable still exists, and if hacker is given enough room, he
may eventually cryptanalyze the encrypted data. A way out of this debacle, is
steganography. Steganography is science and art concealing information into
obscure channels to code the information and prevent the anyone from under-
country where I am currently carrying out the research. However, the research
will be relevant if adopted by many Nigerian tertiary education institutions on
completion because this will reduce the risk associated with uploading, storabil-
ity and irretrievability of data on cloud-based computing infrastructures by the
university management.
2. Theoretical Framework
Cloud computing as a channel or route through which computing services such
as servers, storage, databases, networking, software, analytics, and intelligence
over the Internet (“the cloud”) can be accessed or used.
Cloud computing is on-demand access, via the internet, to computing re-
sources—applications, servers (physical servers and virtual servers), data storage,
development tools, networking capabilities, and more—hosted at a remote data
center managed by a cloud services provider (or CSP).
viding services in cloud. Cloud deployment models namely public, private, hy-
brid and community cloud [8] and the four deployment models describe the
services the cloud concept of computing offers to customers. NIST equally iden-
tified three service models: Software as a Service (SaaS), Platform as a Service
(PaaS) and Infrastructure as a Service (Iaas) are the Service-rendering architec-
tures used often to ascertain services provided in cloud with some abstractions.
Furthermore, NIST equally noted in the diagram, important characteristics of
computing in cloud [9] and the characteristics are:
1) Self-services on-demand.
2) Broad networks access.
3) Resource pooling.
4) Elasticity rapidity; and
5) Measured services.
Computing in cloud enables suitable network to guarantee a number of re-
sources for computing easily deployable with enormous efficiency to organiza-
tions. Figure 1 illustrated the architecture of cloud computing.
Figure 1 shows the terminology of the cloud computing whose functionalities
are the interconnection of infrastructure, platform and application. It gathers the
necessary Internet Of things (IOT) devices that are interconnected. The diagram
above cloud computing application uses either Laptops, Desktops, Phones and
Tablets using the Applications going through the content across the platform
managing the database using the run time process with available infrastructures.
The infrastructure devices use the platform to manage and run the applica-
tions that are installed already in them.
Figure 1. Diagram of computing in cloud (source: Rahul & Nitin, 2023) [10].
reporting resource use creates a transparent experience for both consumers and
providers of the service.
Figure 2 shows the characteristics of computing in cloud that are essential
(source: Tinankoria, 2018) [12].
Figure 2 shows the terminology of the cloud computing whose functionalities
of essential characteristics leading from resource pooling, broad network access
to measure services or on-demand self-service and rapid elasticity. This is said to
be essential due to its ability coordinate the cloud processed. Essential characte-
ristics of cloud computing is the central base that coordinate the whole system
sending to On-Deman self-service using automatic provision and to Rapid Elas-
ticity source which is used in measured services to monitor, control, report and
bill to control the could application depending on the network accessible by the
devices or the resources pooling using the multi-tenancy model using the loca-
tion independence.
1) Community Cloud
This model offers cloud infrastructures shared by organizations and it sup-
ports specific community, security requirements, mission, policy, and com-
pliance considerations. Government departments, universities, central banks etc
find model applicable [15]. Community cloud also has two possible scenarios
[15]. On-site Community Cloud Scenario Applies to community clouds imple-
mented on the premises of the customers composing a community [15].
Outsourced Community Cloud is clouds are applied to communities’ cloud,
which are hosted by a company.
Community Clouds include:
a) Google Apps for Government (Big data)
b) Microsoft Government Community Cloud (MGCC).
Figure 5 shows community cloud where only the community members within
security perimeters are allowed to access the community cloud. Only those
within their security perimeter remotely can have the access to the community
cloud as members of the community. This community member that are blocked
from accessing the cloud is because they don’t have the right pat or access code.
Organization A, B, and C access only data from the local cloud using the inner
security perimeter and exchange boundary with the organization X, Y, and Z
using the client accessing the community cloud from within their security peri-
meters.
