IJIEEB Vol. 9, No. 1, 8 Jan. 2017
Cover page and Table of Contents: PDF (size: 461KB)
Full Text (PDF, 461KB), PP.10-19
Views: 0 Downloads: 0
Encryption, Security, Access Control
Cloud computing acts as rising evolution in Information Technology (IT), boosting the delivery of services and eye-catching returns to its tenants enrolled at low costs of per usage basis. Cloud computing means “everywhere” and provides enormous available resources via internet with ensured quality. With the numerous profits involved, it clears the viewpoint of various businesses to invest in cloud services for accomplishment of their needs in the cloud habitat. Cloud enables computing resources in a service oriented flair instead of burden with lags in traditional setup of unified architecture. With delivery of cloud services occur many obstacles in the cloud to work securely without downfall in its performance. Security has always emerged as a long handed concern with its progression which affects its virtuous implementation. We commence with aspect of security based on parameters named Confidentiality (C), Integrity (I) and Granular Access (GA) and then sent over a secure channel via Secure File Transfer Protocol (SFTP) for secure storage with Elliptic Curve Cryptography (ECC) encryption laid on data. Secure Hash Algorithm (SHA) is used for hash value generation maintaining integrity. The authentication mechanism of secure Graphical One Time Password (GOTPass) provides high end to end security for retrieval process and boost security appliance for data. Data is divided into three security levels as per Secure Quality Index (SQI) generated and storage is isolated to have different security aspects. It provides supplemental controlled security and data protection as associated with the file. User is responsive to pass all security mechanisms to gain access.
Divesh Kumar, Amit Sharma, Surjan Singh, "Entity Based Distinctive Secure Storage and Control Enhancement in Cloud", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.9, No.1, pp.10-19, 2017. DOI:10.5815/ijieeb.2017.01.02
[1]Sabahi F, “Cloud Computing Security Threats and Responses,” in Proceedings of the 3rd International Conference on Communication Software and Networks, Azad University, Iran, 2011, pp 245-249.
[2]Dong X, Yu J, Luo Y, Chen Y, Xue G, and Li M, “Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing,” Computers & Security, vol. 42, pp. 151-164, 2013.
[3]Behl A, and Behl K, “An Analysis of Cloud Computing Security Issues,” in Proceedings of the World Congress on Information and Communication Technologies, Trivandrum, 2012, pp. 109– 114.
[4]Balasubramanian R, and Aramudhan M, “Security Issues: Public vs Private vs Hybrid Cloud Computing,” International Journal of Computer Applications, vol. 55, no. 13, pp. 35-41, 2012.
[5]Shaikh R, and Sasikumar M, “Data Classification for Achieving Security in Cloud Computing,” in Proceedings of the International Conference on Advanced Computing Technologies and Applications, Mumbai, India, vol. 45, 2015, pp 493-498.
[6]Ramanathan R, and Latha B, “Resource Optimization Based on Demand in Cloud Computing,” Research Journal of Applied Sciences, Engineering and Technology, vol. 8, no. 15, pp. 1724-1731, 2014.
[7]Tripathi A, and Yadav P, “Enhancing Security of Cloud Computing using Elliptic Curve Cryptography,” International Journal of Computer Applications, vol. 51, no. 1, pp. 26-30, 2012.
[8]Pawar P, “Public Auditability and Data Storage Security In Cloud Computing By Using RSASS And ECCSS,” International Journal of Advanced Research in Computer Engineering & Technology, vol. 3, no. 12, pp. 4272-4276, 2014.
[9]Krombholz K, Fruhwirt P, Kieseberg P, Kapsalis I, Huber M, and Weippl E, “QR Code Security: A Survey of Attacks and Challenges for Usable Security,” in Proceedings of the Second International Conference on Human Aspects of Information Security, Privacy and Trust, Crete, Greece, Vol 8533, 2014, pp. 79-90.
[10]Sood S K, “A combined approach to ensure data security in cloud computing,” Journal of Network and Computer Applications, vol. 35, no. 6, pp. 1831-1838, 2012.
[11]Kadam K, Paikrao R, and Pawar A, “Survey on Cloud Computing Security,” International Journal Of Emerging Technology and Advanced Engineering, vol. 3, no. 12, pp. 239-249, 2013.
[12]Albakri S H, Shanmgam B, Samy G N, Idris N B, and Ahmed A, “A Case Study for the Cloud Computing Security Threats in a Governmental Organization,” in Proceedings of the International Conference on Computer, Communication and Control Technology, Langkawi, Kedah, Malaysia, 2014, pp. 452-457.
