Abstract
Cloud is understood as a storage which provides space for data storage. The concept of Cloud and Cloud computing has a wider range. It can be characterized as providing services and various applications which are saved on servers while there is access to them through Internet. It is possible to work with data in cloud not only online mode but also in offline—it means to use the state of short-term connection and thus save data in mobile connection. Provided that the service is paid, the advantage of it is that the users do not pay for their software but for its use. Scientific publications state that the most often flaw of the service is its vulnerability in the form of data security. It is the reason why nowadays, all the attention is paid to this problematic field. In the report a data security design in Cloud computing will be described and also all the results will be stated that have been acquired through experiments to verify the overall security of a chosen cloud storage. According to measurements of chosen parameters of a basic and an extended cloud storage model, it has been found out that the security increase of data stored in cloud storage brings also worsening of other parameters of the storage. This is particularly the case of the access speed to data that (if they are automatically encrypted) can be influenced by the computing power of a particular PC hardware.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010). doi:10.1145/1721654.1721672
Balogh, Z., Turčáni, M., Magdin, M.: Design and creation of a universal model of educational process with the support of petri nets. Lecture Notes in Electrical Engineering, vol. 269, pp. 1049–1060 (2014). doi:10.1007/978-94-007-7618-0_103
Balogh, Z., Turčáni, M.: Modeling of data security in cloud computing. In: 10th Annual International Systems Conference, SysCon 2016. Institute of Electrical and Electronics Engineers Inc., pp. 940–946 (2016)
Barroso, L.A., Clidaras, J., Hölzle, U.: The datacenter as a computer: an introduction to the design of warehouse-scale machines. Synth. Lect. Comput. Archit. 2013(24), 1–156 (2013)
Beloglazov, A., Abawajy, J., Buyya, R.: Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future Gener. Comput. Syst. 28(5), 755–768 (2012). doi:10.1016/j.future.2011.04.017
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009). doi:10.1016/j.future.2008.12.001
Chang, V., Kuo, Y., Ramachandran, M.: Cloud computing adoption framework: a security framework for business clouds. Future Gener. Comput. Syst. 57, 24–41 (2016). doi:10.1016/j.future.2015.09.031
Dropbox Inc.: How secure is Dropbox? (2015). https://www.dropbox.com/help/27
Hariri, S., Khargharia, B., Chen, H., Yang, J., Zhang, Y., Parashar, M., Liu, H.: The autonomic computing paradigm. Cluster Comput. 9(1), 5–17 (2006). doi:10.1007/s10586-006-4893-0
Jararweh, Y., Al-Ayyoub, M., Darabseh, A., Benkhelifa, E., Vouk, M., Rindos, A.: Software defined cloud: survey, system and evaluation. Future Gener. Comput. Syst. 58, 56–74 (2016). doi:10.1016/j.future.2015.10.015
Kim, S.: Dynamic social cloud management scheme based on transformable stackelberg game. Eurasip J. Wirel. Commun. Networking 2016(1), 1–9 (2016)
Magdin, M., Turčáni, M., Hudec, M.: Evaluating the emotional state of a user using a webcam. Int. J. Interact. Multimedia Artif. Intell. 4(1), 61–68 (2016)
Mcgregor, J.P., Lee, R.B.: Performance Impact od Data Compression on Virtual Private Network Transactions (2000). http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.92.7667&rep=rep1&type=pdf
Munk, M., Kapusta, J., Švec, P.: Data preprocessing evaluation for web log mining: reconstruction of activities of a web visitor. In: 10th International Conference on Computational Science 2010, ICCS 2010, pp. 2273–2280, Amsterdam (2010)
Mukundha, C., Prabha, I., Sreenu, K.: Providing security in cloud based networks through software defined networks. J. Theor. Appl. Inf. Technol. 84(2), 287–293 (2016)
Secomba GmbH: AES and RSA Encryption (2015). https://www.boxcryptor.com/en/encryption/
Sreedhar Acharya, B., Siddappa, M.: Novel method of designing and implementation of security challenges in data transmission and storage in cloud computing. Int. J. Appl. Eng. Res. 11(4), 2283–2286 (2016)
Wu, J., Liang, Q., Bertino, E.: Improving scalability of software cloud for composite web services. Paper presented at the CLOUD 2009, 2009 IEEE International Conference on Cloud Computing, pp. 143–146 (2009). doi:10.1109/CLOUD.2009.75
Acknowledgements
This publication is supported thanks to the project with a name “Pilot project with UKF Nitra university: Modelling the behaviour of users based on data mining with support of IBM Bluemix”.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Balogh, Z., Magdin, M. (2018). The Problems of Data Security in Cloud Computing and Its Solution Using Petri Nets. In: Ntalianis, K., Croitoru, A. (eds) Applied Physics, System Science and Computers. APSAC 2017. Lecture Notes in Electrical Engineering, vol 428. Springer, Cham. https://doi.org/10.1007/978-3-319-53934-8_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-53934-8_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-53933-1
Online ISBN: 978-3-319-53934-8
eBook Packages: EngineeringEngineering (R0)