Generic placeholder image

Recent Patents on Computer Science

Editor-in-Chief

ISSN (Print): 2213-2759
ISSN (Online): 1874-4796

Research Article

A Two-tier Security Solution for Storing Data Across Public Cloud

Author(s): Kavita Sharma, Fatima Rafiqui, Diksha, Prabhanshu Attri and Sumit Kumar Yadav*

Volume 12, Issue 3, 2019

Page: [191 - 201] Pages: 11

DOI: 10.2174/2213275911666181010112601

Price: $65

Abstract

Background: Data integrity protection in Cloud Computing becomes very challenging since the user no longer has the possession of their own data. This makes cloud data storage security of critical importance. The users can resort to legal action against the cloud provider if the provider fails to maintain the integrity of the shared data, but it also raises a need to secure users' private data across the public cloud.

Methods: In this paper, we propose a novel end-to-end solution to ensure the security of data stored over a public cloud. It is a two-tier approach where the data is stored in an encrypted format and only the owner of the data can have access to the original data shared across the cloud. The algorithm OwnData: Encryption and Decryption is based on AES file encryption, which has the flexibility to be implemented across different cloud platforms.

Results: The proposed OwnData model to provide privacy and confidentiality to the user data successfully secures data in an encrypted format. The users can gain full access control over the accessibility of their data. The application has been improvised to minimize page load time which enables it to achieve improvements in scalability. Algorithm and concatenation operators (dot) give minimum computation load during uploading of data to the cloud platform or downloading the same.

Conclusion: The algorithm is robust, scalable and secure and It gives the user complete authorization and control over the data even when data is being stored remotely or in any other cloud premises.

Keywords: Algorithm, cloud computing, cloud security, cloud security provider, DDoS, decryption, encryption, AES algorithm, SHA algorithm, security models.

