Security Enhancement for Data Migration in the Cloud

In today’s society, cloud computing has significantly impacted nearly every section of our lives and business structures. Cloud computing is, without any doubt, one of the strategic directions for many companies and the most dominating infrastructure for enterprises as long as end users. Instead of buying IT equipment (hardware and/or software) and managing it themselves, many organizations today prefer to buy services from IT service providers. The number of service providers increase dramatically and the cloud is becoming the tools of choice for more cloud storage services. However, as more personal information and data are moved to the cloud, into social media sites, DropBox, Baidu WangPan, etc., data security and privacy issues are questioned. Daily, academia and industry seek to find an efficient way to secure data migration in the cloud. Various solution approaches and encryption techniques have been implemented. In this work, we will discuss some of these approaches and evaluate the popular ones in order to find the elements that affect system performance. Finally, we will propose a model that enhances data security and privacy by combining Advanced Encryption Standard-256, Information Dispersal Algorithms and Secure Hash Algorithm-512. Our protocol achieves provable security assessments and fast execution times for medium thresholds.

[1]  S. Balamurugan,et al.  ESSAO: Enhanced Security Service Algorithm using Data Obfuscation Technique to Protect Data in Public Cloud Storage , 2016 .

[2]  Jayesh Patel,et al.  EncryScation: A novel framework for cloud IaaS, DaaS security using encryption and Obfuscation techniques , 2015, 2015 5th Nirma University International Conference on Engineering (NUiCONE).

[3]  Prashant Pandey,et al.  Cloud computing , 2010, ICWET.

[4]  Vinod Kumar,et al.  Secured user's authentication and private data storage- access scheme in cloud computing using Elliptic curve cryptography , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).

[5]  Kheng Kok Mar,et al.  Secure personal cloud storage , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[6]  Mingqiang Li On the Confidentiality of Information Dispersal Algorithms and Their Erasure Codes , 2012, ArXiv.

[7]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[8]  Shruti Gupta,et al.  Enhancement of security mechanism for confidential data using AES-128, 192 and 256bit encryption in cloud , 2015, 2015 1st International Conference on Next Generation Computing Technologies (NGCT).

[9]  Tadashi Minowa,et al.  Secure Distributed Storage for Bulk Data , 2012, ICONIP.

[10]  L. Arockiam,et al.  Efficient cloud storage confidentiality to ensure data security , 2014, 2014 International Conference on Computer Communication and Informatics.

[11]  Rahul Kamble,et al.  Framework for client side AES encryption technique in cloud computing , 2015, 2015 IEEE International Advance Computing Conference (IACC).

[12]  G. Manikandan,et al.  A few new approaches for data masking , 2015, 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015].

[13]  Somayyeh Gholizadeh,et al.  A 3-level re-encryption model to ensure data protection in cloud computing environments , 2014, 2014 IEEE Conference on Systems, Process and Control (ICSPC 2014).

[14]  Debasish Jena,et al.  Securing Files in the Cloud , 2016, 2016 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).

[15]  Xuesong Zhang,et al.  Study on the Use of IDAs in Cloud Storage , 2013, BIC-TA.

[16]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .