Quad-Sec: Preserving Privacy of Data in Cloud

Nowadays, the use of multimedia data gets in-creased day by day. Thus we are in need of larger and larger stor-age for these data, but the client devices often fail. So, we depend on cloud storage, but new security challenges arises in which the privacy of user's data is compromised. In this paper, we propose a secure framework for outsourced privacy-preserving storage by introducing Quad-Sec; which enables secure data transfer, sharing and storage in the cloud while preserving privacy against cloud administrators and external hackers. The Quad-Sec is a file encryption scheme which performs double encryption on each file that is to be outsourced. 3-DES and AES are the two encryption techniques used. Low complexity and easy implementation make the proposed method widely applicable safeguard in the cloud computing.

[1]  Muthucumaru Maheswaran,et al.  Privacy and Security Requirements of Data Intensive Computing in Clouds , 2011 .

[2]  Muthucumaru Maheswaran,et al.  Privacy aware image template matching in clouds using ambient data , 2013, The Journal of Supercomputing.

[3]  Srinath T. V. Setty,et al.  Depot: Cloud Storage with Minimal Trust , 2010, TOCS.

[4]  João Leitão,et al.  Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories , 2019, IEEE Transactions on Cloud Computing.

[5]  Subhajyoti Bandyopadhyay,et al.  Cloud Computing - The Business Perspective , 2011, 2011 44th Hawaii International Conference on System Sciences.

[6]  James Ze Wang,et al.  SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[7]  Mark Ryan,et al.  Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..

[8]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[9]  Divyakant Agrawal,et al.  Big data and cloud computing: current state and future opportunities , 2011, EDBT/ICDT '11.

[10]  Christian Cachin,et al.  Don't trust the cloud, verify: integrity and consistency for cloud object stores , 2015, SYSTOR.

[11]  Cong Wang,et al.  Enabling Privacy-Preserving Image-Centric Social Discovery , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.

[12]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[13]  Laurent Amsaleg,et al.  A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval , 2015, IEEE Transactions on Information Forensics and Security.

[14]  C. Arun,et al.  Survey on interoperability, security, trust, privacy standardization of cloud computing , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[15]  Idit Keidar,et al.  Venus: verification for untrusted cloud storage , 2010, CCSW '10.

[16]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.

[17]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[18]  Craig Gentry,et al.  Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..

[19]  Nazrul Islam,et al.  Multimedia content security with random key generation approach in cloud computing , 2017, 2017 IEEE International Conference on Imaging, Vision & Pattern Recognition (icIVPR).

[20]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[21]  Won Kim,et al.  Cloud Computing: Today and Tomorrow , 2009, J. Object Technol..

[22]  João Leitão,et al.  Privacy-Preserving Content-Based Image Retrieval in the Cloud , 2014, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS).