ENHANCING DATA SECURITY USING ENCRYPTION AND SPLITTING TECHNIQUE OVER MULTI-CLOUD ENVIRONMENT (original) (raw)
Abstract
Now days cloud computing become one of the main topic of IT and main point is cloud data storage security. Cloud computing is the fastest growing technology. This technology provides access to many different applications. Cloud computing is used as data storage so data security and privacy issues such as confidentiality, availability and integrity are important factor associated with it. Cloud storage provides user to access remotely store their data so it becomes necessary to protect data from unauthorized access, hackers or any type of modification and malicious behavior. Security is an important concern. The meaning of data storage security is to secure data on storage media. Cloud storage does not require any hardware and software management. it provide high quality applications. As we proposed the concept of cloud data storage security strategy capable to overcome the shortcomings of traditional data protection algorithms and improving security using steganography, encryption decryption techniques, compression and splitting technique adoptable to better security for the cloud. We have developed a desktop application through which user can share data. This paper enhanced advance security goal for cloud data storage. The boom in cloud computing over the past few years has led to a situation that is common to many innovations and new technologies: many have heard of it, but far fewer actually understand what it is and, more importantly, how it can benefit them. This whitepaper will attempt to clarify these issues by offering a comprehensive definition of cloud computing, and the business benefits it can bring. Security challenges are still amongst the biggest obstacles when considering the adoption of cloud services. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. Alongside with these security issues the cloud paradigm comes with a new set of unique features which open the path towards novel security approaches, techniques and architectures. This paper provides a survey on the achievable security merits by making use of multiple distinct clouds simultaneously. Various distinct architectures are introduced and discussed according to their security and privacy capabilities and prospects. Cloud computing offers dynamically scalable resources provisioned as a service over the Internet. The third-party, on-demand, self-service, pay-per-use and seamlessly scalable computing resources and services offered by the cloud paradigm promise to reduce capital as well as operational expenditures for hardware and software. Cloud computing has been intended as the next generation paradigm in information Technology. From this cloud computing environment, both resources and applications are provided through the Internet as a service on demand. Cloud environment is comprised of software and hardware resources in the data centers that run different services over the internet or network to satisfy the user's needs and it depends on sharing resources instead of having local servers to handle application for a certain individual or organization [1] [2]. Since there is no infrastructure investment requires, shrink or expand the resources based on on-demand and the payment based on usage, it becomes popular among different technology aspects. The numerous cloud enterprise system looks for these advantages to be used in various applications. The service of the cloud makes it possible to access the data at anytime from anywhere. Cloud computing utilize the networks of a huge group of servers naturally brings a low
Figures (7)
Cloud computing can be separated into two subsections such as the cloud and the user. In most scenarios, th individual user is connected to the cloud environment through the internet. This process is also possible for a organization to connect the private cloud via the internet. Therefore, both subsections are alike other than th utilization of the public and private cloud or the network [3] [4]. The cloud computing has the normal function such as, the user requests to the cloud and the cloud response to the user [5]. The elasticity and multi-tenancy ar two key features of the cloud environment (i.e.) sharing the same service instance, among the various tenants an elasticity enables a service based on the present cloud service demand. Characteristics of this service is to improv the service availability and resource utilization. Cloud services are divided into three service models such a Infrastructure-as-a-service (IaaS), Platform-as-a-service (PaaS), Software-as-a-service (SaaS). Each service ha various implementations as shown in Figure 1, which complicates progress of standard security model for eac cloud service. Usually, make sure that monolithic system track across various PCs means splitting the file into distinct client and server modules. In such schemes, the client module controlled the user interface and the server provided back-end handling, such as record entrance, printing, and so on. As computers proliferated, dropped in cost, and became connected by ever-higher bandwidth networks, splitting software systems into multiple components became more convenient, with each component running on a different computer and performing a specialized function. This approach simplified development, management, administration, and often improved performance and robustness, since failure in one computer did not necessarily disable the entire system.
File content splitting: - This module used for splitting the content of file. It takes the file as it''s input. By using the user defined function it split the content of file in several parts is the output of this module. File split uses the open function is to open the file and file is divide into several parts using floor function. It also needs number of parts to be dividing as specified in program.
