CloudJS: novel cloud-based design framework for text-file encryption

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Rhea Gupta ◽  
Sara Dharadhar ◽  
Prathamesh Churi

Purpose Cloud computing is becoming increasingly popular as it facilitates convenient, ubiquitous, on-demand network access to a shared pool of configurable computing resources and applications that can be quickly retrieved and released. Despite its numerous merits, it faces setbacks in data security and privacy. Data encryption is one of the most popular solutions for data security in the cloud. Various encryption algorithms have been implemented to address security concerns. These algorithms have been reviewed along with the Jumbling Salting algorithm and its applications. The framework for using Jumbling Salting to encrypt text files in the cloud environment (CloudJS) has been thoroughly studied and improvised. The purpose of this paper is to implement the CloudJS algorithm, to discuss its performance and compare the obtained results with existing cloud encryption schemes. Design/methodology/approach The paper uses six research questions to analyze the performance of CloudJS algorithm in the cloud environment. The research questions are about measuring encryption time and throughput, decryption time and throughput, the ratio of cipher to the plain text of CloudJS algorithm with respect to other Cloud algorithms like AES and DES. For this purpose, the algorithm has been implemented using dockers-containers in the Linux environment. Findings It was found that CloudJS performs well in terms of encryption time, decryption time and throughput. It is marginally better than AES and undoubtedly better than DES in these parameters. The performance of the algorithm is not affected by a number of CPU cores, RAM size and Line size of text files. It performs decently well in all scenarios and all resultant values fall in the desired range. Research limitations/implications CloudJS can be tested with cloud simulation platforms (CloudSim) and cloud service providers (AWS, Google Cloud). It can also be tested with other file types. In the future, CloudJS algorithm can also be implemented in images and other files. Originality/value To the best of the knowledge, this is the first attempt to implement and analysis of a custom encryption algorithm (CloudJS) in the cloud environment using dockers-containers.

2014 ◽  
Vol 701-702 ◽  
pp. 1106-1111 ◽  
Author(s):  
Xin Zheng Zhang ◽  
Ya Juan Zhang

As information and processes are migrating to the cloud, Cloud Computing is drastically changing IT professionals’ working environment. Cloud Computing solves many problems of conventional computing. However, the new technology has also created new challenges such as data security, data ownership and trans-code data storage. We discussed about Cloud computing security issues, mechanism, challenges that Cloud service providers and consumers face during Cloud engineering. Based on concerning of security issues and challenges, we proposed several encryption algorithms to make cloud data secure and invulnerable. We made comparisons among DES, AES, RSA and ECC algorithms to find combinatorial optimization solutions, which fit Cloud environment well for making cloud data secure and not to be hacked by attackers.


2020 ◽  
Vol 8 (5) ◽  
pp. 1627-1631

Confidentiality, Privacy and Protection of data (CPPD) are the major challenges in the cloud environment for cloud users such as industrials and organizations. Hence major companies are loath to migrate to cloud and also still using the private cloud because of lock in CPPD of cloud. Cloud Service Providers (CSP) are unable to elucidate strength of the storage and services due to lack of data security. To solve the above issue, we trust, algorithms are not the only solution for data security. In this regards, we suggest to change the architecture and develop a new mechanisms. In this paper, we are proposed two thinks. First is move to single cloud architecture to multiple cloud architecture and second is develop an innovative algorithm. And one more think also considered and proposed an inimitable mechanism to use an innovative algorithm in the multi cloud architecture for improving CPPD.


2020 ◽  
Vol 17 (9) ◽  
pp. 4070-4074
Author(s):  
H. M. Nishkala ◽  
S. H. Anu ◽  
D. A. Bindushree ◽  
S. L. Manoj

Cloud Computing is a boon to the field of information and technology. The two major elements of client worries are Data security and Privacy Protection. Data may be revised and improved when client stores the information in the cloud so there might be danger of data loss. Therefore client information is moved to the data hub which cannot be controlled by the clients. Hence high safety efforts are required to secure data inside the cloud. Here data is divided into fragments and they are converted into encrypted file. This encrypted file is issued to arbitrarily chosen cloud service providers by the cloud data owners. Even after the successful attack, attackers do not get the meaning full information. If cloud data clients access to get any document that relating to encrypted file is regenerated from the fragments and clients must download it. When the applicant coordinates the strategy with the original details, then only file can be decoded. Therefore it demonstrates that prospective strategy improves the data integrity and confidentiality.


2015 ◽  
Vol 15 (1) ◽  
pp. 46-54
Author(s):  
K. Govinda ◽  
E. Sathiyamoorthy

Abstract Cloud computing has become a victorious archetype for data storage, as well as for computation purposes. Greater than ever it concerns user’s privacy, so that data security in a cloud is increasing day by day. Ensuring security and privacy for data organization and query dispensation in the cloud is important for superior and extended uses of cloud based technologies. Cloud users can barely have the full benefits of cloud computing if we can ensure the real user’s privacy and his data security concerns this approach along with storing thin-skinned personal information in databases and software spread around the cloud. There are numerous service suppliers in WWW (World Wide Web), who can supply each service as a cloud. These cloud services will switch over data with a supplementary cloud, so that when the data is exchanged between the clouds, the problem of confidentiality revelation exists. So the privacy revelation problem concerning a person or a corporation is unavoidably open when releasing or data distributing in the cloud service. Confidentiality is a significant issue in any cloud computing environment. In this paper we propose and implement a mechanism to maintain privacy and secure data storage for group members or a community in cloud environment.


