Fingerprinting Based Recursive Information Hiding Strategy in Cloud Computing Environment (original) (raw)

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds

Sensors

With the emerging growth of digital data in information systems, technology faces the challenge of knowledge prevention, ownership rights protection, security, and privacy measurement of valuable and sensitive data. On-demand availability of various data as services in a shared and automated environment has become a reality with the advent of cloud computing. The digital fingerprinting technique has been adopted as an effective solution to protect the copyright and privacy of digital properties from illegal distribution and identification of malicious traitors over the cloud. Furthermore, it is used to trace the unauthorized distribution and the user of multimedia content distributed through the cloud. In this paper, we propose a novel fingerprinting technique for the cloud environment to protect numeric attributes in relational databases for digital privacy management. The proposed solution with the novel fingerprinting scheme is robust and efficient. It can address challenges such...

Review Paper on Preserving Confidentiality of Data in Cloud Using Dynamic Anonymization

2012

Cloud computing is a model that enables Convenient and Ondemand network access to a shared pool of configurable computing resources where millions of users share an infrastructure. Security and Privacy concerns are significant obstacle that is preventing the extensive adoption of the public cloud in the Industry. Multi-tenancy where multiple tenants share cloud infrastructure poses an additional concern about the deliberate or accidental exposure of data. Data Anonymization makes data worthless to anyone except the owner of the data. It is one of the methods for transforming the data in such a way that it prevents identification of key information from an unauthorized person. Data can also be anonymized by using techniques such as, Hashing, Hiding, and Shifting etc. The proposed system uses novel model of security i.e k-anonymity to improve data anonymization. It uses dynamic anonymization technique, key distribution mechanism to preserve confidentiality of cloud data.This paper giv...

Secure and Multi Copy Dynamic Information Possession in Cloud System

International Journal of Recent Technology and Engineering, 2020

Smart cities are implementation of information and communication technologies. These are developing based on institutional, physical, social and economic infrastructure. Every data is organized in a secure manner in these planned cities. Client’s data is stored in Cloud servers Cloud Computing is that the net based mostly model, that permits the convenient on demand resources. More organisations are surging towards the cloud for outsourcing their sensitive data. Cloud Service Provider (CSP) can charge the client data based on their storage in the cloud server by paying fee, metered in Gigabytes/Month. For the scalability, availability and accessibility purpose, some customers want their data to be replicated in the multiple servers at the distinctive Data centers. If the customers want to store more copies of data in server, they have to pay more charges so it needs strong guarantee on CSP, that it stores all the data copies on the service contract agreement. This paper centers on a...

ENHANCING DATA SECURITY USING ENCRYPTION AND SPLITTING TECHNIQUE OVER MULTI-CLOUD ENVIRONMENT

Now days cloud computing become one of the main topic of IT and main point is cloud data storage security. Cloud computing is the fastest growing technology. This technology provides access to many different applications. Cloud computing is used as data storage so data security and privacy issues such as confidentiality, availability and integrity are important factor associated with it. Cloud storage provides user to access remotely store their data so it becomes necessary to protect data from unauthorized access, hackers or any type of modification and malicious behavior. Security is an important concern. The meaning of data storage security is to secure data on storage media. Cloud storage does not require any hardware and software management. it provide high quality applications. As we proposed the concept of cloud data storage security strategy capable to overcome the shortcomings of traditional data protection algorithms and improving security using steganography, encryption decryption techniques, compression and splitting technique adoptable to better security for the cloud. We have developed a desktop application through which user can share data. This paper enhanced advance security goal for cloud data storage. The boom in cloud computing over the past few years has led to a situation that is common to many innovations and new technologies: many have heard of it, but far fewer actually understand what it is and, more importantly, how it can benefit them. This whitepaper will attempt to clarify these issues by offering a comprehensive definition of cloud computing, and the business benefits it can bring. Security challenges are still amongst the biggest obstacles when considering the adoption of cloud services. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. Alongside with these security issues the cloud paradigm comes with a new set of unique features which open the path towards novel security approaches, techniques and architectures. This paper provides a survey on the achievable security merits by making use of multiple distinct clouds simultaneously. Various distinct architectures are introduced and discussed according to their security and privacy capabilities and prospects. Cloud computing offers dynamically scalable resources provisioned as a service over the Internet. The third-party, on-demand, self-service, pay-per-use and seamlessly scalable computing resources and services offered by the cloud paradigm promise to reduce capital as well as operational expenditures for hardware and software. Cloud computing has been intended as the next generation paradigm in information Technology. From this cloud computing environment, both resources and applications are provided through the Internet as a service on demand. Cloud environment is comprised of software and hardware resources in the data centers that run different services over the internet or network to satisfy the user's needs and it depends on sharing resources instead of having local servers to handle application for a certain individual or organization [1] [2]. Since there is no infrastructure investment requires, shrink or expand the resources based on on-demand and the payment based on usage, it becomes popular among different technology aspects. The numerous cloud enterprise system looks for these advantages to be used in various applications. The service of the cloud makes it possible to access the data at anytime from anywhere. Cloud computing utilize the networks of a huge group of servers naturally brings a low

Secure Data Hiding in Cloud Computing

Cloud computing is very rapidly emerging as a technology trend that almost every industry, transmits information, such as pictures, videos, and text, can be transmitted rapidly on the internet. The MapReduce programming model can be used to process large-scale data sets in cloud environments. In this paper, we use the Hadoop system to build the cloud computing environment. By using data hiding technology to embed data into cover images. Thus, cloud computing provides a convenient platform and also decreases cost of the equipment required for processing large data.

