Distributed Authentication for Federated Clouds in Secure Cloud Data Storage

Objective: The main objective of our approach is to define federative cloud environment set up and define security considerations of each user independently in a multi-cloud data storage. Methods/Statistical Analysis: For secure data outsourcing in cloud data storage, we propose to use (KASE) Key Aggregate Searchable Encryption for aggregate key based data sharing in the cloud. But KASE is the single key based policy for data sharing in single cloud. We extend KASE to multi cloud storage with Reliable Reasoning Power (RRP) for protection of the federative cloud environment. Findings: By applying above two methods in cloud setup, we find two basic parameters as advantages, i.e. 1. Aggregate Key based data sharing in the cloud with efficient and reliable data security. 2. Data storage and security for single user in federative cloud environment. Applications/Improvement: Our proposed methodology achieves following applications when compare to conventional methodology (i.e. KASE) i.e., 1. With respect to time RRP performs effective file uploading when compare to KASE. 2. Security and Data storage in RRP is efficient (whenever we consider server performance).

[1]  Kouichi Sakurai,et al.  Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control , 2011, ICISC.

[2]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[3]  Cong Wang,et al.  Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..

[4]  Naranker Dulay,et al.  Shared and Searchable Encrypted Data for Untrusted Servers , 2008, DBSec.

[5]  Matei Ciobanu Morogan,et al.  Suggesting a Method to Improve Encryption Key Management in Wireless Sensor Networks , 2015 .

[6]  P. Hartel,et al.  Conjunctive Wildcard Search over Encrypted Data , 2011, Secure Data Management.

[7]  Ramalingam Sugumar,et al.  Symmetric Encryption Algorithm to Secure Outsourced Data in Public Cloud Storage , 2015 .

[8]  Tomi Reiman,et al.  A Survey on Cloud Computing Security Issues , 2013 .

[9]  Jin Li,et al.  Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud , 2012, NSS.

[10]  K. Venkataramana,et al.  A threshold secure data sharing scheme for federated clouds , 2012, ArXiv.

[11]  Liana L. Fong,et al.  Cloud federation in a layered service model , 2012, J. Comput. Syst. Sci..

[12]  Abdul Rahman Ramli,et al.  Implementation of a parallel XTS encryption mode of operation , 2014 .

[13]  B. Justus Rabi,et al.  Enhanced MixColumn Design for AES Encryption , 2015 .

[14]  Eric Pardede,et al.  Using Multi Shares for Ensuring Privacy in Database-as-a-Service , 2011, 2011 44th Hawaii International Conference on System Sciences.

[15]  Rajkumar Buyya,et al.  InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services , 2010, ICA3PP.

[16]  Lingyu Wang,et al.  Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage , 2016, IEEE Transactions on Computers.

[17]  Yi Lin,et al.  Ensure Data Security in Cloud Storage , 2011, 2011 International Conference on Network Computing and Information Security.

[18]  A. Umamakeswari,et al.  Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption , 2015 .

[19]  Mohammed Ali Hussain,et al.  Performance and Security Analysis for Image Encryption using Key Image , 2015 .