Graphical Abstract

[1]
S. Jones, Z. Irani, U. Sivarajah, and P.E. Love, "Risks and rewards of cloud computing in the UK public sector: A reflection on three Organisational case studies", Inf. Syst. Front., pp. 1-24, 2017.
[http://dx.doi.org/10.1007/s10796-017-9756-0]
[2]
D. Zissis, and D. Lekkas, "Addressing cloud computing security issues", Future Gener. Comput. Syst., vol. 28, pp. 583-592, 2012.
[3]
The notorious nine: cloud computing top threats in 2013, Top Threats Working Group Cloud Security Alliance, 2013.
[4]
N. Gonzalez, C. Miers, F. Redigolo, M. Simplicio, T. Carvalho, M. Näslund, and M. Pourzandi, "A quantitative analysis of current security concerns and solutions for cloud computing", J. Cloud Comput. Adv. Syst. Appl., vol. 1, p. 11, 2012.
[5]
D. Sun, G. Chang, L. Sun, and X. Wang, "Surveying and analyzing security, privacy and trust issues in cloud computing environments", Proc. Eng., vol. 15, pp. 2852-2856, 2011.
[6]
M. Rak, M. Ficco, E. Battista, V. Casola, and N. Mazzocca, "Developing secure cloud applications", Scal. Comput. Pract. Exp., vol. 15, pp. 49-62, 2014.
[7]
M. Irfan, M. Usman, Y. Zhuang, and S. Fong, "A critical review of security threats in cloud computing", In: 3rd International Symposium on Computational and Business Intelligence (ISCBI) IEEE, Bali, Indonesia,, 2015pp. 105-111
[8]
N.A. Puri, A.R. Karare, and R.C. Dharmik, "Deployment of application on cloud and enhanced data security in cloud computing using ECC algorithm", In IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT) Ramanathapuram, India 2014, pp. 1667-1671.
[9]
A. Azougaghe, Z. Kartit, M. Hedabou, M. Belkasmi, and M. El-Marraki, "An efficient algorithm for data security in Cloud storage", In IEEE 15th International Conference on Intelligent Systems Design and Applications (ISDA), Marrakech, Morocco, 2015, pp. 421-427.
[10]
S.A. Pitchay, W.A.A. Alhiagem, F. Ridzuan, and M.M. Saudi, "A proposed system concept on enhancing the encryption and decryption method for cloud computing", In IEEE 17th UKSim-AMSS International Conference on Modelling and Simulation (UKSim), Cambridge, UK, 2015, pp. 201-205.
[11]
K.V. Raipurkar, and A.V. Deorankar, "Improve data security in cloud environment by using LDAP and two-way encryption algorithm", In IEEE Symposium on Colossal Data Analysis and Networking (CDAN) Indore, India 2016, pp. 1-4.
[12]
D. Harnik, E.K. Kolodner, S. Ronen, J. Satran, A. Shulman-Peleg, and S. Tal, "Secure access mechanism for cloud storage", Scal. Comput. Pract. Exp., vol. 12, pp. 317-336, 2011.
[13]
S. Garcia-Gomez, M. Jimenez-Ganan, Y. Taher, C. Momm, F. Junker, J. Biro, and S. Strauch, "Challenges for the comprehensive management of Cloud Services in a PaaS framework", Scal. Comput. Pract. Exp., vol. 13, pp. 201-214, 2012.
[14]
F.Z. Filali, and B. Yagoubi, "Classifying and filtering users by similarity measures for trust management in cloud environment", Scal. Comput. Pract. Exp., vol. 16, pp. 289-302, 2015.
[15]
A. Gawanmeh, and A. Alomari, "Challenges in formal methods for testing and verification of cloud computing systems", Scal. Comput. Pract. Exp., vol. 16, pp. 321-332, 2015.
[16]
V. Casola, A. De Benedictis, M. Rak, and U. Villano, "SLA-based secure cloud application development", Scal. Comput. Pract. Exp., vol. 17, pp. 271-284, 2016.
[17]
M. Arapinis, S. Bursuc, and M. Ryan, "Privacy-supporting cloud computing by in-browser key translation", J. Comput. Secur., vol. 21, pp. 847-880, 2013.
[18]
M. Bellare, S. Keelveedhi, and T. Ristenpart, "Message-locked encryption and secure deduplication", In: Annual International Conference on the Theory and Applications of Cryptographic Techniques Springer, Berlin, Heidelberg, 2013pp. 296-312
[19]
B.R. Kandukuri, and A. Rakshit, "Cloud security issues", In IEEE International Conference on Services Computing Bangalore, India pp. 517-520, 2009.
[20]
Cyber-Physical Systems. A Concept Map Available from, https://cyberphysicalsystems.org/ (Accessed on: Dec. 2017).
[21]
J. Puttonen, S.O. Afolaranmi, and L.G. Moctezuma, A Lobov and J.L.M. Lastra, “Security in cloud-based cyber-physical systems”, In IEEE 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2015, pp. 671-676.
[22]
P. Zhang, J. Xu, H. Muazu, and W. Mao, "Access control research on data security in Cloud computing", In IEEE 16th International Conference on Communication Technology (ICCT), Hangzhou, China, 2015. pp. 873-877.
[23]
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing", In IEEE proceedings on Infocom, San Diego, CA, USA, 2010, pp. 1-9.
[24]
S.L. Albuquerque, and P.R. Gondim, "Security in cloud-computing-based mobile health", IT Prof., vol. 18, pp. 37-44, 2016.
[25]
K. Dhingra, and S. K. Yadav, Spam analysis of big reviews dataset using fuzzy ranking evaluation algorithm and Hadoop. Int. J. Machine Learn. Cybernet., pp. 1-20, 2017.
[26]
A. Arora, S.K. Yadav, and K. Sharma, Denial-of-Service (DoS) Attack and Botnet: Network Analysis, Research Tactics, and Mitigation.In: Handbook of Research on Network Forensics and Analysis Techniques., IGI Global, 2018.
[27]
B.B. Gupta, R.C. Joshi, M. Misra, D.L. Meena, G. Shrivastava, and K. Sharma, "Detecting a wide range of flooding DDoS attacks using linear prediction model", In IEEE 2nd International Conference on Information and Multimedia Technology, Hong Kong, China, 2010, pp. 535-539.
[28]
G. Shrivastava, P. Kumar, B. B. Gupta, S. Bala and N. Dey, Handbook of Research on Network Forensics and Analysis Techniques. IGI Global, 2018.
[29]
A. Saxena, G. Shrivastava, and K. Sharma, "Forensic investigation in cloud computing environment", Int. J. Forensic Comput. Sci., vol. 2, pp. 64-74, 2012.
[30]
A. Miglani, T. Bhatia, G. Sharma, and G. Shrivastava, "An energy efficient and trust aware framework for secure routing in LEACH for Wireless Sensor Networks", Scal. Comp. Pract. Exp., vol. 18, pp. 207-218, 2017.
[31]
M.D. Ryan, "Cloud computing security: The scientific challenge, and a survey of solutions", J. Syst. Softw., vol. 86, pp. 2263-2268, 2013.
[32]
B. Gellman, and L. Poitras, "US, British intelligence mining data from nine US Internet companies in broad secret program", The Washington Post, Vol. 6, 2013.
[33]
G. Greenwald, and E. MacAskill, "NSA Prism program taps in to user data of Apple, Google and others", Available from: https://www. theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data (Accessed on: 2018).
[34]
Own Cloud, Own Cloud Security and Encryption 2.0 A Technical Overview. Available from:https://owncloud.com/wp-content/ uploads/ 2015/09/Whitepaper_ownCloud-Security-and-Encryption-Technical-Overview_ENG_151101.pdf (Accessed on: December 2017).
[35]
Google, Google Oauth2client. Available from https://github.com/ google/oauth2client (Accessed on: December, 2017).
[36]
Google Drive REST API, Available from: https:// developers.google.com/ drive/v3/web/about-sdk (Last Accessed on: December, 2017).
[37]
Own. Cloud, How ownCloud uses encryption to protect your data. Available from: https://owncloud.org/blog/how-owncloud-uses-encryp-tion-to-protect-your-data/ (Accessed on: December, 2017).
[38]
F.S. Al-Anzi, S.K. Yadav, and J. Soni, "Cloud computing: Security model comprising governance, risk management and compliance", In IEEE International Conference on Data Mining and Intelligent Computing (ICDMIC) New Delhi, India 2014, pp. 1-6.
[39]
Owncloud, Solving The “dropbox”, Available from: https://owncloud.com/events/solving-the-dropbox-problem/ (Accessed on: December 2017).
[40]
S.K. Yadav, K. Sharma, and A. Arora, "Security integration in DDoS attack mitigation using access control lists", Int. J. Inf. Syst. Model. Des., vol. 9, pp. 56-76, 2018.
[41]
M. Khari, G. Shrivastava, S. Gupta, and R. Gupta, Role of cyber security in today’s scenario.In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications., IGI Global, 2018, pp. 1-15.
[42]
G. Shrivastava, "Approaches of network forensic model for investigation", Int. J. Forensic Eng., vol. 3, pp. 195-215, 2017.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy