Wednesday, February 29, 2012

File Level Encryption In Cloud


File or Folder level Encryption is an encryption system in which encrypted files, folders and disks are encrypted by features of the file system itself. With the use of these File Level Encryption is beneficial and some advantages implement the file level encryption.

  • More easy way to granular control over the information that is encrypted easily and finished it. Elsewhere,It can't be stored but it is stored on particular files or folder.

  • Allow you to integrate access level restriction in many file level encryption. Allows you to mange what.

  • When data is encrypted on file level and moved off the storage location,it can encrypted. Confidentiality,that is maintain data.

  • Less invasive to a database than column-level encryption. The schema of the database does not need to be modified and the access of data by authorized personnel (based on access control) is not hindered when querying and other management activities take place. This is an aspect of availability, one of the three tenets of the CIA triad.

  • Logging and auditing capabilities. Some file-level encryption systems offer the capability to track who attempts to access a file and when. Since the majority of data breaches are internal to the network, this kind of information is good to have.


Security


There is some Security aspects as follows:
Program Availability: You can only realize the value of thought handling when your team relationship and data transfer use age meet your little needs. The thought must be available whenever you need it. If not, the effects are no different than a denial-of-service damage.

Cloud Organization Viability: Because thought solutions are relatively new to the organization business, there are questions about their balance and investment. This concern improves when a business needs homeowners to use unique joins, creating tenant lock-in.

Disaster Renewal and Business Continuity: Home entrepreneurs and clients need confidence that their features and solutions will continue if the thought provider’s technology environment is subject to a problem.

Security Incidents: The company must inform homeowners and clients of any security abuse. Home entrepreneurs or clients may need company support to respond to analyze or research results. Also, a business may not offer sufficient support to homeowners or clients for fixing research.

Transparency: When a thought company does not present details of its own inner policy or technology, homeowners or clients must believe in the provider’s security claims. Home entrepreneurs and clients may still need some exposure by solutions as to how they management thought security, security and comfort accidents.

Loss of Real Control: Because homeowners and clients lose actual physical management over their details and programs, this gives increase to a range of concerns:
  • Information Privacy: With team or team environment, details may not maintain the same system, improving several legalities.
  • Information Control: Information could be coming in to the organization in various ways with some details due to others. A tenant administrator has limited management chance and liability within a team Features as a Assistance (IaaS) making, and even less with a Groundwork as a Assistance (PaaS) one. Home entrepreneurs need to have confidence their company will offer appropriate management, while acknowledging the need to progress their goals for how much management is cost-effective within these styles.

New Risks and Vulnerabilities: There can be concern that thought handling provides new periods of threats and flaws. There are theoretical new threats, but your uses will mostly be a work of a provider’s making. All software, components and marketing equipment are subject to getting new flaws. By employing cushioned security and well-conceived efficient techniques, you can protected a thought from typical problems, even if some of its components are generally susceptible.

Legal and Managing Compliance: It may be difficult or unlikely to use team environment if your details is subject to legal difficulties or regulating complying. You can expect solutions to build and accept thought infrastructures to deal with the needs of specific areas. Hitting certification may be challenging due to the many non-technical factors, such as the current state of typical thought knowledge. As best methods for thought handling cover greater chance, this concern should reduce.





eucalyptus2

 
Eucalyptus is the open source software that is make the infrastructure as a service and provide some easy way to make the cloud. Eucalyptus is the most usable and infrastructure software that connected to the enterprises and government agencies to build their own private cloud. With the use of Eucalyptus,it can increasing the productivity and new innovation of technology ,deploying the new application,and protect the sensitive data. It can provides the API compatible with the amazon web services that is offering : EC,EBS and easy way to build hybrid cloud.

Eucalyptus has some mostly use packages :
  • Cluster Controller : provides support for the virtual network overlay
  • Cloud Controller : includes the front-end services and the Walrus storage system.
  • Node Controller : that interacts with XEN to manage individual VMs.


The basic architecture how client, cloud controller, cluster controller and node controllers communicate with each other in a eucalyptus setup.

-> eucalyptus-nc
|
|
Client —> eucalyptus-cloud —-> eucalyptus-cc ——> eucalyptus-nc
|
|
-> eucalyptus-nc

Ubuntu Packages :: eucalyptus-cloud, eucalyptus-cc and eucalyptus-nc.

In my private cloud setup, the front end runs both eucalyptus-cloud and eucalyptus-cc and theree machines act as node controller and run eucalyptus-nc.