Analyzing of Cloud storage protection methods of personal data | Статья в журнале «Молодой ученый»

Отправьте статью сегодня! Журнал выйдет 30 ноября, печатный экземпляр отправим 4 декабря.

Опубликовать статью в журнале

Авторы: ,

Рубрика: Информационные технологии

Опубликовано в Молодой учёный №24 (314) июнь 2020 г.

Дата публикации: 15.06.2020

Статья просмотрена: 50 раз

Библиографическое описание:

Насруллаев, Н. Б. Analyzing of Cloud storage protection methods of personal data / Н. Б. Насруллаев, М. А. Шакаров. — Текст : непосредственный // Молодой ученый. — 2020. — № 24 (314). — С. 63-65. — URL: https://moluch.ru/archive/314/71654/ (дата обращения: 16.11.2024).



In this paper are described requirements of cloud storage systems and their comparison by features.

Keywords: cloud, security, security model, comparing.

In the field of computation, there have been many approaches for enhancing the parallelism and distribution of resources for the advancement and acceleration of data utilization [1]. Data clusters, distributed database management systems, data grids, and many more mechanisms have been introduced. Now cloud computing is emerging as the mechanism for high level computation, as well as serving as a storage system for resources. Clouds allow users to pay for whatever resources they use, allowing users to increase or decrease the amount of resources requested as needed. Cloud servers can be used to motivate the initiation of a business and ease its financial burden in terms of Capital Expenditure and Operational Expenditure. There are many questions that arise as to whether a cloud is secure enough. Considering malicious intruders, there are many kinds of possible attacks, such as a Wrapping attack, Malware-Injection attack, Flooding attack and Browser attack.

A failure can occur for various reasons [2]:

 Due to hardware, which is in the Infrastructure as a Service (IaaS) layer of the cloud

 Due to malware in software, which is in the Software as a Service (SaaS) layer of the cloud

 Due to the customer’s application running malicious code, the malfunctioning of the customer’s applications or a third party invading a client’s application by injecting bogus data.

The relationship among tables is finished by outside or principle keys. The divided information must meet 3 principle needs before they are put away and circulated in better places.

  1. Data base must be 3nf preceding any procedure. Thus, each table can be showed up as a free part.
  2. The level of classification in tables will decide the significance of accessible information.
  3. The client needs will decide the extra requests identified with section dissemination which can be chosen by the client.

In the primary thing, database standardization process is given to guarantee that non-correspondence and independency is essential. Along these lines, each table must have a free subject, no repetition in the put away information, incidental attributes which are reliant to the principle key and furthermore trustworthiness and similarity [3].

With many of us using multiple devices it has become necessary for us to sync and maintain consistency between all of them. Cloud storage providers are working hard and competing to have seamless file sharing and access. They allow us to have cross platform compatibility. Two of the main providers are Google Drive and Dropbox. Both offer the same basic features and are very comparable. Dropbox has been on the market quite a few years before Google Drive, so it has a larger market share, however Google Drive still is a close competitor. With any competing product there are key differences that needed to be noted.

Differences in File Support. When uploading files, you do not have to be concerned file type on the cloud service, but you can only view certain file types that are supported. Google Drive is known for being able to support a large variety of files. There are 30 different file types that Google Drive supports. You can view files such as Auto Desk and even Photoshop files despite not having those programs installed on your computer since you can edit documents without downloading them to your computer. When viewing Microsoft files online they are converted to the Google docs equivalent when editing. On the other hand, Dropbox does not support any file type. Instead all files must be downloaded to the computer, so nothing is opened while online. This means that you would have to own the program for the file that was sent.

Price V.S Storage Space. Each service offers a certain amount of free storage space for their basic users and additional storage can be purchased. Google Drive starts users off with 5GB of storage whereas Dropbox only starts with 2GB of storage. Google offers 25GB for $2.49 a month, 100GB for $4.99 a month if users need more storage space. Dropbox rates on the other hand start at $9.99/month for 50 GB or $19.99 for 100 GB. Overall Google Drive offers more space for a cheaper price.

Deleted Files and Old Versions. Both Google Drive and Dropbox have their own way to deal with version control, which allows you to go back and retrieve old files that you deleted or older versions of a file. The way Google Drive deals version control it is that it stores up to100 revisions of a document or 30 days of versions per document, which counts towards your total storage allowance. The trash folder is used to store deleted files and if the trash folder is deleted the files are gone forever. Dropbox keeps unlimited versions of your document for 30 days and it does not count toward the total storage space you are allowed.

Sharing Features. The ability to share files is a key aspect when analyzing both Drive and Dropbox. The main difference between them is that Dropbox shares from its desktop app whereas with Drive you can only share through the Web app. With Drive files are shared with an email, and restrictions can be set so that the viewers only have access to view the document and not edit it. With Dropbox there are two ways to share a file: one option is with a link and the other is a shared folder. When analyzing sharing features, it is also important to look at compatibility features as well. Google Drive only supports Mac and Windows users. Dropbox supports more and earlier versions of Mac OS and Windows as well and Linux, which can be an advantage. [9]

Storing your files in the cloud has many advantages. You can view your files from any phone, tablet or computer that's connected to the Internet, and the cloud can also provide backup for files so they'll never disappear if your phone gets lost or your computer crashes.

For that reason, a guide has been compiled to the most popular cloud storage services, covering how they work and their strengths and weaknesses. Some lesser-known options have been highlighted to get away from the mainstream.

Table 1

Cloud storage comparison

OneDrive

Dropbox

Google Drive

Box

Amazon Cloud Drive

File size restrictions?

10GB

10GB with website, none with Dropbox apps

5TB

250MB for free plan, 5GB for paid personal plan

2GB*

Free storage?

