Designing a Security Framework for Mitigating Flaws in Cloud Based Web Hosting for Privacy and Confidentiality Services

Authors

  • Surbhi Khare Department of CSE, MATS School of Engineering & IT Raipur, India
  • Vijayant Verma Department of CSE, MATS School of Engineering & IT Raipur, India

Keywords:

Resource constraint, privacy, AES, Far-off data, Network Trust, computing clouds

Abstract

The rapid growth in popularity of computing clouds has attracted and allowed intensive processing on resource-constrained client devices. Smart mobiles can install data- and computation-intensive programs thanks to the demand service model utilized by distant data centers Outsourcing personal and sensitive data to far-off data centers, on the other hand, creates significant privacy and security issues. It is necessary to improve the traditional advanced encryption standard (AES) algorithm in order to fulfill the rising security concerns in the cloud. Among the various advantages presented in this research are, for example, increased data security and owner privacy. The encryption speed is increased from 128 to 1000 bits per second with the help of a double round key. There was once a round key that could handle 800 blocks per second. Network trust and resource management may be enhanced while consuming less power and better load balancing by adopting the suggested strategy. In the proposed framework, AES will be utilized with plain text sized at 16, 32, 64, and 128 bytes. The simulation results are shown to show how well the algorithm meets quality standards. The proposed architecture, according to the results, reduces energy use by 14.43%, network utilization by 11.533%, and delay by 15.673%. This new design increases security while also making better use of resources and reducing the amount of time it takes to build new computational cloud services.

Downloads

Download data is not yet available.

References

G.S. Mahmood, J. H. Dong, and B. A. rahman Jaleel, “Achieving an effective, confidentiality and integrity of data in cloud computing,” International Journal of Network Security, vol. 21, no. 2, pp. 326–332, 2019.

S. Othman and A. S. Riaz, “A user-based trust model for cloud computing environment,” International Journal of Advanced Computer Science and Applications, vol. 9, no. 3, 2018.

Firman, A. N. Hidayanto, and P. Harjanto, “Critical components of security framework for cloud computing community: a systematic literature review,” International Journal of Pure and Applied Mathematics, vol. 118, no. 18, pp. 3345–3358, 2018.

K. V. Pradeep, V. Vijayakumar, and V. Subramaniyaswamy, “An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment,” Journal of Computer Networks and Communications, vol. 2019, Article ID 9852472, 8 pages, 2019.

Dr. Ramalingam Sugumar and K. Arul Marie Joycee, “FEDSACE: a framework for enhanced user data security algorithms in cloud computing environment,” International Journal on Future Revolution in Computer Science & Communication Engineering, vol. 4, no. 3, 2018.

M. Kpelou and K. Kishore, “Lightweight security framework for data outsourcing and storage in mobile cloud computing,” International Journal of Recent Technology and Engineering, vol. 8, no. 2, 2019.

R. Ganga Sagar and N. Ashok Kumar, “Encryption based framework for cloud databases using AES algorithm,” International Journal of Research Studies in Computer Science and Engineering, vol. 2, no. 6, 2015.

J. R. Jain and A. Abu, “A novel data logging framework to enhance security of cloud computing,” in Proceedings of the SoutheastCon 2016, IEEE, Norfolk, VA, USA, April 2016.

J. Singh, “Framework for client side AES encryption technique in cloud computing,” IJIRMPS, vol. 6, no. 5, 2018.

J. Y. Gudapati Syam Prasad, S. sunil kumar, and A. Keerthi, “Integration of searching and AES encryption in cloud computing,” International Journal of Engineering and Advanced Technology (IJEAT), vol. 8, no. 4, 2019.

A. Elgendy, W.-Z. Zhang, C.-y. Liu, and C.-H. hsu, “An efficient and secured framework for mobile cloud computing,” IEEE Transactions on Cloud Computing, 2018.

R. Saha, G. Geetha, G. Kumar, and T.-h. Kim, “RK-AES: an improved version of AES using a new key generation process with random keys,” Security and Communication Networks,

vol. 2018, Article ID 9802475, 11 pages, 2018.

O. C. Abikoye, A. D. Haruna, A. Abubakar, N. O. Akande, and E. O. Asani, “Modified advanced encryption standard algorithm for information security,” Symmetry, vol. 11, no. 12, p. 1484, 2019.

K.-L. Tsai, Y.-L. Huang, F.-Y. Leu, I. You, Y.-L. Huang, and C.-H. Tsai, “AES-128 based secure low power communication for LoRaWAN IoT environments,” IEEE Access, vol. 6, pp. 45325–45334, 2018.

M.V. C. Suana, A. M. Sison, C. Aragon, and R. P. Medina, “Enhancement of advanced encryption standard (AES) cryptographic strength via generation of cipher key-dependent S-box,” International Journal for Research in Applied Science & Engineering Technology (IJRASET), vol. 6, no. 4, 2018.

S. NurRachmat, “Performance analysis of 256-bit AES encryption algorithm on android smart phone,” IOP Conf. Series: Journal of Physics: Conf. Series, vol. 1196, 2019.

On technical security issues in cloud computing, Meiko Jensen etal, 2009

Cloud computing security issues and challenges, Balachandran reddy et al, 2009

Cloud Computing security issues and challenges Kresimir Popovic, et al, 2010

Dikaiakos, M.D., Katsaros, D., Mehra, P., et al.: Cloud Computing: Distributed Internet Computing

for IT and Scientific Research 13, 10–13 (2009)

Amazon Web Services. Amazon Virtual private Cloud, http://aws.amazon.com/vpc/

C. Băsescu, A. Carpen-Amarie, C.Leordeanu, A. Costan, and G. Antoniu, “Managing Data Access on

Clouds: A Generic Framework for Enforcing Security Policies”, In proceeding of IEEE International

Conference on Advanced Information Networking and Applications (AINA), 2011

R. Sravan Kumar and A. Saxena, “Data integrity proofs in cloud storage”, Third International Conference on Communication Systems and Networks (COMSNETS), 2011.

Z. Wang, “Security and Privacy Issues Within Cloud Computing” IEEE Int. conference on

computational and Finformation sciences, Chengdu, China, Oct. 2011.

James B.D. Joshi, Elisa Bertino, Usman Latif, Arif Ghafoor, “A Generalized Temporal Role-Based Access Control Model”,IEEE Computer Society, 2005.

Moonam Ko, Gail-joon Ahn, Mohamed Shehab, “Privacy enhanced User-Centric Identity Management”, IEEE International Conference on Communications,2009.

Cong Wang, Qian Wang, Kui Ren, Wenjing Luo, “Privacy preserving public audting for data storage security in Cloud Computing”, IEEE Communication Society, 2010.

Tripathi and A. Mishra, “Cloud computing security considerations” IEEE Int. conference on signal processing, communication and computing (ICSPCC), 14-16 Sept., Xi'an, Shaanxi, China, 2011.

Vadym Mukhin, Artem Volokyta, “Security Risk Analysis for Cloud Computing Systems” The 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Prague, Czech Republic, 15-17 September 2011.

Mathisen, “Security Challenges and Solutions in Cloud Computing” 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST2011) , Daejeon, Korea, 31 May -3 June 2011.

M. Oqail Ahmad and R. Z. Khan, “Cloud computing modelling and simulation using CloudSim environment,” International Journal of Recent Technology and Engineering (IJRTE) ISSN, vol. 8, no. 2, 2019.

V. Surya, S. Ranichandra, and R. Ranjani, “Secure cloud storage using AES encryption,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 6, no. 6, 2018.

Nair and S. S. SantoshAnand, “A performance booster for load balancing in cloud computing with my load balancer technique,” International Journal of Recent Technology and Engineering, vol. 8, no. 1, 2019.

D. Salama and A. Elminaam, “Improving the security of cloud computing by building new hybrid cryptography algorithms,” IJEIE, vol. 8, no. 1, pp. 40–42, 2018.

D.-H. Bui, D. Puschini, S. Bacles-Min, E. Beign´e, and X.-T. Tran, “Ultra low-power and low-energy 32-bit datapath AES architecture for IoT applications,” in Proceedings of the 2016 International Conference on IC Design and Technology (ICICDT), pp. 1–4, Ho Chi Minh City, Vietnam, June 2016.

H. Jia, X. Liu, X. Di et al., “Security strategy for virtual machine allocation in cloud computing,” Procedia Computer Science, vol. 147, pp. 140–144, 2019.