Table 1 shows the different types of cloud security category and the table 2 show the different types of Cloud Security Issues and Classifications Table -2: Cloud Security Issues and Classifications
REASERCH METHODOLOGY AND IMPLEMETATION METHOD Development Phases: Step 1: Registration Module
5.9 Encryption The algorithm uses the password to encrypt the file with a unique number that creates the unique encrypted file. The same password is use to decrypt the file thus enabling maximum security of the file. Let us now see the algorithm in detail.
Figure 4: Split-file -key pair algorithm —Decryption
Key takeaways
AI
- The paper proposes enhanced security strategies for cloud data storage using encryption and file splitting techniques.
- It addresses significant cloud computing security challenges, focusing on confidentiality, integrity, and availability.
- Multi-cloud environments leverage distinct architectures to improve security and privacy capabilities.
- The application developed allows secure data sharing through effective encryption and access controls.
- Cloud computing offers scalable resources but introduces unique security vulnerabilities that must be managed.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
References (16)
- L. Grandinetti, O. Pisacane, M. Sheikhalishahi, "Pervasive Cloud Computing Technologies: Future Outlooks and Interdisciplinary Perspectives", IGI Publication, Advances in Systems Analysis, Software Engineering, and High Performance Computing, ISBN-13: 978-1466646834, 2013
- G.R. Vijay, A.R.M. Reddy, "Investigational Analysis of Security Measures Effectiveness in Cloud Computing: A Study", Computer Engineering and Intelligent Systems, Vol.5, No.7, 2014.
- P. Mell, T. Grance, "The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology", Special Publication, pp. 800-145, 2011.
- A. J. Adoga, G. M. Rabiu, A. A. Audu, "Criteria for Choosing An Effective Cloud Storage Provider", International Journal of Computational Engineering Research, Vol.04, Iss.2, 2014
- R.A. Popa., J.R. Lorch., D. Molnar., H.J. Wang., and L. Zhuang., "Enabling Security in Cloud Storage SLAs with Cloud Proof", In USENIX Annual Technical Conference, Vol. 242, 2011.
- Y. Tang., P.P.C Lee., J.C.S Lui., and R. Perlman., "FADE: Secure overlay cloud storage with file assured deletion", In Security and Privacy in Communication Networks, Springer Berlin Heidelberg, pp. 380-397, 2010.
- W. Ren., L. Yu., R. Gao., F. Xiong., "Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mobile Cloud Computing", TSINGHUA Science and Technology, Vol. 16, No. 5, pp. 520-528, 2011.
- X. Dong., R. Li., H. He., W. Zhou., Z. Xue., and H. Wu., "Secure Sensitive Data Sharing on a Big Data Platform", TSINGHUA Science and Technology, Vol. 20, No. 1, pp. 72-80, 2015.
- A. Bessani., M. Correia., B. Quaresma., F. Andre, and P. Sousa., "DepSky: dependable and secure storage in a cloud-of-clouds", ACM Transactions on Storage (TOS), Vol. 9, No. 4, 2013.
- J. Stanek., A. Sorniotti., E. Androulaki., and L. Kencl., "A secure data deduplication scheme for cloud storage", In Financial Cryptography and Data Security Springer Berlin Heidelberg, pp. 99-118, 2014.
- B.H. Kim., W. Huang., and D. Lie., "Unity: secure and durable personal cloud storage", In Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, pp. 31-36, 2012.
- N. Cao., S. Yu., Z. Yang., W. Lou., and Y. T. Hou., "Lt codesbased secure and reliable cloud storage service", In INFOCOM, Proceedings IEEE, pp. 693-701, 2012.
- S.Murthy., "Cryptographic Secure Cloud Storage Model with Anonymous Authentication and Automatic File Recovery", ICTACT Journal on Soft Computing, Vol. 5, No. 1, 2014.
- H. Xiong., X. Zhang., D. Yao., X. Wu., and Y. Wen., "Towards end-to-end secure content storage and delivery with public cloud", In Proceedings of the second ACM conference on Data and Application Security and Privacy, pp. 257-266, 2012.
- P. Gasti., G. Ateniese., and M. Blanton., "Deniable cloud storage: sharing files via public-key deniability", In Proceedings of the 9 th annual ACM workshop on Privacy in the electronic society, ACM, pp. 31-42, 2010.
- S. Kamara., C. Papamanthou., and T.Roeder, "Cs2: A searchable cryptographic cloud storage system", Microsoft Research, Tech Report MSR-TR, Vol.58, 2011.