A two-tier security solution for storing data across public cloud

被引:0
|
作者
Sharma K. [1 ]
Rafiqui F. [2 ]
Diksha [3 ]
Attri P. [4 ]
Yadav S.K. [5 ]
机构
[1] Department of Computer Engineering, National Institute of Technology, Kurukshetra
[2] Software Devloper Engineering 1MG, Gurugram
[3] Microsoft, Hyderabad
[4] Founder Forksociety, New Delhi
[5] Department of Computer Science & Engineering, Indira Gandhi Delhi Technical University for Women, Delhi
来源
Recent Patents on Computer Science | 2019年 / 12卷 / 03期
关键词
AES algorithm; Algorithm; Cloud computing; Cloud security; Cloud security provider; DDoS; Decryption; Encryption; Security models; SHA algorithm;
D O I
10.2174/2213275911666181010112601
中图分类号
学科分类号
摘要
Background: Data integrity protection in Cloud Computing becomes very challenging since the user no longer has the possession of their own data. This makes cloud data storage security of critical importance. The users can resort to legal action against the cloud provider if the provider fails to maintain the integrity of the shared data, but it also raises a need to secure users' private data across the public cloud. Methods: In this paper, we propose a novel end-to-end solution to ensure the security of data stored over a public cloud. It is a two-tier approach where the data is stored in an encrypted format and only the owner of the data can have access to the original data shared across the cloud. The algorithm OwnData: Encryption and Decryption is based on AES file encryption, which has the flexibility to be implemented across different cloud platforms. Results: The proposed OwnData model to provide privacy and confidentiality to the user data successfully secures data in an encrypted format. The users can gain full access control over the accessibility of their data. The application has been improvised to minimize page load time which enables it to achieve improvements in scalability. Algorithm and concatenation operators (dot) give minimum computation load during uploading of data to the cloud platform or downloading the same. Conclusion: The algorithm is robust, scalable and secure and It gives the user complete authorization and control over the data even when data is being stored remotely or in any other cloud premises. © 2019 Bentham Science Publishers.
引用
收藏
页码:191 / 201
页数:10
相关论文
共 50 条
  • [21] Two-tier data fusion method for bridge condition assessment
    Ahmed, Marwa
    Moselhi, Osama
    Bhowmick, Anjan
    CANADIAN JOURNAL OF CIVIL ENGINEERING, 2018, 45 (03) : 197 - 214
  • [22] Two-Tier Mobile Data Aggregation in Wireless Sensor Networks
    Kim, Daehee
    Lee, Sangbin
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (10) : 1900 - 1903
  • [23] Data Collection Scheme for Two-Tier Vehicular Sensor Networks
    Lee, Junghoon
    Kang, Mikyung
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2010, 6221 : 295 - +
  • [24] FRAGILE DATA STORING IN PUBLIC CLOUD FOR HOSPITAL ADMINISTRATION
    Selvaprabhu, S.
    Visumathi, J.
    2017 THIRD INTERNATIONAL CONFERENCE ON SCIENCE TECHNOLOGY ENGINEERING & MANAGEMENT (ICONSTEM), 2017, : 93 - 99
  • [25] The Lyapunov Optimization for Two-Tier Hierarchical-Based MAC in Cloud Robotics
    Hu, Yansu
    Gao, Ang
    Wang, Changqing
    Cao, Wen
    Yan, Maode
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [26] A RAM-Based MAC Table with Two-Tier Security at Layer 2
    Ray, Sanchita Saha
    Das, Krishnendu
    Ghosh, Surajeet
    IETE JOURNAL OF RESEARCH, 2016, 62 (04) : 435 - 445
  • [27] Storing Shared Data on the Cloud via Security-Mediator
    Wang, Boyang
    Chow, Sherman S. M.
    Li, Ming
    Li, Hui
    2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2013, : 124 - 133
  • [28] Two-Tier Air Indexing for On-Demand XML Data Broadcast
    Sun, Weiwei
    Yu, Ping
    Qing, Yongrui
    Zhang, Zhuoyao
    Zheng, Baihua
    2009 29TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2009, : 199 - +
  • [29] Public reason, democracy, and the ideal two-tier social choice model of politics
    Hedoin, Cyril
    CONSTITUTIONAL POLITICAL ECONOMY, 2024, 35 (03) : 388 - 410
  • [30] Analysis of two-tier public service systems under a government subsidy policy
    Chen, Wuhua
    Zhang, Zhe George
    Hua, Zhongsheng
    COMPUTERS & INDUSTRIAL ENGINEERING, 2015, 90 : 146 - 157