Joint Data Integrity and Loss Recovery Mechanism for Secure Storage in Cloud Computing
Keywords:
Data Integrity, Loss Recovery, Secure Storage, Cloud Computing, Machine LearningAbstract
Data outsourcing lowers the cost of maintenance and storage, but the user is unaware of the location of their data. Since cloud data is uncontrollable, new security issues must be addressed. Despite much research in the literature, there are still significant problems with secure storage and data integrity for shared dynamic data. Intending to solve these issues, this research develops a data security and integrity methodology that also allows for data loss recovery in the cloud using the efficiency of Machine Learning (ML) algorithms. When a cloud fails due to a disaster, an attack, or data loss and corruption, the data loss recovery process helps to recover the lost data and restore the cloud backup.
Downloads
References
G. B. Tarekegn, G. Abadi Maru, and H. Zelalem Liyew, “Privacy and security issues IN cloud computing,” International Journal Of Current Research, vol. 8, no. 7, pp. 34894–34898, 2016.
A. Venkatesh and . M. S. Eastaff, "A Study of Data Storage Security Issues in Cloud Computing," International Journal of Scientific Research in Computer Science, Engineering and Information Technology , IJSRCSEIT , vol. Vol. 3, No. 1, pp. 2456-3307, 2018.
O. O. Olakanmi and A. Dada, “An efficient privacy-preserving approach for secure verifiable outsourced computing on untrusted platforms,” International Journal of Cloud Applications and Computing, vol. 9, no. 2, pp. 79–98, 2019.
S. Basu, A. Bardhan , K. Gupta , P. Saha, M. Pal and M. Bose , "Cloud computing security challenges & solutions - A survey," in IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), 2018.
E. Alsolami, “Security threats and legal issues related to cloud based solutions,” IJCSNS International Journal Of Computer Science And Network Security, vol. 18, no. 5, 2018.
F. M. Awaysheh, M. N. Aladwan, M. Alazab, S. Alawadi, J. C. Cabaleiro, and T. F. Pena, “Security by design for big data frameworks over cloud computing,” IEEE Transactions On Engineering Management, vol. 99, 2021.
H. Yusuf and S. Selvan, "Confidentiality Issues in Cloud Computing and Countermeasures: A Survey," in National Conference On Emerging Computer Paradigms 2016, NMAMIT, Nitte, 2016.
Sadavarte, Rajesh and Kurundkar, Gajanan, "Data security and integrity in cloud computing : Threats and Solutions", International Journal of Scientific Research in Computer Science, Engineering and Information Technology, pp. 356-363, 2020.
Abdullatif Ghallab Saif, Mohammed and Mohsen Abdulqader, "Data Integrity and Security in Distributed Cloud Computing-A Review", Proceedings of International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications, pp.767-784, 2021.
Ait, Almokhtar, Ammari Najim, Abou Anas, Ait Abdellah, and De Mina, "New mechanism for Cloud Computing Storage Security", International Journal of Advanced Computer Science and Applications, Vol. 7, No. 7, 2016.
Priteshkumar Prajapati, and Parth Shah, "A Review on Secure Data Deduplication: Cloud Storage Security Issue", Journal of King Saud University - Computer and Information Sciences, Vol. 34, No. 7, pp. 3996-4007, 2022.
N.K. Sehgal, P.C.P. Bhatt, and J.M. Acken, "Future trends in cloud computing", Cloud Computing with Security, pp. 235-259, 2020.
J. Hong, K. Xue, Y. Xue, W. Chen, D. S. L. Wei, N. Yu, and P. Hong, ‘‘TAFC: Time and attribute factors combined access control for time-sensitive data in public cloud,’’ IEEE Trans. Services Comput., vol. 13, No. 1, pp. 158–171, Jan. 2020.
P. Yang, N. Xiong,and J. Ren, "Data security and privacy protection for cloud storage: A survey", IEEE Access, Vol. 8, pp. 131723-131740, 2020.
E. Hesamifard, H. Takabi, M. Ghasemi, and N. W. Rebecca, ‘‘Privacy preserving machine learning as a service,’’ Proc. Privacy Enhancing Technol., vol. 2018, no. 3, pp. 123–142, Jun. 2018.
P. Li, T. Li, H. Ye, J. Li, X. Chen, and Y. Xiang, ‘‘Privacy-preserving machine learning with multiple data providers,’’ Future Gener. Comput. Syst., vol. 87, pp. 341–350, Oct. 2018.
Amr M. Sauber, Passent M. El-Kafrawy, Amr F. Shawish, Mohamed A. Amin, and Ismail M. Hagag, "A New Secure Model for Data Protection over Cloud Computing", Computational Intelligence and Neuroscience, vol. 2021, 2021.
Senthil Kumar, and Latha Parthiban, "Secure Data Storage In Cloud With Enhanced Public Verifiability And Data Loss Recovery", International Journal of Pure and Applied Mathematics, Vol. 119, No. 16, pp. 1979-1987, 2018.
Paul R Rejin, Raj D Paul, Amir H. Alavi, "Verification of data integrity and co-operative loss recovery for secure data storage in cloud computing", Cogent Engineering, Vol. 6, No. 1, 2019.
Rongzhi Wang, "Research on data security technology based on cloud storage", Procedia Engineering, Vol. 174, pp. 1340 – 1355, 2017.
Rose Adee and Haralambos Mouratidis, "A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography", Sensors, Vol. 22, 2022.
Ali Asghar Heidari, Seyedali Mirjalili, Hossam Faris, Ibrahim Aljarah, Majdi Mafarja, and Huiling Chen, "Harris hawks optimization: Algorithm and applications", Future Generation Computer Systems, Vol. 97, pp. 849-872, 2019.
Dr.V.Dheepa, and Ms.G.Prathima, "Replace Recovery Algorithm Approach In Recovering A Failure In Cloud Environment", Hindco journals, Available Online.
Rashmi Ramesh Rachh, Ananda Mohan P.V,and Anami B.S, “Efficient Implementations for AES Encryption and Decryption”, Circuits, Systems, and Signal Processing, Vol.31, pp.1765-1785, 2012.
Indumathi Saikumar, “DES- Data Encryption Standard”, International Research Journal of Engineering and Technology,Vol. 4 No.3, 2017.
Seyedali Mirjalili, Seyed Mohammad Mirjalili and Andrew Lewisa, "Grey Wolf Optimizer", Advances in Engineering Software, Vol. 69, pp 46-61, March 2014.
J. Kennedy and R. Eberhart, "Particle swarm optimization," Proceedings of ICNN'95 - International Conference on Neural Networks, vol.4, pp. 1942-1948, 1995.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.