Figure 6 diagram shows community cloud are outsourced only the
a) Windows Azure
b) VM wares Cloud (Hybrid Cloud Services)
Figure 8 shows hybrid cloud system. Hybrid cloud system is the cloud system
that consists of the on-site private cloud, outsource private cloud, on-site com-
munity cloud, outsource community cloud and all communicate with the public
cloud. All cloud system interchanges and communicate with each other cloud
system working seamlessly.
for applications design frameworks. This service providers, provides virtual ma-
chines, abstract hardware and operating systems controlled via API. Examples
include: Amazons E-C2, and S3, Terremark Enterprise Cloud, Windows Live
cloud; Skydrive and Rackspace. Platforms as a Service (PaaS); means by which
operating systems can actually be rented online. The services model let custom-
ers to rent servers (virtualized) and associated.
Its Application
PaaS is a great choice if your project involves multiple developers and ven-
dors. PaaS solutions are specific to applications and software development and
typically include Cloud infrastructure, middleware software, and user interface.
Figure 9 above shows Cloud Computing Models consist of three services
namely Software as a Service (SAAS), Platform as a Services (PAAS), and Infra-
structure as a Services (IAAS).
1) Software as a Service: is the part of the Cloud Computing Models that con-
sist of the Business process, industrial Application etc.
2) Platform as a Service: is the Model that consists of the services controlling
development tool, database connections, web application and runtime.
3) Infrastructure as a Service: is the part of the Model control or manages the
servers, Networking, Data center fabric and its storage.
The Models service interchanges all services with each other, the infrastruc-
ture hosts the platform and software runs on the platform.
Figure 9. Models for computing in cloud (source: Pranita and Ubale, 2023) [29].
storage services [34]. The underlying fact remains that traditional computing,
computing in cloud makes use of the technology of virtual computing. In that
case, there is every tendency that user data and their personal details are scat-
tered instead of being in a particular physical location or center of virtual data
even outside the border of the users nationality. Data privacy protection will face
the controversy of different legal systems. Users may trade information when in
cloud [35]. Depending on task, users analyze critical computing task is done
from attackers’ perspective. Privacy issues are;
i) Trust which identifies if there is an unauthorized users of information.
ii) Uncertainty as regards proper data destruction by one who controls data
retentiveness, occurrence of breaches and how the fault is determined.
iii) Compliance addresses difficulty in trans-borders data flow requirements.
1) Security
Security is a reason why organizations and institutions of higher learning not
leveraging the other underlying benefits cloudy computing. Security of cloud is
inclusive in areas like storage security, computation security, network security
etc. The security risk considerations are; storage of data externally, public inter-
net dependence, zero control, multi-tenancy and internal security integration
[19]. Providers of services in cloud, use encryption mechanisms for data storing
and transmission, user’s authentication and authorization. The worry of most
clients is remote data susceptibility to hackers on the cloud. The sensitivity of
service providers of cloud on the afore-mentioned is very high hence they allo-
cate reasonable resources to forestall attack.
2) Trust
Trust concern against security and privacy is also serious because of involve-
ment of third party. For example, in April 2022, Amazons Elastic Compute
Cloud service crashed during a system upgrade, knocking customers websites
off-line all over for several hours for several days. Another incident happened on
the same month. The braking into the PlayStation of Sony by hackers which ex-
posed 77 million people personal information created doubt about cloud priva-
cy, security and these eroded users trust in cloud [36].
3) Ownership
According to [37] once data taken to the cloud, users normally have control
loss fears, while the providers have the fear of not protecting customer’s right. In
other to solve this issue of loss of rights concern cloud providers draft well-
skilled agreements that is user-sided which enables users seek legal representa-
tion.
4) Availability and Performance
Applications and data in cloud are available whenever needed by users will
help address business organizations worries as per acceptable performance and
local system used in accessing servers.
5) Viability in Long Term
Users are assured of the continuous validity of their stored data in computing
in cloud provider gets lost or a big company acquires them. Users should ask
their potential providers of cloud how they would get users data in a form user
can import in replacement applications [20].
6) Data Backup
Users normally get disturbed about being in charge of their plans since cloud
providers normally engage in processes of data backup routinely. Recently, many
providers give room to customers to dump their data into media and also
enabling the customers back up frequently through downloads.