5GB**

2GB

15GB

10GB

No***

Can I earn extra free storage?

No**

Yes

No

No

No

Paid plans

$2/month for 50GB**

$10/month for 1TB

$2/month 100GB, $10/month for 1TB

$10/month for 100GB

$12/year for unlimited photos, $60/year for unlimited files

OSes supported

Windows, Mac, Android, iOS, Windows Phone

Windows, Mac, Linux, Android, iOS, Windows Phone, BlackBerry, Kindle Fire

Windows, Mac, Android, iOS

Windows, Mac, Android, iOS, Windows Phone, BlackBerry

Windows, Mac, Android, iOS, Kindle Fire

There is no file size limit with desktop apps.

In early 2016, Microsoft will change its free storage from 15GB to 5GB and offer a $2 per month for 50GB paid plan instead of its earlier offerings. It will also no longer let you earn free storage.

References:

  1. Cloud Security Alliance (CSA), “Security Guidance for critical Areas.
  2. Security Algorithms for Cloud Computing Akashdeep Bhardwaja*, GVB Computational Modeling and Security (CMS 2016).
  3. Security Threats/Attacks Present in Cloud Environment Kashif Munir and Computer Science that Network Security, VOL.12 No.12, December 2012.
  4. http://victorbiyi.blogspot.com/2014/06/four-differences-between-google-drive_19.html
  5. https://www.coolheadtech.com/blog/four-differences-between-google-drive-and-dropbox
Основные термины (генерируются автоматически): CMS, CSA, GVB.


Ключевые слова

security, security model, cloud, comparing

Похожие статьи

Mathematical Simulation of Industrial Waste Processing

The article is devoted to technological and environmental problems in the food industry. Authors suggested a cluster model to serve as a basis for the software, useful at the initial design stage, when it is important to determine the optimal set and...

Recommender system based on demographic-based recommendation algorithm

The idea of user-based, content-based and demographic-based recommendation mechanism is adopted to analyze and calculate these real data and extract the recommendation results to recommend to users to complete personalized movie recommendation.

Modeling the process of teaching a foreign language utterance using multimedia

The article reflects the main stages of modeling teaching utterance in multimedia context as a process of forming a speech action image. The properties of the information space are considered as the basis for image modeling, interactive components —...

Technologies for the development of critical thinking for the implementation of a personality-oriented model of teaching a foreign language

This article deals with the issue of developing students’ critical thinking abilities. The study of this problem is due to the importance of forming abilities to analyse and process the received information.

Features of developing mobile applications on the Thunkable platform

This article discusses the possibility of using a cloud environment for developing mobile applications, called Thunkable, in educational processes. The main features of working with the environment, its advantages and disadvantages are considered.

Framework for assessing enterprise risks using the Analytic Hierarchy Process

This article is intended to introduce the way of adapting the Analytic Hierarchy Process Method to the assessment of economic risks at the enterprise. In order to show it we calculate the risks for the project of implementing cloud storage to the uni...

To the question of practical use of ''Smart home'' system

The article focuses on the design and creation process of the automated integrated system for monitoring and control of home appliances and other things used in a person's everyday life. The following advantages of the system are taken into considera...

Scheduling of housing construction by maneuvering workforce

Pattern and image recognition with neural networks

The most popular application of neural networks is visual image recognition. Today, networks are being created in which machines can successfully identify symbols on paper and bank cards, signatures on official documents and objects. These functions ...

Designing a structured cabling system in a building

This article presents the concept of a structured cabling system, as well as its implementation through an existing network. The following questions should be considered: choice of technology and structure of the cable system, topology definition, op...

Похожие статьи

Mathematical Simulation of Industrial Waste Processing

The article is devoted to technological and environmental problems in the food industry. Authors suggested a cluster model to serve as a basis for the software, useful at the initial design stage, when it is important to determine the optimal set and...

Recommender system based on demographic-based recommendation algorithm

The idea of user-based, content-based and demographic-based recommendation mechanism is adopted to analyze and calculate these real data and extract the recommendation results to recommend to users to complete personalized movie recommendation.

Modeling the process of teaching a foreign language utterance using multimedia

The article reflects the main stages of modeling teaching utterance in multimedia context as a process of forming a speech action image. The properties of the information space are considered as the basis for image modeling, interactive components —...

Technologies for the development of critical thinking for the implementation of a personality-oriented model of teaching a foreign language

This article deals with the issue of developing students’ critical thinking abilities. The study of this problem is due to the importance of forming abilities to analyse and process the received information.

Features of developing mobile applications on the Thunkable platform

This article discusses the possibility of using a cloud environment for developing mobile applications, called Thunkable, in educational processes. The main features of working with the environment, its advantages and disadvantages are considered.

Framework for assessing enterprise risks using the Analytic Hierarchy Process

This article is intended to introduce the way of adapting the Analytic Hierarchy Process Method to the assessment of economic risks at the enterprise. In order to show it we calculate the risks for the project of implementing cloud storage to the uni...

To the question of practical use of ''Smart home'' system

The article focuses on the design and creation process of the automated integrated system for monitoring and control of home appliances and other things used in a person's everyday life. The following advantages of the system are taken into considera...

Scheduling of housing construction by maneuvering workforce

Pattern and image recognition with neural networks

The most popular application of neural networks is visual image recognition. Today, networks are being created in which machines can successfully identify symbols on paper and bank cards, signatures on official documents and objects. These functions ...

Designing a structured cabling system in a building

This article presents the concept of a structured cabling system, as well as its implementation through an existing network. The following questions should be considered: choice of technology and structure of the cable system, topology definition, op...

Задать вопрос