A two-tier security solution for storing data across public cloud

被引:0
|
作者
Sharma K. [1 ]
Rafiqui F. [2 ]
Diksha [3 ]
Attri P. [4 ]
Yadav S.K. [5 ]
机构
[1] Department of Computer Engineering, National Institute of Technology, Kurukshetra
[2] Software Devloper Engineering 1MG, Gurugram
[3] Microsoft, Hyderabad
[4] Founder Forksociety, New Delhi
[5] Department of Computer Science & Engineering, Indira Gandhi Delhi Technical University for Women, Delhi
来源
Recent Patents on Computer Science | 2019年 / 12卷 / 03期
关键词
AES algorithm; Algorithm; Cloud computing; Cloud security; Cloud security provider; DDoS; Decryption; Encryption; Security models; SHA algorithm;
D O I
10.2174/2213275911666181010112601
中图分类号
学科分类号
摘要
Background: Data integrity protection in Cloud Computing becomes very challenging since the user no longer has the possession of their own data. This makes cloud data storage security of critical importance. The users can resort to legal action against the cloud provider if the provider fails to maintain the integrity of the shared data, but it also raises a need to secure users' private data across the public cloud. Methods: In this paper, we propose a novel end-to-end solution to ensure the security of data stored over a public cloud. It is a two-tier approach where the data is stored in an encrypted format and only the owner of the data can have access to the original data shared across the cloud. The algorithm OwnData: Encryption and Decryption is based on AES file encryption, which has the flexibility to be implemented across different cloud platforms. Results: The proposed OwnData model to provide privacy and confidentiality to the user data successfully secures data in an encrypted format. The users can gain full access control over the accessibility of their data. The application has been improvised to minimize page load time which enables it to achieve improvements in scalability. Algorithm and concatenation operators (dot) give minimum computation load during uploading of data to the cloud platform or downloading the same. Conclusion: The algorithm is robust, scalable and secure and It gives the user complete authorization and control over the data even when data is being stored remotely or in any other cloud premises. © 2019 Bentham Science Publishers.
引用
收藏
页码:191 / 201
页数:10
相关论文
共 50 条
  • [1] Hybrid Two-Tier Framework for Improved Security in Cloud Environment
    Singh, Aarti
    Malhotra, Manisha
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 955 - 960
  • [2] Two-tier solution
    Highways, 3 (29):
  • [3] Two-tier public provision: Comparing public systems
    Luelfesmann, Christoph
    Myers, Gordon M.
    JOURNAL OF PUBLIC ECONOMICS, 2011, 95 (11-12) : 1263 - 1271
  • [4] PUBLIC GOODS PROVISION BY A TWO-TIER GOVERNMENT
    Boyer, Pierre C.
    REVUE ECONOMIQUE, 2011, 62 (03): : 521 - 530
  • [5] Toward Industrial Private AI: A Two-Tier Framework for Data and Model Security
    Khowaja, Sunder Ali
    Dev, Kapal
    Qureshi, Nawab Muhammad Faseeh
    Khuwaja, Parus
    Foschini, Luca
    IEEE WIRELESS COMMUNICATIONS, 2022, 29 (02) : 76 - 83
  • [6] A Two-tier Solution for Disaster Relief Management
    Yusoff, Marina
    Ariffin, Junaidah
    Mohamed, Azlinah
    2013 IEEE SYMPOSIUM ON INDUSTRIAL ELECTRONICS & APPLICATIONS (ISIEA 2013), 2013, : 184 - 189
  • [7] Two-tier blockchain timestamped notarization with incremental security
    Meneghetti A.
    Quintavalle A.O.
    Sala M.
    Tomasi A.
    Annals of Emerging Technologies in Computing, 2019, 3 (5 Special Issue) : 25 - 33
  • [8] Clustering data streams on the two-tier structure
    Wang, Z
    Wang, B
    Zhou, CG
    Xu, XJ
    ADVANCED WEB TECHNOLOGIES AND APPLICATIONS, 2004, 3007 : 416 - 425
  • [9] Software Defined Wireless Access for a Two-Tier Cloud System
    Monfared, Sina
    Bannazadeh, Hadi
    Leon-Garcia, Alberto
    PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM), 2015, : 566 - 571
  • [10] A politically feasible social security reform with a two-tier structure
    Yamada, Tomoaki
    JOURNAL OF THE JAPANESE AND INTERNATIONAL ECONOMIES, 2011, 25 (03) : 199 - 224