Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Integrating encryption techniques for secure data storage in the cloud

Published: 17 April 2022 Publication History

Abstract

Cloud computing has emerged as one of the most groundbreaking technologies to have redefined the bounds of conventional computing techniques. It has ushered in a paradigm shift and pushed the frontiers of how computing assets, inclusive of infrastructure resources, software, and applications can be used, adopted, and purchased. The economic benefits or rather the fundamental economic shift offered by cloud computing in reducing capital expenditure and converting it to operational expenditure has been a primary motivating factor for early adopters. However, despite its inherent advantages that include better access and control, there exist several reservations around cloud computing that have impeded its growth. The control, elasticity, and ease of use that cloud computing is associated with also engender many security issues. Security is considered to be the topmost hurdle out of the nine identified challenges of cloud computing as underlined by the study conducted by the International Data Corporation. It therefore follows that an exceedingly secure system is essential for the safeguarding of an organizational entity, its resources, and assets. In this article, it is our endeavor to offer insights into the implementation of a novel architecture that can deliver an enhanced degree of security for outsourcing information in a cloud computing environment while involving numerous independent cloud providers. The framework comprises of dual encryption and data fragmentation techniques that envision the secure distribution of information in a multicloud environment. The various concerns surrounding this area, specifically, the challenges of integrity, security, confidentiality, and authentication have been addressed. All simulations and scrutiny have been accomplished on an Oracle virtual machine Virtual‐Box and a Fog environment on an Ubuntu 16.04 platform. Extensive safety measures and performance analysis that take into account diverse parameters, especially execution time, integrity, throughput, entropy, transfer rate, and delay demonstrate that our projected proposal is vastly proficient and satisfies the security prerequisites of secure data sharing and can efficiently withstand security attacks.

Graphical Abstract

Secure Cloud Storage Overview.

References

[1]
Ermakova T, Fabian B. Secret sharing for health data in multi‐provider clouds. Paper presented at: Proceedings of the 2013 IEEE 15th Conference on Business Informatics; 2013:93‐100; Vienna, Austriahe: IEEE.
[2]
Tari Z, Yi X, Premarathne US, Bertok P, Khalil I. Security and privacy in cloud computing: vision, trends, and challenges. IEEE Cloud Comput. 2015;2(2):30‐38.
[3]
Hashem IAT, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Khan SU. The rise of "big data" on cloud computing: review and open research issues. Inf Syst. 2015;47:98‐115.
[4]
Zhang Y, Xu C, Li H, Liang X. Cryptographic public verification of data integrity for cloud storage systems. IEEE Cloud Comput. 2016;3(5):44‐52.
[5]
Castiglione A, Choo KKR, Nappi M, Narducci F. Biometrics in the cloud: challenges and research opportunities. IEEE Cloud Comput. 2017;4(4):12‐17.
[6]
Benzekki K, El Fergougui A, Elbelrhiti E. A secure cloud computing architecture using homomorphic encryption. Int J Adv Comput Sci Appl. 2016;7(2):293‐298.
[7]
Zafar F, Khan A, Malik SUR, et al. A survey of cloud computing data integrity schemes: design challenges, taxonomy and future trends. Comput Sec. 2017;65:29‐49.
[8]
Liu S, Zhang C, Chen Y. HASG: security and efficient frame for accessing cloud storage. Chin Commun. 2018;15(1):86‐94.
[9]
Rivest RL, Adleman L, Dertouzos ML. On data banks and privacy homomorphisms. Found Sec Comput. 1978;4(11):169‐180.
[10]
Tebaa M, El Hajji S, El Ghazi A. Homomorphic encryption applied to the cloud computing security. Paper presented at: Proceedings of the World Congress on Engineering; vol 1, 2012:4‐6; San Fransisco, CA: IEEE.
[11]
Rawal BS. Proxy re‐encryption architect for storing and sharing of cloud contents. Int J Parall Emerg Distrib Syst. 2020;35(3):219‐235.
[12]
Srisakthi S, Shanthi A. Towards the design of a secure and fault tolerant cloud storage in a multi‐cloud environment. Inf Sec J A Global Perspect. 2015;24(4‐6):109‐117.
[13]
Nepal S, Sinnott RO, Friedrich C, et al. TruXy: trusted storage cloud for scientific workflows. IEEE Trans Cloud Comput. 2015;5(3):428‐442.
[14]
Balusamy B, Krishna PV, Arasi GT, Chang V. A secured access control technique for cloud computing environment using attribute based hierarchical structure and token granting system. IJ Netw Sec. 2017;19(4):559‐572.
[15]
Rani B. A novice's perception of partial homomorphic encryption schemes. Ind J Sci Technol. 2016;9(37):10‐18.
[16]
Sood R, Sharma R. Cloud security threats and issues‐a review. IJCSE. 2017;5(4):115‐119.
[17]
Kolhar M, Abu‐Alhaj MM, El‐atty SMA. Cloud data auditing techniques with a focus on privacy and security. IEEE Sec Priv. 2017;15(1):42‐51.
[18]
Mollah MB, Azad MAK, Vasilakos A. Security and privacy challenges in mobile cloud computing: survey and way ahead. J Netw Comput Appl. 2017;84:38‐54.
[19]
Subramanian K, John FL. Secure and reliable unstructured data sharing in multi‐cloud storage using the hybrid crypto system. Int J Comput Sci Netw Sec. 2017;17(6):196‐206.
[20]
Suresh M, Neema M. Hardware implementation of blowfish algorithm for the secure data transmission in Internet of Things. Proc Technol. 2016;25:248‐255.
[21]
Weinman J. The economics of the hybrid multicloud fog. IEEE Cloud Comput. 2017;4(1):16‐21.
[22]
Yan H, Li J, Han J, Zhang Y. A novel efficient remote data possession checking protocol in cloud storage. IEEE Trans Inf Forens Sec. 2016;12(1):78‐88.
[23]
Mitchell JC, Mitchell M, Stern U. Automated analysis of cryptographic protocols using Mur/spl phi. Paper presented at: Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097); 1997:141‐151; Oakland, CA: IEEE.
[24]
Ali M, Malik SU, Khan SU. DaSCE: data security for cloud environment with semi‐trusted third party. IEEE Trans Cloud Comput. 2015;5(4):642‐655.
[25]
Aujla GS, Chaudhary R, Kumar N, Das AK, Rodrigues JJ. SecSVA: secure storage, verification, and auditing of big data in the cloud environment. IEEE Commun Mag. 2018;56(1):78‐85.
[26]
Wei Q, Shao H, Zhang G. Flexible, secure, and reliable data sharing service based on collaboration in multicloud environment. Wirel Commun Mob Comput. 2018;2018:1–16.
[27]
Le DN, Kumar R, Nguyen GN, Chatterjee JM. Cloud Computing and Virtualization. Hoboken, NJ: John Wiley & Sons; 2018.
[28]
Fu X, Nie X, Wu T, Li F. Large universe attribute based access control with efficient decryption in cloud storage system. J Syst Softw. 2018;135:157‐164.
[29]
Vyas J, Modi P. Providing confidentiality and integrity on data stored in cloud storage by hash and meta–data approach. Int J Adv Res Eng Sci Tech. 2017;4:38‐50.
[30]
Ramgovind S, Eloff MM, Smith E. The management of security in cloud computing. Inf Sec South Africa. 2010;2010:1‐7.
[31]
Paillier P. Public‐key cryptosystems based on composite degree residuosity classes. Paper presented at: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques; 1999:223‐238; Springer. New York, NY.
[32]
Le DN, Seth B, Dalal S. A hybrid approach of secret sharing with fragmentation and encryption in cloud environment for securing outsourced medical database: a revolutionary approach. J Cyber Sec Mob. 2018;7(4):379‐408.
[33]
Wang Y, Du J, Cheng X, Liu Z, Lin K. Degradation and encryption for outsourced PNG images in cloud storage. Int J Grid Util Comput. 2016;7(1):22‐28.
[34]
Suveetha K, Manju T. Ensuring Confidentiality of Cloud Data using Homomorphic Encryption. Indian Journal of Science and Technology. 2016;9(8):https://doi.org/10.17485/ijst/2016/v9i8/87964.
[35]
Liu Z, Wang Z, Cheng X, Jia C, Yuan K. Multi‐user searchable encryption with coarser‐grained access control in hybrid cloud. Paper presented at: Proceedings of the 2013 4th International Conference on Emerging Intelligent Data and Web Technologies; 2013:249‐255; Shaanxi, China: IEEE.
[36]
Huang H, Yin H, Min G, Jiang H, Zhang J, Wu Y. Data‐driven information plane in software‐defined networking. IEEE Commun Mag. 2017;55(6):218‐224.
[37]
Lin H, Hu J, Liu J, Xu L, Wu Y. A context aware reputation mechanism for enhancing big data veracity in mobile cloud computing. Paper presented at: Proceedings of the 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing; 2015:2049‐2054; Liverpool: IEEE.
[38]
Zou Z, Ge J, Zheng H, Wu Y, Han C, Yao Z. Encrypted traffic classification with a convolutional long short‐term memory neural network. Paper presented at: Proceedings of the 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS); 2018:329‐334; Sydney, Australia: IEEE.
[39]
Ma Y, Wu Y, Ge J, Jun L. An architecture for accountable anonymous access in the Internet‐of‐Things network. IEEE Access. 2018;6:14451‐14461.
[40]
Guan Z, Li J, Wu L, Zhang Y, Wu J, Du X. Achieving efficient and secure data acquisition for cloud‐supported internet of things in smart grid. IEEE IoT J. 2017;4(6):1934‐1944.
[41]
Guan Z, Zhang Y, Si G, et al. ECOSECURITY: tackling challenges related to data exchange and security: An edge‐computing‐enabled secure and efficient data exchange architecture for the energy Internet. IEEE Consum Electron Mag. 2019;8(2):61‐65.
[42]
Hu D, Zhang W, He L, Wu J. Secure transmission in multi‐cell multi‐user massive MIMO systems with an active eavesdropper. IEEE Wirel Commun Lett. 2018;8(1):85‐88.

