Data Storage Security in Cloud Using a Functional Encryption Algorithm

Author(s):  
P. Vijaya Bharati ◽  
T. Sita Mahalakshmi
2019 ◽  
Vol 8 (2) ◽  
pp. 4152-4158

Many companies which essentially required cloud computing services are still in ambivalence whether to adopt it or not. In this research paper an attention has been drawn on security of storage as a Service which is an integral part of Infrastructure as a Service which provide famous CSP, AWS. Whenever someone rent the storage from the cloud service provider, chances of its compromising can take place. Therefore it is intelligence to encrypt the data before uploading it to the cloud and more intelligently divide the data into fragments and encrypt these fragments separately and then upload on cloud. Suppose that if this data is divided into n fragments then n algorithm are required to encrypt these fragments or use single one algorithm and change its key n times otherwise if only one key will be used and someone steal this key then all fragments will be decrypted with the same key. Many algorithms like DES, AES, RSA, Elgamal and Blow Fish are there but they all are static in nature and one more weakness of these algorithms is that size of encrypted file increased. While some researchers used these algorithms in combination and some used double encryption, nevertheless nature remains static and decrypted file size increase rapidly. Now, there is a requirement to design a data sensitive algorithm which could sense data and produce different key for different data automatically. In this paper Two Pass Multidimensional Key Generation and Encryption Algorithm has been proposed which will sort the above problem. Another beauty of this algorithm is that it checks the integrity of the documents while decrypting. Out of millions or billions of characters if only one character or word is altered or removed then this algorithm will show that documents integrity has been violated.


Author(s):  
Umesh Banodha ◽  
Praveen Kumar Kataria

Cloud is an emerging technology that stores the necessary data and electronic form of data is produced in gigantic quantity. It is vital to maintain the efficacy of this data the need of data recovery services is highly essential. Cloud computing is anticipated as the vital foundation for the creation of IT enterprise and it is an impeccable solution to move databases and application software to big data centers where managing data and services is not completely reliable. Our focus will be on the cloud data storage security which is a vital feature when it comes to giving quality service. It should also be noted that cloud environment comprises of extremely dynamic and heterogeneous environment and because of high scale physical data and resources, the failure of data centre nodes is completely normal.Therefore, cloud environment needs effective adaptive management of data replication to handle the indispensable characteristic of the cloud environment. Disaster recovery using cloud resources is an attractive approach and data replication strategy which attentively helps to choose the data files for replication and the strategy proposed tells dynamically about the number of replicas and effective data nodes for replication. Thus, the objective of future algorithm is useful to help users together the information from a remote location where network connectivity is absent and secondly to recover files in case it gets deleted or wrecked because of any reason. Even, time oriented problems are getting resolved so in less time recovery process is executed.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Bo Mi ◽  
Ping Long ◽  
Yang Liu ◽  
Fengtian Kuang

Data deduplication serves as an effective way to optimize the storage occupation and the bandwidth consumption over clouds. As for the security of deduplication mechanism, users’ privacy and accessibility are of utmost concern since data are outsourced. However, the functionality of redundancy removal and the indistinguishability of deduplication labels are naturally incompatible, which bring about a lot of threats on data security. Besides, the access control of sharing copies may lead to infringement on users’ attributes and cumbersome query overheads. To balance the usability with the confidentiality of deduplication labels and securely realize an elaborate access structure, a novel data deduplication scheme is proposed in this paper. Briefly speaking, we drew support from learning with errors (LWE) to make sure that the deduplication labels are only differentiable during the duplication check process. Instead of authority matching, the proof of ownership (PoW) is then implemented under the paradigm of inner production. Since the deduplication label is light-weighted and the inner production is easy to carry out, our scheme is more efficient in terms of computation and storage. Security analysis also indicated that the deduplication labels are distinguishable only for duplication check, and the probability of falsifying a valid ownership is negligible.


Author(s):  
Haya Altuwaijri ◽  
Sanaa Ghouzali

2013 ◽  
Vol 70 (24) ◽  
pp. 33-37 ◽  
Author(s):  
Navdeep Aggarwal ◽  
Parshant Tyagi ◽  
Bhanu P. Dubey ◽  
Emmanuel S. Pilli

2020 ◽  
Vol 8 (6) ◽  
pp. 5643-5646

Since last decade, the exponential growth of the internet users and the size of data over the internet is increasing day by day, which lead to increase the complexity of the systems by implementing policies and security to avoid attacks on systems and networks. It is very important to understand and analyses the real time data traffic of the communication systems. The purpose of this paper to design a customized Java based application which enables analysts to capture the traffic at the bottleneck under the mean field communication environment where a large number of devices are communicating with each other. The sending data for further processing for analysis the trend to overcome vulnerabilities or to manage the effectiveness of the communication systems. The proposed application enables to capture 8 different types of protocol traffic such as HTTP, HTTPS, SMTP, UDP, TCP, ICMP and POP3. The application allows for analysis of the incoming/outgoing traffic in the visual to understand the nature of communication networks which lead to improve the performance of the networks with respect to hardware, software, data storage, security and reliability.


2020 ◽  
Vol 76 (11) ◽  
pp. 8529-8547
Author(s):  
Yuntao Duan ◽  
Jiangdai Li ◽  
Gautam Srivastava ◽  
Jyh-Haw Yeh

Sign in / Sign up

Export Citation Format

Share Document