[13]Kazim M, and Zhu S Y, “A Survey on top security threats in cloud computing,” International Journal of Advanced Computer Science and Applications, vol. 6, no. 3, pp. 109-113, 2015.
[14]Majhi S K, and Dhal S K, “A Study on Security Vulnerability on Cloud Platforms,” in Proceedings of the 1st International Conference on Information Security & Privacy, Nagpur, India, vol. 78, 2016, pp. 55-60.
[15]Bhosale P, Deshmukh P, Dimbar G, and Deshpande A, “Enhancing Data Security in Cloud Computing Using 3D Framework & Digital Signature with Encryption,” International Journal of Engineering Research & Technology, vol. 1, no. 8, pp. 1-8, 2012.
[16]Patil V T, and Chandel G S, “Implementation of TPA and Data Integrity in Cloud Computing using RSA Algorithm,” International Journal of Engineering Trends and Technology, vol. 12, no. 2, pp. 85-93, 2014.
[17]Rumale A S, and Chaudhari D N, “Cloud Computing: Infrastructure as a Service,” International Journal of Inventive Engineering and Sciences, vol. 1, no. 3, pp. 1-7, 2013.
[18]Ojugo A A, Aghware F O, Yoro R E, Yerokun M O, Eboka A O, Anujeonye C N, and Efozia F N, “Dependable Community-Cloud Framework for Smartphones,” American Journal of Networks and Communications, vol 4, no. 4, pp. 95-103, 2015.
[19]Subbiah S, Muthukumaran S S, and Ramkumar T, “An Approach for Enhancing Secure Cloud Storage Using Vertical Partitioning Algorithm,” Middle-East Journal of Scientific Research, vol. 23, no. 2, pp. 223-230, 2015.
[20]Priya A, Rana Y K, and Patel B P, “Design and Implementation of an Algorithm to Enhance Cloud Security,” International Journal of Computer Applications, vol. 113, no. 12, pp. 41-47, 2015.
[21]Alsaiari H, Papadaki M, Dowland P, and Furnell S, “Secure Graphical One Time Password (GOTPass): An Empirical Study”, Information Security Journal: A Global Perspective, vol. 24, no. 4, pp. 207-220, 2015.
[22]Elabd E, "A Dynamic Reputation-Based Approach for Web Services Discovery", International Journal of Information Technology and Computer Science, vol. 7, no. 8, pp. 31-36, 2015.
[23]Kumar A, and Singh M, "An Empirical Study on Testing of SOA based Services", International Journal of Information Technology and Computer Science, vol. 7, no. 1, pp. 54-66, 2015.
[24]Razek M A, "Credible Mechanism for More Reliable Search Engine Results", International Journal of Information Technology and Computer Science, vol. 7, no. 3, pp. 12-17, 2015.
[25]Dennai A, and Benslimane S M, "Semantic Indexing of Web Documents Based on Domain Ontology", International Journal of Information Technology and Computer Science, vol. 7, no. 2, pp. 1-11, 2015.
[26]Alam M I, Pandey M, and Rautaray S S, "A Comprehensive Survey on Cloud Computing", International Journal of Information Technology and Computer Science, vol. 7, no. 2, pp. 68-79, 2015.
[27]El-Khameesy N, and Mohamed H A R, "A Proposed Virtualization Technique to Enhance IT Services", International Journal of Information Technology and Computer Science, vol. 4, no. 12, pp. 21-30, 2012.
[28]Aamir M, and Arif M, "Study and Performance Evaluation on Recent DDoS Trends of Attack & Defense", International Journal of Information Technology and Computer Science, vol. 5, no. 8, pp. 54-65, 2013.
[29]Cui Y, Yan L, Li S, Xing H, Pan W, Zhu J, and Zheng X, “SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks”, Journal of Network and Computer Applications, vol. 68, pp. 65-79, 2016.
[30]Moura J, and Hutchison D, “Review and analysis of networking challenges in cloud computing”, Journal of Network and Computer Applications, vol. 60, pp. 113-129, 2016.
[31]Modi C, Patel D, Borisaniya B, Patel H, Patel A, and Rajarajan M, “A survey of intrusion detection techniques in Cloud”, Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42-57, 2013.
[32]Pasupuleti S K, Ramalingam S, and Buyya R, “An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing”, Journal of Network and Computer Applications, vol. 64, pp. 12-22, 2016.