SSM: Secure-Split-Merge data distribution in cloud infrastructure

With the advancement of cloud storage services the vulnerabilities associated with cloud-related data has increased. It affects the cloud distributed data servers that are not only used for data storage, but also used for managing a huge amount of data with distributed file structures in collaborative sharing. The data sharing processes of cloud computing infrastructure are susceptible to various kinds of attacks where many traditional cryptographic techniques fail to provide a proper and efficient authentication mechanism. In this paper, a novel approach namely Secure-Split-Merge (SSM) is introduced for the security of data. The proposed SSM scheme uses a unique mechanism of performing splitting of data using AES 128 bit encryption key. The chunks of encrypted splits are being maintained on various rack servers of different types of cloud zones. The comparative analysis shows that the proposed system gives effective outcomes as compared to various existing and traditional security standards.

[1]  Sowmiya Murthy,et al.  CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY , 2014, SOCO 2014.

[2]  Yang Tang,et al.  FADE: Secure Overlay Cloud Storage with File Assured Deletion , 2010, SecureComm.

[3]  Hao Wu,et al.  Secure sensitive data sharing on a big data platform , 2015 .

[4]  Helen J. Wang,et al.  Enabling Security in Cloud Storage SLAs with CloudProof , 2011, USENIX ATC.

[5]  Miguel Correia,et al.  DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.

[6]  Alessandro Sorniotti,et al.  A Secure Data Deduplication Scheme for Cloud Storage , 2014, Financial Cryptography.

[7]  Wei Ren,et al.  Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing , 2011 .

[8]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[9]  Marina Blanton,et al.  Deniable cloud storage: sharing files via public-key deniability , 2010, WPES '10.

[10]  Lucio Grandinetti,et al.  Pervasive Cloud Computing Technologies: Future Outlooks and Interdisciplinary Perspectives , 2013 .

[11]  Zhenyu Yang,et al.  LT codes-based secure and reliable cloud storage service , 2012, 2012 Proceedings IEEE INFOCOM.

[12]  Charalampos Papamanthou,et al.  CS2: A Searchable Cryptographic Cloud Storage System , 2011 .

[13]  Wei Huang,et al.  Unity: secure and durable personal cloud storage , 2012, CCSW '12.

[14]  Audu Jonathan Adoga,et al.  Criteria for Choosing An Effective Cloud Storage Provider , 2014 .

[15]  Yonggang Wen,et al.  Towards end-to-end secure content storage and delivery with public cloud , 2012, CODASPY '12.

[16]  A. Rama Mohan Reddy,et al.  Investigational Analysis of Security Measures Effectiveness in Cloud Computing: A Study , 2014 .