Cited By

View all
  • (2024)Research on Cloud Storage Database Integrity Detection based on Intelligent VerificationProceedings of the 5th International Conference on Computer Information and Big Data Applications10.1145/3671151.3671368(1242-1246)Online publication date: 26-Apr-2024
  • (2023)Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision treeJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-023-00517-412:1Online publication date: 29-Sep-2023
  • (2023)A data lake-based security transmission and storage scheme for streaming big dataCluster Computing10.1007/s10586-023-04201-927:4(4741-4755)Online publication date: 9-Dec-2023
  • Show More Cited By

Index Terms

  1. Integrating encryption techniques for secure data storage in the cloud
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Please enable JavaScript to view thecomments powered by Disqus.

              Information & Contributors

              Information

              Published In

              cover image Transactions on Emerging Telecommunications Technologies
              Transactions on Emerging Telecommunications Technologies  Volume 33, Issue 4
              April 2022
              1018 pages
              EISSN:2161-3915
              DOI:10.1002/ett.v33.4
              Issue’s Table of Contents

              Publisher

              John Wiley & Sons, Inc.

              United States

              Publication History

              Published: 17 April 2022

              Qualifiers

              • Research-article

              Contributors

              Other Metrics

              Bibliometrics & Citations

              Bibliometrics

              Article Metrics

              • Downloads (Last 12 months)0
              • Downloads (Last 6 weeks)0
              Reflects downloads up to 12 Nov 2024

              Other Metrics

              Citations

              Cited By

              View all
              • (2024)Research on Cloud Storage Database Integrity Detection based on Intelligent VerificationProceedings of the 5th International Conference on Computer Information and Big Data Applications10.1145/3671151.3671368(1242-1246)Online publication date: 26-Apr-2024
              • (2023)Next-generation cyber attack prediction for IoT systems: leveraging multi-class SVM and optimized CHAID decision treeJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-023-00517-412:1Online publication date: 29-Sep-2023
              • (2023)A data lake-based security transmission and storage scheme for streaming big dataCluster Computing10.1007/s10586-023-04201-927:4(4741-4755)Online publication date: 9-Dec-2023
              • (2023)A Hybrid Intelligent Cryptography Algorithm for Distributed Big Data Storage in Cloud Computing SecurityMulti-disciplinary Trends in Artificial Intelligence10.1007/978-3-031-36402-0_59(637-648)Online publication date: 21-Jul-2023
              • (2022)DPC-CD: a secure architecture and methods for distributed processing and concurrency control in cloud databasesCluster Computing10.1007/s10586-022-03744-726:3(2047-2068)Online publication date: 16-Sep-2022
              • (2022)Congestion centric multi‐objective reptile search algorithm‐based clustering and routing in cognitive radio sensor networkTransactions on Emerging Telecommunications Technologies10.1002/ett.462934:11Online publication date: 22-Aug-2022

              View Options

              View options

              Get Access

              Login options

              Media

              Figures

              Other

              Tables

              Share

              Share

              Share this Publication link

              Share on social media