An Intelligent Cloud Data Protection Technique Based on Multi Agent System Using Advanced Cryptographic Algorithms

In last decade, cloud computing has been envisioned as the next generation architecture of Information Technology (IT). This advent motivates the data owners to outsource their complex systems from local sites to the cloud for great flexibility and economic savings. However, the protected data should to be encrypted before outsourcing. The main objective of this paper is to implement properly this approach. The solution must provide an encryption scheme such that the user may maintain some functions such as arithmetic operations, research, update requests and preserving order, i.e., the homomorphism, on the encrypted cloud data. Moreover, even if another tenant can access to the stored data, all the stored data will appear is gibberish to the unknown users. We look to propose a strong solution that combines obfuscation technique for securing user interface, hybrid encryption algorithms for securing transport, communication operations and fully homomorphic encryption approach for securing storage operations. Then, this work is a new security architecture based on multi-agent system for cloud computing communications and storage environment that considers the intelligent various security gaps as much as possible.

[1]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[2]  Rajesh C. Dharmik,et al.  Deployment of application on Cloud and enhanced data security in Cloud computing using ECC algorithm , 2014, 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies.

[3]  Agostino Poggi,et al.  Jade - a fipa-compliant agent framework , 1999 .

[4]  William Stallings,et al.  Cryptography and network security , 1998 .

[5]  Nilesh N. Kumbhar,et al.  The Comprehensive Approach for Data Security in Cloud Computing: A Survey , 2012 .

[6]  Rosario Gennaro,et al.  Paillier's cryptosystem revisited , 2001, CCS '01.

[7]  Dongxi Liu,et al.  Programmable Order-Preserving Secure Index for Encrypted Database Query , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[8]  John W. Rittinghouse,et al.  Cloud Computing: Implementation, Management, and Security , 2009 .

[9]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[10]  Babitha M.P.,et al.  Secure cloud storage using AES encryption , 2016, 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT).

[11]  Teng Zhang,et al.  A study of DES and Blowfish encryption algorithm , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.

[12]  Thomas Schwarz Dodrant-homomorphic encryption for cloud databases using table lookup , 2017, 2017 International Symposium on Networks, Computers and Communications (ISNCC).

[13]  Dongxi Liu,et al.  Nonlinear order preserving index for encrypted database query in service cloud environments , 2013, Concurr. Comput. Pract. Exp..

[14]  K. Govinda,et al.  Agent Based Security for Cloud Computing using Obfuscation , 2012 .

[15]  A. Poggi,et al.  Multi-User and Security Support for Multi-Agent Systems , 2001, WOA.

[16]  Joe Kilian Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings , 2005, TCC.

[17]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[18]  Nathan Chenette,et al.  Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..

[19]  E. M. Mohamed,et al.  Randomness testing of modern encryption techniques in cloud environment , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).

[20]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[21]  Antonio Puliafito,et al.  Achieving Information Security in Network Computing Systems , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[22]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[23]  Javier Herranz,et al.  Additively Homomorphic Encryption with d-Operand Multiplications , 2010, IACR Cryptol. ePrint Arch..

[24]  Nagesh Kumar,et al.  DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .

[25]  Okba Kazar,et al.  An adaptive and efficient fully homomorphic encryption technique , 2018, ICFNDS.

[26]  Miguel Correia,et al.  DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.

[27]  Rajkumar Buyya,et al.  CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..

[28]  V. Surya,et al.  Secure Cloud Storage Using AES Encryption , 2018 .

[29]  Sushil Jajodia,et al.  Numerical SQL Value Expressions Over Encrypted Cloud Databases , 2015, DEXA.