B. T. Spiers, M. Halas, R. A. Schimmel, and D. P. Provencher, “Secure network cloud architecture,” U.S. Patent 8,984,610, United States Patent (Justia Patents), 2015.

E. Bertino, F. Paci, R. Ferrini, and N. Shang, “Privacy-preserving digital identity management for cloud computing,” IEEE Data Engineering Bulletin, vol. 32, no. 1, pp. 21–27, 2009.

S. Yi, Li Cheng, and Q. Li, “A survey of fog computing: concepts, applications and issues,” in Proceedings of the 2015 Workshop on Mobile Big Data, pp. 37–42, ACM, Hangzhou, China, June 2015.

M. Aazam and E.-N. Huh, “Fog computing and smart gateway based communication for cloud of things,” in Proceedings of the 2014 International Conference on Future Internet of Bings and Cloud, pp. 464–470, IEEE, Barcelona, Spain, August 2014.

R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. De Rose, and R. &Buyya, “CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms,” Software: Practice and Experience, vol. 41, no. 1, pp. 23–50, 2011.

G. N. Selimis, A. P. Kakarountas, A. P. Fournaris, A. Milidonis, and O. Koufopavlou, “A low power design for sbox cryptographic primitive of advanced encryption standard for mobile end-users,” Journal of Low Power Electronics, vol. 3, no. 3, pp. 327–336, 2007.

M. A. FaiqaMaqsood, M. M. Ali, and M. Ali Shah, “Cryptography: a comparative analysis for modern techniques”, (IJACSA),” International Journal of Advanced Computer Science and Applications, vol. 8, no. 6, 2017.

R. Paul, S. Saha, S. Sau, and A. Chakrabarti, “Design and implementation of realtime AES-128 on real time operating system for multiple fpga communication,” 2012, http://arxiv.org/abs/1205.2153.

D. Lohit Kumar, Dr.A. R. Reddy, and S. A. K. Jilani, “Implementation of 128-bit AES algorithm in MATLAB,” International Journal of Engineering Trends and Technology (IJETT), vol. 33, no. 3, 2016.

Dr. N. Suba Rani, Dr. A. Noble Mary Juliet, and K. Renuka Devi, “An image encryption & decryption and comparison with text - AES algorithm,” International Journal of Scientific & Technology Research, vol. 8, no. 7, 2019.

O. I. Omotosho, “A review on cloud computing security,” International Journal of Computer Science and Mobile Computing, IJCSMC, vol. 8, no. 9, pp. 245–257, 2019.

L. R.1 and H. S.2 Mohan, “Implementation and performance analysis of modified AES algorithm with key-dependent dynamic S-box and key multiplication,” Computer Applications Research, vol. 5, no. 3, 2015.

Thomas Erl, Ricardo Puttini, Zaigham Mahmood "Cloud Computing: Concepts, Technology & Architecture" Prentice Hall, 2013

Gururaj Ramachandra, Mohsin Iftikhar, Farrukh Aslam Khan, A Comprehensive Survey on Security in Cloud Computing, Procedia Computer Science, Volume 110, Pages 465-472, 2017.

Shende, P. ., Vishal Ashok, W. ., Limkar, S. ., D. Kokate, M. ., Lavate, S. ., & Khedkar, G. . (2023). Assessment of Seismic Hazards in Underground Mine Operations using Machine Learning. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2s), 237–243. https://doi.org/10.17762/ijritcc.v11i2s.6142

Thomas, C., Wright, S., Hernandez, M., Flores, A., & García, M. Enhancing Student Engagement in Engineering Education with Machine Learning. Kuwait Journal of Machine Learning, 1(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/123

Thangamayan, S., Kumar, B., Umamaheswari, K., Arun Kumar, M., Dhabliya, D., Prabu, S., & Rajesh, N. (2022). Stock price prediction using hybrid deep learning technique for accurate performance. Paper presented at the IEEE International Conference on Knowledge Engineering and Communication Systems, ICKES 2022, doi:10.1109/ICKECS56523.2022.10060833 Retrieved from www.scopus.com

Downloads

Published

21.09.2023

How to Cite

Khare, S. ., & Verma , V. . (2023). Designing a Security Framework for Mitigating Flaws in Cloud Based Web Hosting for Privacy and Confidentiality Services. International Journal of Intelligent Systems and Applications in Engineering, 11(4), 62–81. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3455

Issue

Section

Research Article