Secure Access of Folders and Files after Removal of Duplicacy over the Cloud

Full Text (PDF, 803KB), PP.48-60

Views: 0 Downloads: 0

Author(s)

Deepika Gautam 1,* Suvendir Rimer 2 Vipin Saxena 1

1. Department of Computer Science, Babasaheb Bhimrao Ambedkar University, Lucknow, 226025, India

2. Department of Electrical and Electronic Engineering Science, University of Johannesburg, South Africa

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2024.01.04

Received: 17 Apr. 2022 / Revised: 30 May 2022 / Accepted: 18 Jul. 2022 / Published: 8 Feb. 2024

Index Terms

Cloud Data Security, Encryption, Decryption, ElGamal Algorithm, Fuzzy Logic, Cryptography

Abstract

Cloud Computing has been the most popular approach of computing due to faster access to folders and files at a low cost. Hence, many organizations are shifting the old long database folders and files over the cloud which may be text, audio, video or in the other formats. Due to large size of the database with multiple storages of folders and files over the cloud, there may be chances of duplicate access of the database folders and files which may cause the loss of time of execution or accessing the database files. In the present work, a technique is developed to remove duplicate files in the form of .txt, .doc, .jpg, .pdf as well as duplicate folders after applying a well-known ElGamal algorithm later on converted as fuzzy ElGamal technique, for faster retrieval of files in a very secure manner. For this purpose, Unified Modelling Language (UML) model is developed which has been implemented through Python programming language. The computed results towards the model’s efficiency have been depicted through tables and graphs, on a large database in the form of folders and files of Indian railway reservation system. The present work is significant for the large organizations and also useful for the users working over the cloud for faster accessing of the folders and files.

Cite This Paper

Deepika Gautam, Suvendir Rimer, Vipin Saxena, "Secure Access of Folders and Files after Removal of Duplicacy over the Cloud", International Journal of Computer Network and Information Security(IJCNIS), Vol.16, No.1, pp.48-60, 2024. DOI:10.5815/ijcnis.2024.01.04

