Enhancement of data confidentiality and secure data transaction in cloud storage environment

Cloud computing is a growing trend in many leading sectors. The task that challenges almost every progressing implementation is security and privacy. In earlier days, corporate /IT sectors were facing more security challenges over the data. Especially in a centralized environment, unauthorized users can easily modify the data without the knowledge of the owner, i.e., security breach is unavoidable. So, it becomes mandatory to secure the data. The proposed model follows the decentralized architecture which does not depend on any third party system. In this model, the data security can be enhanced by using cyclic shift transposition algorithm. For a secure data transmission and retrieval, we use quick response code and hash-based timestamp so that the real-time attacks are stopped or prevented.

[1]  S. Udhayakumar,et al.  Dynamic authentication for consumer supplies in mobile cloud environment , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).

[2]  V. Kavitha,et al.  Crypto System based Authentication using CSTA in Grid , 2012 .

[3]  Stuart Haber,et al.  How to time-stamp a digital document , 1990, Journal of Cryptology.

[4]  Young-Sik Jeong,et al.  A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..

[5]  Joonsang Baek,et al.  A Secure Cloud Computing Based Framework for Big Data Information Management of Smart Grid , 2015, IEEE Transactions on Cloud Computing.

[6]  Wen-Chuan Wu Subsampling-Based Image Tamper Detection and Recovery Using Quick Response Code , 2015 .

[7]  Md. Alam Hossain,et al.  Performance Analysis of Different Cryptography Algorithms , 2016 .

[8]  M. Bala Krishna,et al.  Product Authentication Using QR Codes: A Mobile Application to Combat Counterfeiting , 2016, Wireless Personal Communications.

[10]  Chin-Laung Lei,et al.  Audit-Free Cloud Storage via Deniable Attribute-Based Encryption , 2018, IEEE Transactions on Cloud Computing.

[11]  Wenting Shen,et al.  Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium , 2017, J. Netw. Comput. Appl..

[12]  Yue Liu,et al.  Recognition of QR Code with mobile phones , 2008, 2008 Chinese Control and Decision Conference.

[13]  Y. Sreenivasa Rao,et al.  A secure and efficient Ciphertext-Policy Attribute-Based Signcryption for Personal Health Records sharing in cloud computing , 2017, Future Gener. Comput. Syst..

[14]  Farrukh Shahzad,et al.  State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions , 2014, EUSPN/ICTH.

[15]  Hyotaek Lim,et al.  Online banking authentication system using mobile-OTP with QR-code , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[16]  R. Divya,et al.  An impervious QR-based visual authentication protocols to prevent black-bag cryptanalysis , 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO).