A Framework for Data Storage Security with Efficient Computing in Cloud

The modern technology defines cloud computing as a digital facility which is accessed by users over the web. The proposed framework provides the protection according to the classification of data. In this framework, cloud service provider (CSP) selects the eminent server using cuckoo algorithm with Markov chain process and Levy’s flight. After server selection, user encrypts their data using elliptic curve integrated encryption scheme (ECIES) at the user side and sends it to CSP for storage, where CSP stores the data after applying second encryption on it using advanced encryption standard (AES) at the cloud side. This double encryption provides the confidentiality on both the sides. This framework integrates server selection approach, authentication and encryption schemes in order to achieve the integrity, confidentiality as well as efficient computing.

[1]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[2]  Luigi Coppolino,et al.  Cloud security: Emerging threats and current solutions , 2017, Comput. Electr. Eng..

[3]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[4]  Kakali Chatterjee,et al.  Cloud security issues and challenges: A survey , 2017, J. Netw. Comput. Appl..

[5]  Santanu Chaudhury,et al.  Cryptanalysis of Vigenere cipher using Cuckoo Search , 2015, Appl. Soft Comput..

[6]  Araceli Queiruga Dios,et al.  Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme , 2015, Cryptologia.

[7]  Bhekisipho Twala,et al.  An adaptive Cuckoo search algorithm for optimisation , 2018, Applied Computing and Informatics.

[8]  Mhamed Zineddine,et al.  Vulnerabilities and mitigation techniques toning in the cloud: A cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with Lévy flights , 2015, Comput. Secur..

[9]  Max Mühlhäuser,et al.  Trust as a facilitator in cloud computing: a survey , 2012, Journal of Cloud Computing: Advances, Systems and Applications.

[10]  Sarbjeet Singh,et al.  A review of metaheuristic scheduling techniques in cloud computing , 2015 .

[11]  Gary B. Wills,et al.  Protecting data in personal cloud storage with security classifications , 2015, 2015 Science and Information Conference (SAI).

[12]  Henk C. A. van Tilborg,et al.  Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .

[13]  Saida Makhloufi,et al.  Three powerful nature-inspired algorithms to optimize power flow in Algeria's Adrar power system , 2016 .

[14]  Fahd M. Al-Dosari,et al.  A Secure Cloud Computing Model based on Data Classification , 2015, ANT/SEIT.