Present days, huge amount of data stored with cloud service providers. The Third- party auditors (TPAs), with support of cryptography, are frequently utilized to prove this data. Auditing will be capability for cloud clients to prove the existence &functioning of their supplier's security measures. Authentication is done by using username and password. The important point in authentication is to protect data from the access of unauthorized people. The proposed scheme is Enhanced RSA (ERSA) Algorithm. This paper presents solution to enhance the security and privacy to stored data in cloud. Result demonstrates that this scheme can progress the security of data that stored in cloud


Symmetry ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 563
Author(s):  
Babu Rajendiran ◽  
Jayashree Kanniappan

Nowadays, many business organizations are operating on the cloud environment in order to diminish their operating costs and to select the best service from many cloud providers. The increasing number of Cloud Services available on the market encourages the cloud consumer to be conscious in selecting the most apt Cloud Service Provider that satisfies functionality, as well as QoS parameters. Many disciplines of computer-based applications use standardized ontology to represent information in their fields that indicate the necessity of an ontology-based representation. The proposed generic model can help service consumers to identify QoS parameters interrelations in the cloud services selection ontology during run-time, and for service providers to enhance their business by interpreting the various relations. The ontology has been developed using the intended attributes of QoS from various service providers. A generic model has been developed and it is tested with the developed ontology.


Symmetry ◽  
2021 ◽  
Vol 13 (2) ◽  
pp. 317
Author(s):  
Chithambaramani Ramalingam ◽  
Prakash Mohan

The increasing demand for cloud computing has shifted business toward a huge demand for cloud services, which offer platform, software, and infrastructure for the day-to-day use of cloud consumers. Numerous new cloud service providers have been introduced to the market with unique features that assist service developers collaborate and migrate services among multiple cloud service providers to address the varying requirements of cloud consumers. Many interfaces and proprietary application programming interfaces (API) are available for migration and collaboration services among cloud providers, but lack standardization efforts. The target of the research work was to summarize the issues involved in semantic cloud portability and interoperability in the multi-cloud environment and define the standardization effort imminently needed for migrating and collaborating services in the multi-cloud environment.


2016 ◽  
Vol 14 (2) ◽  
pp. 152-166 ◽  
Author(s):  
Joanne E. McNeish ◽  
Anthony Francescucci ◽  
Ummaha Hazra

Purpose The next phase of hardware technology development is focused on alternative ways to manage and store consumers’ personal content. However, even consumers who have adopted Cloud-based services have demonstrated a reluctance to move all of their personal content into the Cloud and continue to resist giving up local hard drives. This paper aims to investigate the characteristics of local hard drives and the Cloud that lead to simultaneous use. Design/methodology/approach This paper uses content analysis of online comments and ten depth interviews with simultaneous users of local hard drives and the Cloud. Findings Three factors influence the resistance to giving up local hard drives. Simultaneous users utilize local hard drives as a redundancy system and as a way to ensure the permanence of their digital content. They are unsure of the Cloud’s ability to support their content creation, management and storage activities (task-technology fit). Research limitations/implications Study findings are based on qualitative methods and thus the results cannot be considered conclusive. Practical implications The authors speculate that it is unlikely that Cloud-only will fully replace hard drives until these factors are understood and addressed by information technology developers. Cloud service providers may not be aware of how little that users understand the Cloud. In contrast to their certainty and confidence in local hard drives, simultaneous users are confused as to what the Cloud is and how it functions. This uncertainty exacerbates their risk perception and need for control. Originality/value This is the first study exploring simultaneous use of local hard drives and the Cloud with a view to understanding this behaviour in terms of the relative advantage of the incumbent technology over the new technology.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Qinlong Huang ◽  
Yue He ◽  
Wei Yue ◽  
Yixian Yang

Data collaboration in cloud computing is more and more popular nowadays, and proxy deployment schemes are employed to realize cross-cloud data collaboration. However, data security and privacy are the most serious issues that would raise great concerns from users when they adopt cloud systems to handle data collaboration. Different cryptographic techniques are deployed in different cloud service providers, which makes cross-cloud data collaboration to be a deeper challenge. In this paper, we propose an adaptive secure cross-cloud data collaboration scheme with identity-based cryptography (IBC) and proxy re-encryption (PRE) techniques. We first present a secure cross-cloud data collaboration framework, which protects data confidentiality with IBC technique and transfers the collaborated data in an encrypted form by deploying a proxy close to the clouds. We then provide an adaptive conditional PRE protocol with the designed full identity-based broadcast conditional PRE algorithm, which can achieve flexible and conditional data re-encryption among ciphertexts encrypted in identity-based encryption manner and ciphertexts encrypted in identity-based broadcast encryption manner. The extensive analysis and experimental evaluations demonstrate the well security and performance of our scheme, which meets the secure data collaboration requirements in cross-cloud scenarios.


Sign in / Sign up

Export Citation Format

Share Document