Reference

[1]Seungmin Kang, Bharadwaj Veeravalli and Khin Mi Mi Aung, “A security-aware data placement mechanism for big data cloud storage systems”, IEEE 2nd international conference on big data security on cloud (BigDataSecurity), IEEE international conference on high performance and smart computing (HPSC) and IEEE international conference on intelligent data and security (IDS), IEEE, 2016. DOI: 10.1109/BigDataSecurity-HPSC-IDS.2016.
[2]ShankarNayak Bhukya, Suresh Pabboju and K Venkatesh Sharma, “Data Security in Cloud Computing Outsourced Database”, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp.2458-2462.
[3]Daniya Rao, Deepak Painuli and Kamal Kant Verma, “Homomorphic Hybrid Encryption for Cloud Computing”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.5, No.5, pp.663-666, 2016.
[4]Arockia Panimalar.S, Subhashri.K, “Securing Outsourced Data on Cloud Using ElGamal Cryptosystem”. International Research Journal of Engineering and Technology (IRJET), Vol. 4, pp.53-56, 2016.
[5]Keke Gai, Meikang Qiu and Hui Zhao, “Security-Aware Efficient Mass Distributed Storage Approach for Cloud Systems in Big Data”, IEEE 2nd International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, IEEE International Conference on Intelligent Data and Security, pp.140-145, 2016. DOI: 10.1109/BigDataSecurity-HPSC-IDS.2016.68.
[6]Olugbenga W. Adejo, Isaiah Ewuzie, Abel Usoro, Thomas Connolly, "E-Learning to m-Learning: Framework for Data Protection and Security in Cloud Infrastructure", International Journal of Information Technology and Computer Science, Vol.10, No.4, pp.1-9, 2018.
[7]Preeti Soni, Rifaqat Ali, and Arup Kumar Pal, “A Two-factor based Remote User Authentication Scheme using ElGamal Cryptosystem”, IoTSec’17 July 10-14, 2017, Chennai, India. pp.1-6, 2017. DOI: https://doi.org/10.1145/3084030.3084031
[8]Tao Xiang, Xiaogua Li, Fei Chen, Yuanyuan Yang and Shengyu Zhang, “Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud”, J. Parallel Distrib. Comput. Vol.112, No.1, pp.97–107, 2017. DOI: https://doi.org/10.1016/j.jpdc.2017.10.004.
[9]M. Thangavel, and P. Varalakshmi, “Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud”. Cluster Computer, Vol. 21, pp.1411–1437, 2017. DOI: https://doi.org/10.1007/s10586-017-1368-4.
[10]D. Thiyagarajan, and G. R. Rao, “Ensuring Security for Data Storage in Cloud Computing using HECC- ElGamal Cryptosystem and GSO Optimization”, International Journal of Intelligent Engineering and Systems, Vol.10, No.5, pp.115-124, 2017.
[11]P. Ravi Kumar, P. Herbert Rajb, and P. Jelciana, “Exploring Data Security Issues and Solutions in Cloud Computing”. 6th International Conference on Smart Computing and Communications, ICSCC 2017, 7-8 December 2017, Kurukshetra, India. Procedia Computer Science (2018), Vol. 125, pp.691–697, 2017. DOI: https://doi.org/10.1016/j.procs.2017.12.089.
[12]Amjad Alsirhani, Peter Bodorik and Srinivas Sampalli. “Improving Database Security in Cloud Computing by Fragmentation of Data”, 2017 International Conference on Computer and Applications (ICCA), IEEE, pp.43-49, 2017, DOI: 10.1109/COMAPP.2017.8079737.
[13]Navdeep Kaur, and Heena Wadhwa, “Security Enhancement in Cloud Storage using ARIA and Elgamal Algorithms”, International Journal of Computer Applications, Vol. 171, No. 9, pp.19-23, 2017.
[14]Gagandeep Kaur, Mandeep Singh Devgan, "Data Deduplication Methods: A Review", International Journal of Information Technology and Computer Science, Vol.9, No.10, pp.29-36, 2017.
[15]Deepak Soni, Nishchol Mishra,"Multilevel Authentication based Data Security and Verification over Cloud Computing Environment", International Journal of Education and Management Engineering Vol.7, No.5, pp.56-68, 2017.
[16]M. Vedaraj, and Dr.M.Vigilson Prem, “A Hybrid Data Encryption Technique using two fish and Elgamal for cloud computing”, International Journal of Management, Technology and Engineering, Vol. 8, pp.1473-1478, 2018.
[17]Yenumula Reddy. Big Data Security in Cloud Environment, 4th IEEE International Conference on Big Data Security on Cloud. IEEE, pp.100-106, 2018.
[18]Alka Londhe, Vikrant Bhalerao, Suyog Ghodey, Sagar Kate, Niranjan Dandekar and Shubham Bhange, “Data Division and Replication Approach for Improving Security and Availability of Cloud Storage”, Fourth International Conference on Computing Communication Control and Automation, pp.1-4, 2018, DOI: 10.1109/ICCUBEA.2018.8697355.
[19]Dhuratë Hyseni, Artan Luma, Besnik Selimi, and Betim Cico, “The Proposed Model to Increase Security of Sensitive Data in Cloud Computing”, International Journal of Advanced Computer Science and Applications, Vol.9, No.2, pp.203-210, 2018.
[20]Youssef Gahi, Imane El Alaoui, “A Secure Multi-User Database-as-a-Service Approach for Cloud Computing Privacy”, International Workshop on Emerging Networks and Communications (IWENC 2019) November 4-7, 2019, Coimbra, Portugal, Procedia Computer Science, Vol.160, pp.811–818, 2018. DOI: https://doi.org/10.1016/j.procs.2019.11.006.