IJERT-Data Sharing with Sensitive Information Hiding for Secure Cloud Storage

International Journal of Engineering Research and Technology (IJERT), 2019

https://www.ijert.org/data-sharing-with-sensitive-information-hiding-for-secure-cloud-storage https://www.ijert.org/research/data-sharing-with-sensitive-information-hiding-for-secure-cloud-storage-IJERTCONV7IS01028.pdf In cloud storage services, users store their data remotely to the cloud and realize the data sharing with others. In Electronic Health Records (EHRs) system, the cloud file might contain some sensitive information. The sensitive information should not be known to others when the cloud file is shared. Encrypting the whole shared file realizes the sensitive information hiding, but will make this shared file unable to be used by others. How to realize data sharing with sensitive information hiding in remote data integrity auditing still has not been explored up to now. In order to address this problem, this paper proposes a remote data integrity auditing scheme that realizes data sharing with sensitive information hiding. Thus, enabling public auditability for cloud storage is of critical importance so that users can resort to a third party auditor (TPA) to check the integrity of outsourced data and be worry-free. To securely introduce an effective TPA, the auditing process should bring in no new vulnerabilities towards user data privacy, and introduce no additional online burden to user. This paper proposes a secure cloud storage system supporting privacy-preserving public auditing and extend our result to enable the TPA to perform audits for multiple users simultaneously and efficiently. In addition, it articulates performance optimization mechanisms for this scheme, and in particular present an efficient method for selecting optimal parameter values to minimize the computation costs of clients and storage service providers. It shows that the solution introduces lower computation and communication overheads in comparison with non-cooperative approaches. Keywords-Auditing protocol, Cloud storage, Data sharing, TPA. I. INTRODUCTION Cloud computing is an attracting technology in the field of computer science. It is proven that cloud will bring changes to the IT industry. The cloud is changing our life by providing users with new types of services. Users get service from a cloud without paying attention to the details. Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. More and more people pay attention to cloud computing. Cloud computing is efficient and scalable but maintaining the stability of processing so many jobs in the cloud computing environment is a very complex problem with load balancing receiving much attention for researchers. In this paper, the following four architectural patterns are distinguished: A. Replication of applications allows to receive multiple results from one operation performed in distinct clouds and to compare them within the own premise. This enables the user to get an evidence on the integrity of the result. B. Partition of application System into tiers allows separating the logic from the data. This gives additional protection against data leakage due to flaws in the application logic. C. Partition of application logic into fragments allows distributing the application logic to distinct clouds. This has two benefits. First, no cloud provider learns the complete application logic. Second, no cloud provider learns the overall calculated result of the application. Thus, this leads to data and application confidentiality. D. Partition of application data into fragments allows distributing fine-grained fragments of the data to distinct clouds. None of the involved cloud providers gains access to all the data, which safeguards the data's confidentiality. Each of the introduced architectural patterns provides individual security merits, which map to different application scenarios and their security needs. Obviously, the patterns can be combined resulting in combined security merits, but also in higher deployment and runtime effort. The following sections present the four patterns in more detail and investigate their merits and flaws with respect to the stated security requirements under the assumption of one or more compromised cloud systems. The main objective of this paper is, • To set different trust level is set to different cloud providers and encryption/decryption is varied based on the clouds computational capability. • To take partial data of files from multiple mirror locations and send to selected client. • To reduce the risk for data and applications in a public cloud is the simultaneous usage of multiple clouds. • To handle Irrelevant size blocks of data among the multiple cloud service providers based on their computational capabilities. II. RELATED WORKS A. Thomas Ristenpart and Eran Tromer[1] The authors stated that third-party cloud computing represents the promise of outsourcing as applied to computation. Services, such as Microsoft's Azure and

A Secure Information Hiding Approach in Cloud Using LSB

2015

The continuous development of cloud computing is giving way to more cloud services, due to which security of cloud services, especially data privacy protection, becomes more critical. This research work explores the basic features of data mining techniques in cloud computing and securing the data. The status of the development of cloud computing security, the data privacy analysis, security auditing, data monitoring and other challenges that the cloud computing security faces have been explored. The recent researches on data protection regarding security and privacy issues in cloud computing have partially addressed some issues. The implementation of data mining techniques through cloud computing encourages the users to extract meaningful hidden predictive information from virtually integrated data warehouse that reduces the costs of storage and infrastructure.

