Safe Haven in the Cloud: Secure Access Controlled File Encryption (SAFE) System

被引:0
|
作者
Shahzad, Farrukh [1 ]
机构
[1] King Fahd Univ Petr & Minerals, Informat & Comp Sci, Dhahran 31261, Saudi Arabia
关键词
Cloud computing; Data privacy; Encryption; Cryptography; Secure storage; Access control; Assured deletion;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The evolution of cloud computing has revolutionized how the computing is abstracted and utilized on remote third party infrastructure. It is now feasible to try out novel ideas over the cloud with no or very low initial cost. There are challenges in adopting cloud computing; but with obstacles, we have opportunities for research in several aspects of cloud computing. One of the main issue is the data security and privacy of information stored and processed at cloud provider's systems. In this work, a practical system (called SAFE) is designed and implemented to securely store/retrieve user's files on the third party cloud storage systems using well established cryptographic techniques. It utilizes the client-side, multilevel, symmetric/asymmetric encryption and decryption operations to provide policy-based access control and assured deletion of remotely hosted client's files. The SAFE is a generic application which can be extended to support any cloud storage provider as long as there is an API which support basic file upload and download operations.
引用
收藏
页码:1329 / 1334
页数:6
相关论文
共 50 条
  • [41] SSTreasury plus : A Secure and Elastic Cloud Data Encryption System
    Huang, Kuan-Ying
    Luo, Guo-Heng
    Yuan, Shyan-Ming
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 518 - 521
  • [42] Secure Cloud EHR with Semantic Access Control, Searchable Encryption and Attribute Revocation
    Walid, Redwan
    Joshi, Karuna P.
    Choi, Seung Geol
    2021 IEEE INTERNATIONAL CONFERENCE ON DIGITAL HEALTH (ICDH 2021), 2021, : 38 - 47
  • [43] A Novel Safe File Sharing Method Based on Cloud Storage Structure in DHT Networks
    Lu, Zhongning
    Shen, Gaofeng
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 189 - 200
  • [44] Safe, Secure Executions at the Network Edge Coordinating Cloud, Edge, and Fog Computing
    Makitalo, Niko
    Ometov, Aleksandr
    Kannisto, Joona
    Andreev, Sergey
    Koucheryavy, Yevgeni
    Mikkonen, Tommi
    IEEE SOFTWARE, 2018, 35 (01) : 30 - 37
  • [45] A secure conditional access system using digital signature and encryption
    Noore, A
    ICCE: 2003 INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, DIGEST OF TECHNICAL PAPERS, 2003, : 220 - 221
  • [46] Safe and Easy Access to a Computer File-Sharing Program Laboratory Practice and Research
    Wei, Lishuang
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 373 - 377
  • [47] An Architecture for Safe and Secure Automation System Devices and Maintenance Process
    Preschern, Christopher
    Kajtazovic, Nermin
    Kreiner, Christian
    2012 IEEE 19TH INTERNATIONAL CONFERENCE AND WORKSHOPS ON ENGINEERING OF COMPUTER BASED SYSTEMS (ECBS), 2012, : 82 - 89
  • [48] ACAFD: Secure and Scalable Access Control with Assured File Deletion for Outsourced Data in Cloud
    Senthilkumar, Sudha
    Viswanatham, Madhu
    JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2014, 8 (01) : 18 - 30
  • [49] Cut and Forward: Safe and Secure Communication for FPGA System on Chips
    Restuccia, Francesco
    Kastner, Ryan
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (11) : 4052 - 4063
  • [50] Cloud Based Storage System using Secure Deduplication and File Compression
    Sukruti, Gajare B.
    Rubeena, Khan A.
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,