A symmetric-based framework for securing cloud data at rest

Cloud computing is the umbrella term for delivering services via the Internet. It enables enterprises and individuals to access services such as virtual machines, storage, or applications on demand. It allows them to achieve more by paying less, and it removes the barrier of installing physical infrastructure. However, due to its openness and availability over the Internet, the issue of ensuring security and privacy arises. This requires careful consideration from enterprises and individuals before the adoption of cloud computing. In order to overcome security issues, cloud service providers are required to use strong security measures to secure their storage and protect cloud data from unauthorized access. In this paper, a novel framework and symmetric-based encryption scheme for securing cloud data at rest is introduced. The performance evaluation of the new framework shows that it has a high level of efficiency, feasibility, and scalability.

[1]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[2]  Prerna Agarwal,et al.  Issues and challenges of data security in a cloud computing environment , 2017, 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON).

[3]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[4]  S. Monikandan,et al.  Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm , 2013 .

[5]  S. Manikandan,et al.  Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach , 2014, 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies.

[6]  Sushil Kumar Saroj,et al.  A New Security Framework for Cloud Data , 2018 .

[7]  Guruh Fajar Shidik,et al.  Design and implementation of self encryption method on file security , 2017, 2017 International Seminar on Application for Technology of Information and Communication (iSemantic).

[8]  Huan Liu,et al.  Big Data Drives Cloud Adoption in Enterprise , 2013, IEEE Internet Computing.

[9]  Hung-Min Sun,et al.  Dual RSA and Its Security Analysis , 2007, IEEE Transactions on Information Theory.

[10]  Keke Gai,et al.  Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry , 2018, Future Gener. Comput. Syst..

[11]  Touraj Khodadadi,et al.  Cloud computing: Vision, architecture and Characteristics , 2015, 2015 IEEE 6th Control and System Graduate Research Colloquium (ICSGRC).

[12]  Jaya Sharma,et al.  A hybrid encryption algorithm based on RSA and Diffie-Hellman , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.

[13]  Debasis Das,et al.  Secure algorithm for cloud computing and its applications , 2016, 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence).

[14]  Sandor Imre,et al.  An advanced timing attack scheme on RSA , 2008, Networks 2008 - The 13th International Telecommunications Network Strategy and Planning Symposium.

[15]  Chun-I Fan,et al.  Controllable Privacy Preserving Search Based on Symmetric Predicate Encryption in Cloud Storage , 2011, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[16]  Ritu Patidar,et al.  Modified RSA cryptosystem based on offline storage and prime number , 2013, 2013 IEEE International Conference on Computational Intelligence and Computing Research.

[17]  G. Karagiannis,et al.  Cloud computing services: taxonomy and comparison , 2011, Journal of Internet Services and Applications.

[18]  Peng Xu,et al.  Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email , 2016, IEEE Transactions on Computers.

[19]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[20]  Xiaohua Jia,et al.  DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems , 2013, IEEE Transactions on Information Forensics and Security.

[21]  Jie Wu,et al.  Secure and privacy preserving keyword searching for cloud storage services , 2012, J. Netw. Comput. Appl..

[22]  Sawan Kumar,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[23]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[24]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.

[25]  Kai Hwang,et al.  Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.

[26]  Purnima Gupta,et al.  Improving RSA Algorithm Using Multi-Threading Model for Outsourced Data Security in Cloud Storage , 2018, 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence).

[27]  Zaigham Mahmood Cloud Computing: Characteristics and Deployment Approaches , 2011, 2011 IEEE 11th International Conference on Computer and Information Technology.

[28]  Kai Miao,et al.  A Simple Technique for Securing Data at Rest Stored in a Computing Cloud , 2009, CloudCom.

[29]  Ibrahim M. Al-Jabri The Perceptions of Adopters and Non-Adopters of Cloud Computing: Application of Technology-Organization-Environment Framework , 2014 .

[30]  Erik Elmroth,et al.  Connecting Fog and Cloud Computing , 2017, IEEE Cloud Comput..