[21]Fatma Mallouli, Aya Hellal, Nahla Sharief Saeed, Fatimah Abdulraheem Alzahrani, “A Survey on Cryptography: comparative study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms”,6th IEEE International Conference on Cyber Security and Cloud Computing (CS Cloud) 2019, 5th IEEE International Conference on Edge Computing and Scalable Cloud, pp.173-176, 2019. DOI: 10.1109/CSCloud/EdgeCom.2019.00022.
[22]K. V. Pradeep, V. Vijayakumar, and V. Subramaniyaswamy, “An Efficient Framework for Sharing a File in a Secure Manner Using Asymmetric Key Distribution Management in Cloud Environment”, Journal of Computer Networks and Communications, Vol. 2019, pp.1-8, 2019. DOI: https://doi.org/10.1155/2019/9852472.
[23]S.Ramamoorthy, B. Baranidharan, “CloudBC - A Secure Cloud Data access Management system”, 3rd International Conference on and Communication Technologies, pp. 217-220, 2019. DOI: 10.1109/ICCCT2.2019.8824828.
[24]Abdelrhman Sayed Awad, Adil Yousif and Gada Kadoda, “Enhanced Model for Cloud Data Security based on Searchable Encryption and Hybrid Fragmentation”, International Conference on Computer, Control, Electrical and Electronics Engineering, pp.1-4, 2019. DOI: 10.1109/ICCCEEE46830.2019.9070918.
[25]Devi Thiyagarajan and Ganesan R. “Environmental Benefits of Enhanced Hecc - Elgamal Cryptosystem for Security in Cloud Data Storage Using Soft Computing Techniques”. Foundation Environmental Protection and Research-FEPR. Ekoloji, Vol. 28, No.107, pp.665-677, 2019.
[26]Kaushik Sekaran, G.Raja Vikram, B.V. Chowdary, "Design of Effective Security Architecture for Mobile Cloud Computing to Prevent DDoS Attacks", International Journal of Wireless and Microwave Technologies, Vol.9, No.1, pp. 43-51, 2019.
[27]Priteshkumar Prajapati, Parth Shah, “A Review on Secure Data Deduplication: Cloud Storage Security Issue”, Journal of King Saud University – Computer and Information Sciences, Vol.34, No.7, pp.1-12, 2020. DOI: https://doi.org/10.1016/j.jksuci.2020.10.021.
[28]Shailendra Kumar Tripathi, Bhupendra Gupta and K.K. Soundra Pandian, “An alternative practical public-key cryptosystems based on the Dependent RSA Discrete Logarithm Problems”, Expert Systems with Applications, Vol.164, pp.1-13, 2020. DOI: https://doi.org/10.1016/j.eswa.2020.114047.
[29]P. Hima Bindu, T. Bhaskar Reddy, “An Exploration of Security Issues for Cloud Computing”, Journal of Engineering Sciences, Vol. 11, No.1, pp.144-152. 2020.
[30]Kranthi Kumar Singamaneni and Sanyasi Naidu Pasala, “An improved dynamic polynomial integrity based QCP-ABE framework on Large cloud data security”, International Journal of Knowledge-based and Intelligent Engineering Systems Vol. 24, No.2, pp. 145-156, 2020. DOI: 10.3233/KES-200037.
[31]Siddavaram Srivalli, P. Vijaya Raghavulu, “Encrypted Negative Password Using ELGAMAL”, International Journal of Innovative Research in Technology, Vol.7, No.5, pp.117-123, 2020.
[32]Maya Mohan, M.K Kavithadevi and Jeevan Prakash V, “Improved ElGamal Cryptosystem for Secure Data Transfer in IoT Networks”. Proceedings of the Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud). IEEE XplorePartNumber: CFP20OSV-ART pp.295-303, 2020. DOI: 10.1109/I-SMAC49090.2020.9243407.
[33]Vaishnavi Moorthy, Revathi Venkataraman, T. Rama Rao, “Security and privacy attacks during data communication in Software Defined Mobile Clouds”, Computer Communications, Vol.153, pp.515–526. DOI: https://doi.org/10.1016/j.comcom.2020.02.030, 2020.
[34]Arfatul Mowla Shuvo, Md. Salauddin Amin and Promila Haque, “Storage Efficient Data Security Model for Distributed Cloud Storage”, IEEE 8th R10 Humanitarian Technology Conference (R10-HT) pp.1-6, 2020. DOI:10.1109/R10-HTC49770.2020.9356962.
[35]Rida Qayyum, Hina Ejaz, "Data Security in Mobile Cloud Computing: A State of the Art Review", International Journal of Modern Education and Computer Science, Vol.12, No.2, pp. 30-35, 2020.
[36]Fursan Thabit, Sharaf Alhomdy, Sudhir Jagtap Dr, “Security analysis and performance evaluation of a new lightweight cryptographic algorithm for cloud computing”, International Journal of Intelligent Networks Vol. 2, pp.18–33, 2021. DOI: https://doi.org/10.1016/j.gltp.2021.01.014.
[37]Sunitha Pachala, Ch. Rupa, and L. Sumalatha, “An improved security and privacy management system for data in multi cloud environments using a hybrid approach”, Evolutionary Intelligence, Vol.14, pp.1117-1133, 2021. DOI: https://doi.org/10.1007/s12065-020-00555-w.
[38]P. Zhang, H. Chi, J. Wang, and Y.F. Shang, “Data Security Protocol with Blind Factor in Cloud Environment”, MDPI, Vol.12, No.9, pp.1-14, 2021. DOI: https://doi.org/10.3390/info12090340.
[39]Fursan Thabit, Sharaf Alhomdy and Sudhir Jagtap, “A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions”, Global Transitions Proceedings, Vol.2, pp.18–33, 2021. DOI: https://doi.org/10.1016/j.ijin.2021.03.001.
[40]Amitesh Singh Rajput, Vishesh Kumar Tanwar and Balasubramanian Raman, “Z-Score-Based Secure Biomedical Model for Effective Skin Lesion Segmentation Over eHealth Cloud”, ACM Trans. Multimedia Comput. Commun. Appl., Vol.17, No.2, pp.1-19, 2021. DOI: https://doi.org/10.1145/3430806.