A two-tier security solution for storing data across public cloud

被引:0
|
作者
Sharma K. [1 ]
Rafiqui F. [2 ]
Diksha [3 ]
Attri P. [4 ]
Yadav S.K. [5 ]
机构
[1] Department of Computer Engineering, National Institute of Technology, Kurukshetra
[2] Software Devloper Engineering 1MG, Gurugram
[3] Microsoft, Hyderabad
[4] Founder Forksociety, New Delhi
[5] Department of Computer Science & Engineering, Indira Gandhi Delhi Technical University for Women, Delhi
来源
Recent Patents on Computer Science | 2019年 / 12卷 / 03期
关键词
AES algorithm; Algorithm; Cloud computing; Cloud security; Cloud security provider; DDoS; Decryption; Encryption; Security models; SHA algorithm;
D O I
10.2174/2213275911666181010112601
中图分类号
学科分类号
摘要
Background: Data integrity protection in Cloud Computing becomes very challenging since the user no longer has the possession of their own data. This makes cloud data storage security of critical importance. The users can resort to legal action against the cloud provider if the provider fails to maintain the integrity of the shared data, but it also raises a need to secure users' private data across the public cloud. Methods: In this paper, we propose a novel end-to-end solution to ensure the security of data stored over a public cloud. It is a two-tier approach where the data is stored in an encrypted format and only the owner of the data can have access to the original data shared across the cloud. The algorithm OwnData: Encryption and Decryption is based on AES file encryption, which has the flexibility to be implemented across different cloud platforms. Results: The proposed OwnData model to provide privacy and confidentiality to the user data successfully secures data in an encrypted format. The users can gain full access control over the accessibility of their data. The application has been improvised to minimize page load time which enables it to achieve improvements in scalability. Algorithm and concatenation operators (dot) give minimum computation load during uploading of data to the cloud platform or downloading the same. Conclusion: The algorithm is robust, scalable and secure and It gives the user complete authorization and control over the data even when data is being stored remotely or in any other cloud premises. © 2019 Bentham Science Publishers.
引用
收藏
页码:191 / 201
页数:10
相关论文
共 50 条
  • [41] Public Interest Law Organizations and the Two-Tier System of Access to Justice in the United States
    Albiston, Catherine
    Li, Su
    Nielsen, Laura Beth
    LAW AND SOCIAL INQUIRY-JOURNAL OF THE AMERICAN BAR FOUNDATION, 2017, 42 (04): : 990 - 1022
  • [42] A two-tier coordinated load balancing strategy over skewed data streams
    Sun, Dawei
    Wu, Minghui
    Yang, Zhihong
    Sajjanhar, Atul
    Buyya, Rajkumar
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (18): : 21028 - 21056
  • [43] A Two-tier Data-centric Framework for Flexible Business Process Management
    Liu, Rong
    Wu, Frederick Y.
    Pinel, Florian
    Shan, Zhe
    AMCIS 2012 PROCEEDINGS, 2012,
  • [44] A distributed data stream management model based on two-tier overlay network
    Rong Xiao-Xia
    Wang Jin-dong
    PROCEEDINGS OF THE 2006 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING (13TH), VOLS 1-3, 2006, : 260 - 264
  • [45] Competition and Coordination in Two-Tier Public Service Systems under Government Fiscal Policy
    Hua, Zhongsheng
    Chen, Wuhua
    Zhang, Zhe George
    PRODUCTION AND OPERATIONS MANAGEMENT, 2016, 25 (08) : 1430 - 1448
  • [46] Maximizing Mobiles Energy Saving Through Tasks Optimal Offloading Placement in two-tier Cloud
    Mazouzi, Houssemeddine
    Achir, Nadjib
    Boussetta, Khaled
    MSWIM'18: PROCEEDINGS OF THE 21ST ACM INTERNATIONAL CONFERENCE ON MODELING, ANALYSIS AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2018, : 137 - 145
  • [47] A two-tier coordinated load balancing strategy over skewed data streams
    Dawei Sun
    Minghui Wu
    Zhihong Yang
    Atul Sajjanhar
    Rajkumar Buyya
    The Journal of Supercomputing, 2023, 79 : 21028 - 21056
  • [48] Two-tier OFDMA Cellular Cloud-RAN: Joint Resource Allocation and Admission Control
    Abdelnasser, Amr
    Hossain, Ekram
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [49] Physical internet enabled two-tier city logistics solution in the new retail era
    Luo, Hao
    Wang, Yilun
    Luo, Zhixing
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2022, 122 (06) : 1453 - 1479
  • [50] Two-Tier Architecture for Spectrum Auction in SDN-Enabled Cloud Radio Access Network
    Sultana, Ajmery
    Woungang, Isaac
    Zhao, Lian
    Anpalagan, Alagan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (09) : 9191 - 9204