6 research outputs found

    Data storage security and privacy in cloud computing: A comprehensive survey

    Get PDF
    Cloud Computing is a form of distributed computing wherein resources and application platforms are distributed over the Internet through on demand and pay on utilization basis. Data Storage is main feature that cloud data centres are provided to the companies/organizations to preserve huge data. But still few organizations are not ready to use cloud technology due to lack of security. This paper describes the different techniques along with few security challenges, advantages and also disadvantages. It also provides the analysis of data security issues and privacy protection affairs related to cloud computing by preventing data access from unauthorized users, managing sensitive data, providing accuracy and consistency of data store

    S 3 DCE: Secure Storing and Sharing of Data in Cloud Environment using user Phrase

    Get PDF
    Distributed Cloud Environment (DCE) focuses mainly on securing the data and safely shares it to the user. Data leakage may occur by the channel compromising or with the key managers. It is necessary to safeguard the communication channel between the entities before sharing the data. In this process of sharing, what if the key managers compromises with intruders and reveal the information of the user’s key that is used for encryption. The process of securing the key by using the user’s phrase is the key concept used in the proposed system “Secure Storing and Sharing of Data in Cloud Environment using User Phrase (S3DCE). It does not rely on any key managers to generate the key instead; the user himself generates the key. In order to provide double security, the public key derived from the user’s phrase also encrypts the encryption key. S3DCE guarantees privacy, confidentiality and integrity of the user data while storing and sharing. The proposed method S3DCE is more efficient in terms of time, cost and resource utilization compared to the existing algorithm DaSCE (Data Security for Cloud Environment with Semi Trusted Third Party) [22] and DACESM (Data Security for Cloud Environment with Scheduled Key Managers) [23]

    DSCESM: Data Security for Cloud Environment with Scheduled Key Managers

    No full text
    Distributed Cloud Environment (DCE) has the ability to store the data and share it with others. One of the main issues arises during this is, how safe the data in the cloud while storing and sharing. Therefore, the communication media should be safe from any intruders residing between the two entities. What if the key generator compromises with intruders and shares the keys used for both communication and data? Therefore, the proposed system makes use of the Station-to-Station (STS) protocol to make the channel safer. The concept of encrypting the secret key confuses the intruders. Duplicate File Detector (DFD) checks for any existence of the same file before uploading. The scheduler assigns the work of generating keys to the key manager who has less task to complete or free of any task. By these techniques, the proposed system makes time-efficient, cost-efficient, and resource efficient compared to the existing system. The performance is analysed in terms of time, cost and resources

    CDCEP: Securing the Compressed Data using Certificateless Encryption in Public Clouds

    No full text
    User data must be secured from intruders and the channel must be safer too. Before, many organizations depend on local server/flash drives to store their data that may lead to data loss. Cloud storage secures data on remote servers and provides online access to the data. What if the key generator compromises with the intruders and share the keys? In this paper, an architecture is proposed that does not use any key generator to generate the key and any authority to certify it. The CDCEP makes use of LZ4 algorithm and RC4 algorithm to compress and encrypt the fragments of file respectively before uploading it to the cloud. The performance of the proposed system is analyzed with respect to uploading/downloading time and the amount of storage required in storing a file in the cloud. It is observed that the time taken and storage required is reduced as compared to the existing system mCL-PKE

    CDCEP: Securing the compressed data using certificateless encryption in public clouds

    No full text
    User data must be secured from intruders and the channel must be safer too. Before, many organizations depend on local server/flash drives to store their data that may lead to data loss. Cloud storage secures data on remote servers and provides online access to the data. What if the key generator compromises with the intruders and share the keys? In this paper, an architecture is proposed that does not use any key generator to generate the key and any authority to certify it. The CDCEP makes use of LZ4 algorithm and RC4 algorithm to compress and encrypt the fragments of file respectively before uploading it to the cloud. The performance of the proposed system is analyzed with respect to uploading/downloading time and the amount of storage required in storing a file in the cloud. It is observed that the time taken and storage required is reduced as compared to the existing system mCL-PKE. © 2019 IEEE

    SSEIM: An Efficient Search Scheme over Encrypted Data with Indexing on Mobile Cloud

    No full text
    Mobile Cloud Computing (MCC) is a smart way to reduce IT cost, provide services anywhere, and any time. Encrypting the outsourced data is one way of enhancing the privacy from the owner point of view. Mobile devices consumes more resources when workload is heavy. In order to reduce, computation, communication and searching time of related files based on keyword query “An Efficient Search Scheme over Encrypted Data with Indexing on Mobile Cloud” (SSEIM) is proposed. The SSEIM uses the keyword-based search that includes Order Preserving Encryption (OPE) to order the encrypted data and makes use of indexing the record to search the related files. Thus, the proposed scheme is more efficient with respect to retrieval time as compared to the existing scheme TEES (Traffic and Energy saving Encrypted Search)
    corecore