7) Data Conversion and Portability
Switching with services providers is a greatest concern to users in cloud. Dif-
ficulty of data transferring, converting it or porting depends on providers of
cloud storage format of retrieval of data particularly where format is not dis-
closed. With time, establishment of standards in computing in cloud will address
the issue. Worst case, payment will be required by subscribers for the conversion
of their customized data areas of computing in cloud need improvement.
8) Inadequate Data Storage Professionals: Organizations require storage of
huge digital data. Storage professionals are required to design, and manage the
changing storage requirements. Companies do not have skilled data storing pro-
fessionals due to lack of data storing technology education.
9) Availability of Limited Funds: Economic slowdown, grant cuts or subsidy
removal etc gave rise to companies’ consideration of cloud storage as a cheaper
alternative to maintenance of system and IT staff.
10) Virtualization: Is the fulcrum of computing in cloud and cloud storage, is
virtualization, enables multiple applications on virtual machines in physical
server. It is used for delivering greater availability, scalability along with optimi-
zation of resources.
Figure 11. A simplified diagram of the general model building procedure for pattern
Classification (Source: Kilany, 2013) [39].
cloud managers will take up that responsibility. The new model will also reduce
expenses on purchasing significant software and hardware by the institution, as
it is relatively inexpensive, less stressful, reliable, dependable, and will not con-
sume time. Cloud Computing method of storing Data is a better substitute for
the normal day-to-day storage devices. Tertiary institutions such as mine should
quickly adopt the newest Model of Cloud Computing as their storage unique-
ness.
Conflicts of Interest
The authors declare no conflicts of interest regarding the publication of this pa-
per.
References
[1] Nikita, G. and Toshi, S. (2018) Cloud Computing—SPI Framework, Deployment
Models, Challenges. International Journal of Emerging Technology and Advanced
Engineering, 4, 19-25.
[2] Ara, R., Rahim, A., Roy, S. and Prodhan, D.U.K. (2020) Cloud Computing: Archi-
tecture, Services, Deployment Models, Storage, Benefits and Challenges. Interna-
tional Journal of Trend in Scientific Research and Development, 4, 837-842.
[3] Ajoudanian, S. and Ahmadi, M.R. (2022) A Novel Data Security Model for Cloud
Computing. International Journal of Engineering and Technology, 4, 326-329.
https://doi.org/10.7763/IJET.2012.V4.375
[4] What Is Data Security? Definition, Solutions and How to Secure Data.
https://www.ibm.com/topics/data-security
[5] Singh, K. (2022) Efficiency and Security of Data with Symmetric Encryption Algo-
rithm. International Journal of Advance Research in Computer Science and Soft-
ware Engineering, 2, 1-9.
[6] Data Integrity (2021). Wikipedia.
https://en.wikipedia.org/w/index.php?title=Data_integrity&oldid=1009067843
[7] Heyong, W., Wu, W. and Feng-Kwei, W. (2022) Enterprise Cloud Service Archi-
tectures. Information Technology and Management, 13, 445-454.
https://link.springer.com/article/10.1007/s10799-032-0139-4
[8] Chakradhara, C.R., Mogasala, L. and Kumar, Y.R. (2020) Cloud: Computing Ser-
vices and Deployment Models. International Journal of Engineering and Computer
Science, 2, 12.
[9] Vadym, M. and Artem, V. (2021) Security Risk Analysis for Cloud Computing Sys-
tems. The 6th IEEE International Conference on Intelligent Data Acquisition and
Advanced Computing Systems: Technology and Applications, Vol. 3, Czech Repub-
lic, 15-17 September 2011, 340-347.
[10] Rahul, B. and Nitin, C. (2023) Cloud Computing: Service Models, Types, Database,
and Issues. International Journal of Advanced Research in Computer Science and
Software Engineering Research, 3, 605-701.
[11] Narayana, K.E., Sailesh, K. and Jayashree, K. (2019) A Review on Different Types of
Deployment Models in Cloud Computing. International Journal of Innovative Re-
search in Computer and Communication Engineering, 5, 1475-1481.
[12] Tinankoria, D. and Babak, B.R. (2018) Cloud Computing: A review of the Concepts
and Deployment Models. International Journal of Information Technology and