Secure and Efficient Query Processing Using Randomized Encryption and De-duplication on the Cloud
-
2018-04-25 https://doi.org/10.14419/ijet.v7i2.24.12071 -
Cloud security, Data Confidentiality, AES, Triple DES, Blowfish, De-duplication, Randomized Encryption. -
Abstract
Cloud computing [1] is the most upcoming area of the IT industry that helps the users to get rid of the hardware resources and complexity in storage and computational power. All the people started using cloud which led to many security concerns relating to the data confidentiality and integrity. This became a challenge to the widespread of the new cloud computing technology. Many measures are taken to improve the cloud security and then there came the concept of cryptography to upgrade the cloud security. Today, the main problem is to sustain data privacy [2] against unreliable cloud service providers and to provide correct query results to the authenticated users. Existing approach provide confidentiality using only one symmetric encryption algorithm which generates only one secret key to both encrypt and decrypt. But this is not so secured as the attacker can easily guess the algorithm and thereby find the key. In this journal, we proposed a randomized encryption technique in which the files are randomly encrypted by three strong algorithms AES, Triple DES and Blowfish [3] which improves the security and we are also implementing new techniques to improve security like key generation via OTP method, etc. In addition to this, we are also going to solve the storage issue of redundant or duplicate files consuming the cloud storage by using a file-level de-duplication technique which can eliminate the duplication of files uploaded into the cloud, thereby saving storage and reduce the need to buy extra storage. -
References
[1] Ronald Kurtz and Russell Dean Vines "Cloud Security(A Comprehensive Guide to Secure Cloud Computing)" WILEY-INDIA
[2] K.Hashizume, D.G.Rosado, E.B.Fernandez, "An analysis of Security issues for cloud computing", Journal Internet Services and Applications, Vol.4,2013,pp.1-13.
[3] MD Asif Mushtaque, Harsh Dhiman, and Shahnawaz Hussain "Evaluation of DES, TDES, AES, Blowfish and Two fish Algorithm: Based on Space Complexity" International Journal of Engineering Research &Technology(IJERT).
[4] Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard." Dr.Dobb's Journal, March 2001.
[5] Gurujeevan Singh, Ashwani Kumar and K.S. Sandha, "A Study of New Trends in Blowfish Algorithm", International Journal of Engineering Research and Applications, Vol.1, Issue 2,pp.321-326.
[6] Kim, D.; Song, S.; Choi, B,-Y."Data Deduplication for Data Optimization for Storage and Network Systems"http://www.springer.com/978-3-319-42278-7
[7] Mitali and Vijay Kumar "A Survey on Various Cryptography Techniques" International Journal of Emerging Trends & Technology in Computer Science(IJETTCS)
[8] Ayesha M.Talha and Ibrahim Kamel "Facilitating Secure and Efficient Spatial Query Processing on the cloud" IEEE
[9] William Stallings "Cryptography and Network Security(Principles and Practice)" Pearson Education sixth Edition.
[10] E.Surya and C.Divya,"A Survey on Symmetric Key Encryption Algorithms", International Journal of Computer Science &Communication Networks, Vol.2(4),475-477.
[11] Singh, S Preet, and Maini, Raman "Comparision of Data Encryption Algorithms", International Journal of Computer science and Communication, vol.2, No.1, January-June 2011, pp.125-127.A.
[12] Monika Agarwal, Pradeep Mishra, " A Comparative Survey on Symmetric Key Encryption Techniques", International Journal of Computer Science and Engineering(IJCSE), Vol.4 No.05 May 2012, PP877-882.
[13] Cloud Security Alliance. Top Threats to Cloud Computing, Cloud Security Alliance, 2010.
[14] https://googleweblight.com/i?u=https://www.incapsula.com/blog/top-10-cloud-security-concerns.html&hl=en-IN
[15] Atul karate "Cryptography and Network Security", Tata McGraw-Hill Companies,2008.
[16] https://blog.demofox.org/2012/09/15/cryptography-101-encryption-symmetric-keys/
[17] Miss Shakeeba S.Khan and Prof. Ms.R.R.Tuteja "Cloud Security Using Multilevel Encryption Algorithms" International Journal of Advanced Research in Computer and Communication Engineering vol. 5, Issue 1, January 2016.
[18] https://www.tutorialspoint.com/cryptography/triple_des.html
[19] Tingyuan Nie, and Teng Zhang,"A Study of DES and Blowfish Encryption Algorithm", IEEE, 2009.
[20] Bruce Schneier. "The Blowfish Encryption Algorithm Retrieved", October 25, 2008.
[21] Hui Cui and Robert H. Deng "Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud" IEEE
[22] https://www.tutorialspoint.com/cryptography/advanced_encryption_standard.htm
[23] http://www.tutorialspoint.com/cryptography/cryptography_quick_guide.htm
[24] S.V.Manikanthan and K.Baskaran “Low Cost VLSI Design Implementation of Sorting Network for ACSFD in Wireless Sensor Networkâ€, CiiT International Journal of Programmable Device Circuits and Systems,Print: ISSN 0974 – 973X & Online: ISSN 0974 – 9624, Issue : November 2011, PDCS112011008.
T. Padmapriya and V.Saminadan, “Handoff Decision for Multi-user Multiclass Traffic in MIMO-LTE-A Networksâ€, 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016) – Elsevier - Procedia of Computer Science, vol. 92, pp: 410-417, August 2016.
-
Downloads
-
How to Cite
Lalita Kumar Parvataneni, M., Sai Nath Adusumalli, E., & C, R. (2018). Secure and Efficient Query Processing Using Randomized Encryption and De-duplication on the Cloud. International Journal of Engineering & Technology, 7(2.24), 311-315. https://doi.org/10.14419/ijet.v7i2.24.12071Received date: 2018-04-24
Accepted date: 2018-04-24
Published date: 2018-04-25