A Framework for Data Storage Security in Cloud

Cloud computing is the growing computing model and highly demandable technology which provide the digital services through Internet. Cloud has huge virtual storage where many users store their data. So selection of efficient and secure server from data centers is important for storing the data to achieve the availability and security. Security of data from unauthorized access is also mandatory. Cryptographic techniques are also used to protect the data by storing it in encrypted form on cloud. Many cryptographic algorithms which are based on attributes, prediction, and identity can be deficient to some level from various security attacks. So there is requirement to develop protected data storage frameworks which ensure the security of data. This proposed work presented security framework for cloud storage, based on metaheuristic approach “modified cuckoo algorithm” for server selection, three-stage authentication, ECC for confidentiality, and CMA-ES for cipher text optimization. The proposed model ensures the availability, authentication, confidentiality, and security of the data while accessing to cloud.

[1]  Jie Ling,et al.  Simple and effective one-time password authentication scheme , 2013, 2013 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation (IMSNA).

[2]  C. Shoba Bindu,et al.  Click based Graphical CAPTCHA to thwart spyware attack , 2015, 2015 IEEE International Advance Computing Conference (IACC).

[3]  Darren Robinson,et al.  A hybrid CMA-ES and HDE optimisation algorithm with application to solar energy potential , 2009, Appl. Soft Comput..

[4]  Madjid Merabti,et al.  An access control model for cloud computing , 2014, J. Inf. Secur. Appl..

[5]  Navneet Kaur,et al.  Analytical review of three latest nature inspired algorithms for scheduling in clouds , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).

[6]  Khumanthem Manglem Singh,et al.  Implementation of Text Encryption using Elliptic Curve Cryptography , 2015 .

[7]  Shafii Muhammad Abdulhamid,et al.  Resource scheduling for infrastructure as a service (IaaS) in cloud computing: Challenges and opportunities , 2016, J. Netw. Comput. Appl..

[8]  Osama S. Farag Allah,et al.  Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images , 2007 .

[9]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[10]  Kakali Chatterjee,et al.  Cloud security issues and challenges: A survey , 2017, J. Netw. Comput. Appl..

[11]  Max Mühlhäuser,et al.  Trust as a facilitator in cloud computing: a survey , 2012, Journal of Cloud Computing: Advances, Systems and Applications.

[12]  Shahriar Lotfi,et al.  Modified cuckoo optimization algorithm (MCOA) to solve graph coloring problem , 2015, Appl. Soft Comput..

[13]  Rohitash Kumar Banyal,et al.  Multi-factor Authentication Framework for Cloud Computing , 2013, 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation.

[14]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.