An Approach to Data Confidentiality Protection in Cloud Environments

International Journal of Web Services Research, 2012

In current cloud computing systems, because users’ data is stored and processed by computing systems managed and operated by various service providers, users are concerned with the risks of unauthorized usage of their sensitive data by various entities, including service providers. The current cloud computing systems protect users’ data confidentiality from all entities, except service providers. In this paper, an approach is presented for improving the protection of users’ data confidentiality in cloud computing systems from all entities, including service providers. The authors’ approach has the following features: (1) separation of cloud application providers, data processing service providers and data storage providers, (2) anonymization of users’ identities, (3) grouping cloud application components and distributing their execution to distinct cloud infrastructures of data processing service providers, and (4) use of data obfuscation and cryptography for protecting the sensitiv...

Security and Privacy of Data in Cloud Computing

International Journal of Recent Technology and Engineering (IJRTE), 2019

The cloud computing paradigm is being used because there is no need to setup additional IT infrastructure such as hardware and software, its low up-front cost. Security and privacy of data is important in day to today life especially for applications that uses cloud computing such as social media. Customer information that is stored at Cloud is crucial that needs to be protected against potential intruders. There is threat to maintain the data in transit and data at cloud due to different possible attacks. Due to this there is growing need of privacy and security of data. In this paper, the privacy and issues, privacy preservation techniques are addressed. In addition to this, in order to protect the data, the secret sharing algorithm is implemented and analyzed. The shamir’s secret sharing (k,n) algorithm is used to split the data into n partial shares which can be distributed in cloud. The user collects at least k partial shares to reconstruct the complete data. It is observed tha...

DATA SECURITY TECHNIQUE IN CLOUD COMPUTING

Cloud computing is the delivery of computing services over the Internet. The platform of cloud computing gives peoples the opportunity of sharing and storing resources and information among the people across the globe. Most of organizations, individual and end users are making use of such online storage services to store their important information for the backup purpose. This new paradigm brings about many new security challenges. At present ensuring security in cloud computing platform has become one of the most significant concerns for the researchers. Many any new frameworks and technologies are used to preserve data that are stored in clouds. In this paper, a new data security scheme is developed for cloud computing platform. This scheme ensures data security in both the ways i.e., data storage security and data retrieval security. For data retrieval security, multi-level authorization technique is applied. Authenticity of user is done in 3 levels which includes registered key, one-time password (OTP) and image-based security mechanism. For data storage security, data partitioning is done along with the application of serialization concept. Both data retrieval security and data storage security provide a strong foundation that not only restricts the unauthorized user to access the data stored in cloud but also ensures the confidentiality and integrity of data. In the recent years, cloud computing has grown from a business concept to one of the fastest emerging sector in It industry to a basic need for people across the world. Cloud computing is everywhere. More and more people are, now days, depending on it. Cloud is the biggest buzz in the world of computers these days. The concept " cloud computing " is one of the most developing and evolving concept in the history of technological advancement. It provides resources, services and utilities to the user and stores their crucial data and information to make their life easier in this busy and hectic world. Due to cloud computing, we can utilize deployable and scalable resources within the confines of Internet. It uses system's hardware and software as computing requirement and provides services through the internet. Despite all these capabilities and potential advantages achieved from cloud computing, many organizations are still reluctant in adopting it due to the security and privacy issues associated with it. These issues hamper the growth of cloud computing. At present scenario, important data and documents are the only thing without which your life comes to a standstill and loosing such important data is no more than a horror experience! So, here the need of security and privacy of user's data rises. In cloud computing environment, all data or files of an individual stored in cloud are open to all. Thus, these data or file becomes more prone to attack. As a result, an intruder can easily access, misuse and destroy the data. The need of security becomes so vulnerable that now people and even though organizations look for security that cloud provider provides before they look for cloud services. There should be a strong security mechanism used by cloud service provider. The security mechanism should be strong enough to handle the basic concept of security i.e., integrity, confidentiality and authenticity. Any security mechanism covers these concept guarantees the security and privacy of user's data. Integrity ensures that the content of the data is not disturbed or changed by any intruder at all and originality of data is confirmed. Confidentiality ensures that the file or data is confidential and cannot be accessed by any unauthorized person. Only the authorized user can access or use it. Authenticity ensures that the person requesting for access is the one whom he claims to be and does not have any false identity. The users with false identity might act as an intruder. In this research paper, new security technique for cloud computing platform is proposed. Here, security is applied on both the sections i.e., while retrieving or accessing data from cloud called as data retrieval security and while storing data in cloud called as data storage security. It makes this security architecture stronger than ever. This proposed technique strictly follows the integrity and confidentiality of stored data as well as authenticity of users accessing cloud. Multi