Design of a Secure Encryption Model (SEM) for Cloud Data Storage Using Hadamard Transforms

Data storage has been one of the most prevalent services that has been offered by cloud computing. One of the challenges associated with data storage has been the security of the users data. There have been many models proposed that have tried to secure the users data using various cryptographic techniques. These models provide security at the cost of system overhead and increased computational complexity in terms of time and space. This paper presents a model—the Secure Encryption Model (SEM), that conserves space, reduces the computation cost and secures the users data using discrete transformations, termed as Hadamard transforms. The SEM model presented is a flexible model that encrypts the data at multiple levels, starting from a secure user authentication, which increases the security substantially. The SEM satisfies the avalanche effect property, which is a desirable property of an encryption algorithm. The storage space required for storing the encrypted data using Hadamard transforms is less by 10%, when compared to the ECC algorithm. The execution time for encrypting the data by Hadamard transforms has also been reduced by 25% when compared to the ECC algorithm. The model can be used in scenarios where the security requirements are not high and can be traded off with complexity, space and execution time.

[1]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[2]  Subhash Kak,et al.  Classification of Random Binary Sequences Using Walsh-Fourier Analysis , 1971 .

[3]  Kathy J. Horadam,et al.  A generalised Hadamard transform , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[4]  Anil K. Jain Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.

[5]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[6]  L. Washington Elliptic Curves: Number Theory and Cryptography , 2003 .

[7]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[8]  A. P. Shanthi,et al.  Towards the Design of a Secure and Fault Tolerant Cloud Storage in a Multi-Cloud Environment , 2015, Inf. Secur. J. A Glob. Perspect..

[9]  A. P. Shanthi,et al.  CompWare: A Middleware Support to Provide Fault Tolerant and Secure Cloud Storage , 2016 .

[10]  Wai-kuen Cham,et al.  Fast Algorithm for Walsh Hadamard Transform on Sliding Windows , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[11]  Jeng-Shyang Pan,et al.  Generalized Discrete Fractional Hadamard Transformation and its Application on the Image Encryption , 2007 .

[12]  Mohit Bhansali,et al.  Enhancing Cloud Computing Security using AES Algorithm , 2013 .

[13]  Vijay Varadharajan,et al.  Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage , 2015, IEEE Transactions on Information Forensics and Security.

[14]  Jiguo Li,et al.  Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing , 2017, IEEE Transactions on Services Computing.