The techniques for Cloud Data Security are as follows:
- Data Integrity and Privacy Protection:
2.Data Coloring and Cloud Watermarking
- The system generates special colors for each data object.
- Data coloring means labeling each data object by a unique color.
- Differently colored data objects are distinguishable
- The user identification is also colored to be matched with the data colors. This color matching process can be applied to implement different trust management events.
- Cloud storage provides a process for the generation, embedding and extraction of the watermarks in colored objects.
- The data coloring takes a minimal number of calculations to color or decolor the data object.
3.Data Lock-in Problem and Proactive Solution
- Cloud computing moves both the computation and the data to the server clusters maintained by cloud service providers.
- Once the data is moved into the cloud, users cannot easily extract their data and programs from cloud servers to run on another platform. This leads to a data lock-in problem.
- Data lockin is attributed to two causes: lack of interoperability where each cloud vendor has its proprietary API that limits users to extract data once submitted and lack of application compatibility in most computing clouds expect users to write new applications from scratch, when they switch cloud platforms.
- The solution to data lockin is the use of standardized cloud APIs. This requires building standardized virtual platforms that adhere to OVF, a platform-independent, efficient, extensible and open format for VMs. This will enable efficient, secure software distribution, facilitating the mobility of VMs.
- Using OVF one can move data fom one application to another.
- This will enhance QoS and enable cross cloud applications, allowing workload migration among data centers to user-specific storage.