Data Security
Each storage vendor is in possession of only a fragment of a file owing to the capacity of the RAID algorithm to seperate a file into multiple chunks, which can be easily reconstructed from a subset of these chunks. Accordingly, an attacker wishing to acquire a file stored in the cloud will have the challenge of getting all the chunks. Moreso, since all chunks are encrypted, there is an additional requirement of obtaining corresponding symmetric keys before successfully accessing data.
Data Availability
Current providers cannot assure users of constant availability of files in their possession. The CloudRAID overcomes this challenge by storing individual chunks at seperate cloud storage repositories thereby defying sole reliance on specific providers. The system also provides users the flexibility of configuring several parameters such as low costs, high bandwidth speed and performance. These factors can be combined to various ways to suit client requirements.
Threat Detection and Security Analytics
Consuming cloud services often enlarges a system's attack surface and introduces loss of control . Therefore, threat detection and security analytics capabilities are implemented to detect security threats and anomalies in CloudRAID's cloud resources. Similarly, intelligent systems are deployed to monitor and detect user-centric threats. These capabilities provide security visibility into the overall systems and narrow the gap between on-premise systems and cloud based infrastructure. Details of the described techniques are available on this page.
Advanced Access Control Mechanisms
Access control is also another challenge that needs to be solved by cloud storage services to ensure that only the authorized users can access the files stored in the cloud. We leverage attribute-based encryption to provide fine grained access control in enterprise environments, while ensuring scalable key management and scalability. Other additional features are location-based access control and multi-cloud resource management. Please take a look here for detailed information.