Enhancing security for end users in cloud computing environment using hybrid encryption technique

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    In the era of cloud, anything and everything as a service facilitates number of remote user connected from anywhere, anytime and any form of access to the storage services. Today, Cloud storage has become an essential aspect of cloud computing, stores information and support any kind of applications. Applications like Internet of Things, Big Data analytics, Data warehousing, Databases, Backups and archive applications all rely on some form or the other on cloud storage architecture. Users may have a different variants of smart devices such as tablet, PCs, notebook and smart phones. Cloud storage provides an interlink between these smart devices. Enterprises prefer to use cloud storage because they provide cost-friendly and flexible alternatives on locally implemented hardware. However, business process in the cloud needs secured transaction, confidential files are sometimes exposed to risk of leakage, as cloud- stored data resides outside of the local infrastructure, thus vulnerable to security risks. Cloud storage providers provides enough security at their end, but there is no system that provides client level security while using public clouds. The proposed system will provide client level security using hybrid encryption techniques. Using AES (Advance Encryption Standard) in CBC Mode (Cipher Block Chaining) and HMAC-SHA-1 (Hash-based Message Authentication Code) with light weight methods enhances the strong encryption at client level security. Fusion of these algorithms adds extra layers of security to the cloud storage data. The proposed method enhances the security measures for any client users, using storage as a service offered by several cloud service providers.


  • Keywords


    Authentication; Cipher Block Chaining; Cloud Security; Cloud Storage; Encryption

  • References


      [1] Maurich Ingo, Heberle Lukas, Guneysu Tim, ”IND-CCA Secure Hy- ¨ brid Encryption from QC-MDPC Niederreiter”, 7th International Workshop on Post-Quantum Cryptography, Vol.9606, (2016), pp.1–17.

      [2] Usman Muhammad, Ahmed Irfan, Aslam M Imran , Khan Shujaat , Shah Usman Ali, ”SIT: A Lightweight Encryption Algorithm for Secure Internet of Things”, arXiv preprint arXiv:1704.08688, (2017).

      [3] MDawahdeh Ziad E , Yaakob Shahrul N ,bin Othman, Rozmie Razif, ”A New Image Encryption Technique Combining Elliptic Curve Cryptosystem with Hill Cipher”, Journal of King Saud University-Computer and Information Sciences, (2017).

      [4] Maurich Ingo, Heberle Lukas, Guneysu Tim, ”Efficient cloud storage ¨ confidentiality to ensure data security”, International Conference on Computer Communication and Informatics, (2014), pp.1–5.

      [5] Zhao Gansen, Rong Chunming, Li Jin, Zhang Feng, Tang, Yong, ”Trusted data sharing over untrusted cloud storage providers”, International Conference on Cloud Computing Technology and Science, (2010), pp.97–103.

      [6] Chen Deyan, Zhao Hong, ”Data security and privacy protection issues in cloud computing”, International Conference on Computer Science and Electronics Engineering, (2012), pp.647–651.

      [7] Stanek Jan, Sorniotti Alessandro, Androulaki Elli, Kencl, Lukas, ”A secure data deduplication scheme for cloud storage”, International Conference on Financial Cryptography and Data Security, (2014), pp.99–118.

      [8] Slamanig Daniel, Hanser Christian, ”On cloud storage and the cloud of clouds approach”, International Conference on Internet Technology And Secured Transactions, (2012), pp.649–655.

      [9] Fathy Ahmed, Tarrad Ibrahim F, Hamed Hesham FA, Awad Ali Ismail, ”Advanced Encryption Standard Algorithm: Issues and Implementation Aspects”, AMLTA, (2012), pp.516–523.

      [10] Al-Shawabkeh Mahmoud, Saudi Madihah Mohd, Alwi Najwa Hayaati Mohd, ”Computer security self-efficacy effect: An extention of Technology-to-Performance chain model”, Control and System Graduate Research Colloquium, (2012), pp.64–69.

      [11] Karuppusamy Sasikumar , Muthaiyan Madiajagan, ”An Efficient Placement Algorithm for Data Replication and To Improve System Availability in Cloud Environment”, International Journal of Intelligent Engineering and Systems, Vol.9, No.4,(2016), pp.88–97.

      [12] Jing Zhang , Jinsu Wang , Zhuangfeng Zheng , Chongan Zhao, ”Cloud storage encryption security analysis”, International Conference on Cloud Computing and Big Data Analysis, (2016), pp.62–65.

      [13] Yahya Fara, Walters Robert J , Wills Gary B, ”Goal-based security components for cloud storage security framework: a preliminary study”, International Conference On Cyber Security And Protection Of Digital Services, (2016), pp.1–5.

      [14] Nadesh RK, Jagadeesh Meduri , Aramudhan M, ”A Quantitative Study on the Performance of Cloud Data Centre: Dynamic Maintenance Schedules with Effective Resource Provisioning Schema”, Indian Journal of Science and Technology, Vol.8, No.23,(2015).

      [15] Black John, Halevi Shai, Krawczyk Hugo , Krovetz Ted , Rogaway Phillip, ”UMAC: Fast and secure message authentication”, Annual International Cryptology Conference, (1999), pp.216–233.

      [16] Patil Amit, Marimuthu K , Niranchana R, ”Comparative study of cloud platforms to develop a Chatbot”, International Journal of Engineering & Technology, Vol.6, No.3, (2017), pp. 57–61.

      [17] Bellare Mihir, Kilian Joe, Rogaway Phillip, ”The security of the cipher block chaining message authentication code”, Journal of Computer and System Sciences, Vol.61, No.3, (2000), pp. 362–399

      [18] Black John, Rogaway Phillip, ”A block-cipher mode of operation for parallelizable message authentication”, Advances in CryptologyEUROCRYPT, (2002), pp. 384–397.

      [19] Sekar K , Padmavathamma M, ”Comparative study of encryption algorithm over big data in cloud systems”, International Conference on Computing for Sustainable Global Development, (2016), pp. 1571–1574.

      [20] Dhingra Mridula, Gupta Neha, ”Comparative analysis of fault tolerance models and their challenges in cloud computing”, International Journal of Engineering & Technology, Vol.6, No.2, (2017), pp. 36–40.

      [21] Li Jin , Li Yan Kit , Chen Xiaofeng , Lee Patrick PC , Lou Wenjing, ”Comparative analysis of fault tolerance models and their challenges in cloud computing”, IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.5, (2015), pp. 1206–1216.


 

View

Download

Article ID: 8340
 
DOI: 10.14419/ijet.v7i1.8340




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.