Storage Architecture for Network Security in Cloud Computing

Cloud Computing is seen as greatly accessible computing resources as an outward service granted from the world wide web. As an economical view, the cloud computing key is that consumers are free to use whatever they want, and pay for the services they want. The accessibility of the resources from the cloud is obtainable whenever users want and wherever they are. Therefore, users are free to purchase the IT service that they want and they do not have to be concern more about the manner that maintainable things can be beyond the positions. New model for data storage computing which considers as a web-based generation utilizes remote servers. The challenging needed to be undertook in cloud computing is the safety of information of service sources' site. Thus, this study suggests that designing new construction for the security of information storage with variety functions where information encrypted and split into many cipher blocks and disseminated between a large number of services suppliers locations instead of merely relying on only one supplier for information storage. Proposed based in the new architecture, it is applicable to ensure a better security, availability and reliability.


Introduction
Since the past decade, information technology has been changed dramatically and developed gradually.For example, the internet replaced the old-fashioned software models which has gradually increased the momentum of its services.Recently, the Old-style of business requests have been recognized to be obsolescence due to their complexity in the process and costly.Besides that, the volume and types of hardware as well as software that need to operate them are creepy.The new generation of cloud computing bridged the gap of information technology and eliminated the traditional system limitation through handling hardware and software shifts from users to proficient Service Supplier [1].Cloud computing considered as a modern computational archetype that proffers on creative model of business for institution to embrace it in absence of direct investment.Both of database and software applications in cloud computing are transformed into vast center of data such that data service and management cannot be wholly valuable [2].The premature classical storage system is less more useful and benefits than cloud storage particularly in price decrease, scalability, movability and applicatory condition [3].The description of cloud storage is a service to administrate, and preserve the remote of data [4].The user can find this service over the internet (as an example).The user has a permission for storing and retrieving files online from any site using the internet [5].The user can obtain files online if the uploaded files are kept by the supplier firm on an outward server.Cloud storage services can be enabled for using easily and comfortably by the firms, but probably it can be costly.The backup of users' data is still prerequisite if cloud storage services are applied due to data retrieving from cloud storage that is less faster than locally backup [6].In cloud storage, dividing data to small parts and saving them to variant locations makes the data secure, therefore if any smash happened to data parts in one data center or a disk, then left blocks makes data to be resumed [7].In cloud computing, storing the data as public in-service supplier's locations makes the data to have a low security [8].Cloud computing makes the benefits more attractive than ever, however many challenging security topics also brought for users' data.The essential safety challenge is that there is no supervision on the location of the owners' data.In cloud computing, it is not safe to rely on one service supplier for data storage [9].Any network or hardware problem in the service supplier location makes the data to be lost, so by using a distributed parity scheme data can be retrieved in this structure and by using Redundant Array of Inexpensive Disks (RAID) storage scheme.The distribution of data over several clouds was discussed in [10] in a method that if an opponent is capable to interrupt in one network.
The principal of RAID storage technology in cloud computing was discussed in [11].
Cryptographic quota single-handedly cannot encounter the confidentiality needed via cloud computing facilities [12] [13] because it is inadequate for guaranteeing information confidentiality in cloud computing.The notion of information distribution over numerous cloud service supplier's location instead of central dissemination of information was put [14].The cloud storage system structure contains admission layer, use interface layer [15].The combination between cloud storage and private cloud was discussed by [16].The structure of cloud storage, hiding complication of hardware and software from its operators were suggested in [17] [18].the benefit and viability of the technology of secrecy cloud storage centered on Hadoop was analyzed.In [19], Service Level Agreement (SLA) was used as the common standard amongst services suppliers and services' users to guarantee information safety in cloud storage structure.In [20]  approach that provided interesting characteristics to deal with these requirements [32].The security of computer networks plays a strategic role in modern computer systems.In order to enforce high protection levels against malicious attack, a number of software tools have been currently developed.Intrusion Detection System (IDS) has recently become a heated research topic due to its capability of detecting and preventing the attacks from malicious network users.Proposed a pattern matching IDS for network security [33].The three primary goals of network security which are confidentiality, integrity and availability can be achieved by using firewalls.Firewalls provide security by applying a security policy to arriving packets these policy called security rules and also firewalls can perform other functions like Gateway Antivirus, Gateway Monitor Program to monitor the traffic which pass.[34].The development of the Web technologies and services increases the level of threats to data security in companies and enterprises day by day information systems about its daily businesses, increases its risk to become vulnerable to security breaches.introduced a comprehensive network security approach for an online retail company which suffers from security breaches [35].

Cloud Definitions
Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.This definition is provided by U.S. NIST (National Institute of Standards and Technology) [36].Another definition is according to Wikipedia which define Cloud computing as it is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as an over a network (typically the Internet) [37].Cloud computing is a general term for anything that involves delivering hosted services over the Internet.Instead of a static system architecture, Virtualization technology allows cloud vendors to convert one server into many virtual machines, [38].

Public Cloud
Public cloud allows users to access the cloud publicly via interfaces using web browsers.
Users need to pay only for the time duration they use the service, i.e., pay-per-use.This can be compared to the electricity system which receive at our homes same concept applies here [39] Private Cloud A private clouds operation is within an organization's internal enterprise data center.The main advantage here is that it is easier to manage security, maintenance and upgrades and also provides more control over the deployment and use.[40].

Cloud Architecture
Cloud computing system can be divided into two sections as front end and back end.They   Cloud computing is suffering from severe security threats from user point of view, one can say that lack of security is the only worth mentioning disadvantage of cloud computing.[43].
One of the biggest security worries with the cloud computing model is the sharing of resources.If there was private/sensitive information being stored on a private cloud then there is a high chance that someone could view the information easier than many might believe.
The customer is advised to only give their data or use the cloud providers system if they trust them [44].

Proposed System Storage Architecture
The encrypted blocks of the information, and the equality data associated with the disseminated information are deposited in the service supplier's information server.This equality of data is not deposited on only service supplier server, but it is dispersed between the obtainable service suppliers for the well-organized re-establishment of information from the obtainable information blocks.To obtain the better availability of data, RAID level implementation will be adopted by each data server in the service provider premises.The suggested RAID level for implementation is RAID 10 based on the performance assessment of several RAID stages.Large arrays with high performance in most uses and superior fault tolerance are generated using RAID 10 because it syndicates the top features of striping and reflecting.Once hard disks turn out to be cheaper, RAID 10 has been melodramatically increasing in acceptance.Conjoining the speed of RAID 0 with the redundancy of RAID 1 minus demanding parity calculations will provide very good to excellent overall performance.connected to blocks (I and J) and (K and L) is stored in SP1 and SP5 correspondingly.Here, distributed parity scheme is used.Separately statistics block and equality blocks are barred and reflected since RAID 10 will be employed.Information block A on SP1 is striped into dual blocks as A1 A2 and reflected copy also deposited on SP1.Likewise the information blocks and equality blocks on additional service suppliers site are also barred and reflected.
An even number of disks are required in RAID 10 packing system revealed in Figure 6.• Achieving the principal of availability by storing the data on several cloud storage providers whereby no single entire copy of the data resides in one location, and only a subset of providers needs to be available in order to reconstruct the data.
• Achieving the principal of reliability by the parity scheme, by enabling the application to retrieve data correctly even if some of the providers corrupt or lose the entrusted data.

Vol: 14
No:1, January 2018 DOI : http://dx.doi.org/10.24237/djps.1401.205CP-ISSN: 2222-8373 E-ISSN: 2518-9255 . The construction to firmly store user information in open cloud and secluded cloud finished employing encryption was suggested [21] [22].The safety subjects in cloud storage analyzed based on cloud computing perceptions and landscapes in [23].Figure (1) displays the information loading construction with the host machine represented as user and service suppliers manifest as SP1 to SPn.

Figure 1 :
Figure 1: Suggested construction for cloud information storing both are connected with each other through a network, usually the internet.Front end is what the client (user) sees whereas the back end is the cloud system.Front end has the client's computer and the application required to access the cloud (Browser) and the back has the cloud computing services like on-demand computing and data storage from various servers.The figure below shows the cloud computing system architecture[41].

Figure 2 :
Figure 2: Cloud Computing System Architecture

Figure 3 :
Figure 3: Various Levels of Security Concerns in Cloud Computing

Figure 4 :
Figure 4: Various Levels of Security Concerns in Cloud Computing

Figure 5 Figure 5 :
Figure 5 characterizes the full architectural illustration of the suggested construction through six service suppliers' information.

Figure 6 :
Figure 6: RAID 10 storage system with four service providers

Figure 7 :
Figure 7: Parity scheme with six service providers