A two-tier security solution for storing data across public cloud

被引:0
|
作者
Sharma K. [1 ]
Rafiqui F. [2 ]
Diksha [3 ]
Attri P. [4 ]
Yadav S.K. [5 ]
机构
[1] Department of Computer Engineering, National Institute of Technology, Kurukshetra
[2] Software Devloper Engineering 1MG, Gurugram
[3] Microsoft, Hyderabad
[4] Founder Forksociety, New Delhi
[5] Department of Computer Science & Engineering, Indira Gandhi Delhi Technical University for Women, Delhi
来源
Recent Patents on Computer Science | 2019年 / 12卷 / 03期
关键词
AES algorithm; Algorithm; Cloud computing; Cloud security; Cloud security provider; DDoS; Decryption; Encryption; Security models; SHA algorithm;
D O I
10.2174/2213275911666181010112601
中图分类号
学科分类号
摘要
Background: Data integrity protection in Cloud Computing becomes very challenging since the user no longer has the possession of their own data. This makes cloud data storage security of critical importance. The users can resort to legal action against the cloud provider if the provider fails to maintain the integrity of the shared data, but it also raises a need to secure users' private data across the public cloud. Methods: In this paper, we propose a novel end-to-end solution to ensure the security of data stored over a public cloud. It is a two-tier approach where the data is stored in an encrypted format and only the owner of the data can have access to the original data shared across the cloud. The algorithm OwnData: Encryption and Decryption is based on AES file encryption, which has the flexibility to be implemented across different cloud platforms. Results: The proposed OwnData model to provide privacy and confidentiality to the user data successfully secures data in an encrypted format. The users can gain full access control over the accessibility of their data. The application has been improvised to minimize page load time which enables it to achieve improvements in scalability. Algorithm and concatenation operators (dot) give minimum computation load during uploading of data to the cloud platform or downloading the same. Conclusion: The algorithm is robust, scalable and secure and It gives the user complete authorization and control over the data even when data is being stored remotely or in any other cloud premises. © 2019 Bentham Science Publishers.
引用
收藏
页码:191 / 201
页数:10
相关论文
共 50 条
  • [31] An Application of Two-tier Cooperation Problem Solution Model in Air Traffic Service
    Zhao Yifei
    2008 5TH INTERNATIONAL CONFERENCE ON SERVICE SYSTEMS AND SERVICE MANAGEMENT, VOLS 1 AND 2, 2008, : 442 - 446
  • [32] Design of a Two-Tier WSN-based IoT Surveillance System with Cloud Integration
    Chimsom, Chukwuemeka L.
    Habib, Maki K.
    PROCEEDINGS OF THE 2019 20TH INTERNATIONAL CONFERENCE ON RESEARCH AND EDUCATION IN MECHATRONICS (REM 2019), 2019,
  • [33] Cost optimization of omnidirectional offloading in two-tier cloud-edge federated systems
    Kar, Binayak
    Lin, Ying-Dar
    Lai, Yuan-Cheng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 215
  • [34] A Two-Tier Energy-Aware Resource Management for Virtualized Cloud Computing System
    Huang, Wei
    Wang, Zhen
    Dong, Mianxiong
    Qian, Zhuzhong
    SCIENTIFIC PROGRAMMING, 2016, 2016
  • [35] Effeclouds: A cost-effective cloud-of-clouds framework for two-tier storage
    Liu, Mingyu
    Pan, Li
    Liu, Shijun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 129 : 33 - 49
  • [36] Autonomous Two-Tier Cloud-Based Demand Side Management Approach with Microgrid
    Yaghmaee, Mohammad Hossein
    Moghaddassian, Morteza
    Leon-Garcia, Alberto
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (03) : 1109 - 1120
  • [37] Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid
    Wei, Jin
    Kundur, Deepa
    2012 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING, 2012,
  • [38] PhD Forum: Improving the Security for Storing the Big Data in Cloud Environment
    Surbiryala, Jayachander
    2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 237 - 238
  • [39] Optimized cooperative data transmission in two-tier NB-IoT networks
    Liu, Zhijing
    COMPUTING, 2025, 107 (01)
  • [40] SOME DATA ON TWO-TIER IMPELLERS OF PUMPS FOR RESERVOIR PRESSURE MAINTENANCE SYSTEMS
    Knyazeva, E. G.
    CHEMICAL AND PETROLEUM ENGINEERING, 2011, 47 (1-2) : 59 - 63