Skip to main content

The Problems of Data Security in Cloud Computing and Its Solution Using Petri Nets

  • Conference paper
  • First Online:
Applied Physics, System Science and Computers (APSAC 2017)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 428))

Abstract

Cloud is understood as a storage which provides space for data storage. The concept of Cloud and Cloud computing has a wider range. It can be characterized as providing services and various applications which are saved on servers while there is access to them through Internet. It is possible to work with data in cloud not only online mode but also in offline—it means to use the state of short-term connection and thus save data in mobile connection. Provided that the service is paid, the advantage of it is that the users do not pay for their software but for its use. Scientific publications state that the most often flaw of the service is its vulnerability in the form of data security. It is the reason why nowadays, all the attention is paid to this problematic field. In the report a data security design in Cloud computing will be described and also all the results will be stated that have been acquired through experiments to verify the overall security of a chosen cloud storage. According to measurements of chosen parameters of a basic and an extended cloud storage model, it has been found out that the security increase of data stored in cloud storage brings also worsening of other parameters of the storage. This is particularly the case of the access speed to data that (if they are automatically encrypted) can be influenced by the computing power of a particular PC hardware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010). doi:10.1145/1721654.1721672

    Article  Google Scholar 

  2. Balogh, Z., Turčáni, M., Magdin, M.: Design and creation of a universal model of educational process with the support of petri nets. Lecture Notes in Electrical Engineering, vol. 269, pp. 1049–1060 (2014). doi:10.1007/978-94-007-7618-0_103

  3. Balogh, Z., Turčáni, M.: Modeling of data security in cloud computing. In: 10th Annual International Systems Conference, SysCon 2016. Institute of Electrical and Electronics Engineers Inc., pp. 940–946 (2016)

    Google Scholar 

  4. Barroso, L.A., Clidaras, J., Hölzle, U.: The datacenter as a computer: an introduction to the design of warehouse-scale machines. Synth. Lect. Comput. Archit. 2013(24), 1–156 (2013)

    Google Scholar 

  5. Beloglazov, A., Abawajy, J., Buyya, R.: Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future Gener. Comput. Syst. 28(5), 755–768 (2012). doi:10.1016/j.future.2011.04.017

    Article  Google Scholar 

  6. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599–616 (2009). doi:10.1016/j.future.2008.12.001

    Article  Google Scholar 

  7. Chang, V., Kuo, Y., Ramachandran, M.: Cloud computing adoption framework: a security framework for business clouds. Future Gener. Comput. Syst. 57, 24–41 (2016). doi:10.1016/j.future.2015.09.031

    Article  Google Scholar 

  8. Dropbox Inc.: How secure is Dropbox? (2015). https://www.dropbox.com/help/27

  9. Hariri, S., Khargharia, B., Chen, H., Yang, J., Zhang, Y., Parashar, M., Liu, H.: The autonomic computing paradigm. Cluster Comput. 9(1), 5–17 (2006). doi:10.1007/s10586-006-4893-0

    Article  Google Scholar 

  10. Jararweh, Y., Al-Ayyoub, M., Darabseh, A., Benkhelifa, E., Vouk, M., Rindos, A.: Software defined cloud: survey, system and evaluation. Future Gener. Comput. Syst. 58, 56–74 (2016). doi:10.1016/j.future.2015.10.015

    Article  Google Scholar 

  11. Kim, S.: Dynamic social cloud management scheme based on transformable stackelberg game. Eurasip J. Wirel. Commun. Networking 2016(1), 1–9 (2016)

    Article  Google Scholar 

  12. Magdin, M., Turčáni, M., Hudec, M.: Evaluating the emotional state of a user using a webcam. Int. J. Interact. Multimedia Artif. Intell. 4(1), 61–68 (2016)

    Article  Google Scholar 

  13. Mcgregor, J.P., Lee, R.B.: Performance Impact od Data Compression on Virtual Private Network Transactions (2000). http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.92.7667&rep=rep1&type=pdf

  14. Munk, M., Kapusta, J., Švec, P.: Data preprocessing evaluation for web log mining: reconstruction of activities of a web visitor. In: 10th International Conference on Computational Science 2010, ICCS 2010, pp. 2273–2280, Amsterdam (2010)

    Google Scholar 

  15. Mukundha, C., Prabha, I., Sreenu, K.: Providing security in cloud based networks through software defined networks. J. Theor. Appl. Inf. Technol. 84(2), 287–293 (2016)

    Google Scholar 

  16. Secomba GmbH: AES and RSA Encryption (2015). https://www.boxcryptor.com/en/encryption/

  17. Sreedhar Acharya, B., Siddappa, M.: Novel method of designing and implementation of security challenges in data transmission and storage in cloud computing. Int. J. Appl. Eng. Res. 11(4), 2283–2286 (2016)

    Google Scholar 

  18. Wu, J., Liang, Q., Bertino, E.: Improving scalability of software cloud for composite web services. Paper presented at the CLOUD 2009, 2009 IEEE International Conference on Cloud Computing, pp. 143–146 (2009). doi:10.1109/CLOUD.2009.75

Download references

Acknowledgements

This publication is supported thanks to the project with a name “Pilot project with UKF Nitra university: Modelling the behaviour of users based on data mining with support of IBM Bluemix”.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zoltán Balogh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Balogh, Z., Magdin, M. (2018). The Problems of Data Security in Cloud Computing and Its Solution Using Petri Nets. In: Ntalianis, K., Croitoru, A. (eds) Applied Physics, System Science and Computers. APSAC 2017. Lecture Notes in Electrical Engineering, vol 428. Springer, Cham. https://doi.org/10.1007/978-3-319-53934-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-53934-8_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-53933-1

  • Online ISBN: 978-3-319-53934-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics