Information Systems: Secure Access and Storage in the Age of Cloud Computing

Given that cloud computing is a remotely accessed service, the connection between provider and customer needs to be adequately protected against all known security risks. In order to ensure this, an open and clear specification of all standards, algorithms and security protocols adopted by the cloud provider is required. In this paper, we review current issues concerned with security threats to cloud computing and present a solution based on our unique patented compression-encryption method. The method provides highly efficient data compression where a unique symmetric key is generated as part of the compression process and is dependent on the characteristics of the data. Without the key, the data cannot be decompressed. We focus on threat prevention by cryptography that, if properly implemented, is virtually impossible to break directly. Our security by design is based on two principles: first, defence in depth, where our proposed design is such that more than one subsystem needs to be violated to get both the data and their key. Second, the principle of least privilege, where the attacker may gain access to only part of a system. The paper highlights the benefits of the solution that include high compression ratios, less bandwidth requirements, faster data transmission and response times, less storage space, and less energy consumption among others.

[1]  Natarajan Ahmed DISCRETE COSINE TRANSFORMS , 2009 .

[2]  M. Rodrigues,et al.  Applied sequential-search algorithm for compression-encryption of high-resolution structured light 3D data , 2015 .

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Mohammed M. Siddeq,et al.  A Novel 2D Image Compression Algorithm Based on Two Levels DWT and DCT Transforms with Enhanced Minimize-Matrix-Size Algorithm for High Resolution Structured Light 3D Surface Reconstruction , 2015 .

[5]  Mohammed M. Siddeq,et al.  Novel 3D Compression Methods for Geometry, Connectivity and Texture , 2016 .

[6]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[7]  Mohammed M. Siddeq,et al.  A Novel Image Compression Algorithm for High Resolution 3D Reconstruction , 2014 .

[8]  Nicolas Sklavos,et al.  Design Techniques and Implementation of Low Power High-Throughput Discrete Wavelet Transform Tilters for JPEG 2000 Standard , 2008 .

[9]  P. Yip,et al.  Discrete Cosine Transform: Algorithms, Advantages, Applications , 1990 .

[10]  Mohammed M. Siddeq,et al.  A new 2D image compression technique for 3D surface reconstruction , 2014 .

[11]  G. Blelloch Introduction to Data Compression * , 2022 .

[12]  A. Khashman,et al.  Image compression using neural networks and haar wavelet , 2008 .

[13]  Ping-Sing Tsai,et al.  JPEG2000 Standard for Image Compression: Concepts, Algorithms and VLSI Architectures , 2004 .

[14]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[15]  Ananda Babu,et al.  PERFORMANCE ANALYSIS OF IMAGE CODING USING WAVELETS , 2008 .

[16]  N. Ahmed,et al.  Discrete Cosine Transform , 1996 .

[17]  Khalid Sayood,et al.  Introduction to data compression (2nd ed.) , 2000 .

[18]  Wilhelm Burger,et al.  Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.

[19]  Iain E. G. Richardson,et al.  Video CODEC Design , 2002 .

[20]  Michel Barlaud,et al.  Image coding using wavelet transform , 1992, IEEE Trans. Image Process..