Automated Data Security Model Using Cryptography Techniques in Cloud Environment

Authors

  • Mada Prasad, M. Jagadeeshwar, D. Shanthi

Keywords:

Cloud Computing, Data Security, Cryptography, Encryption, Asymmetric Cryptography.

Abstract

Cloud computing, a highly debated research frontier, offers the dual advantage of cost reduction and enhanced scalability and flexibility in computing services. Its widespread adoption spans diverse sectors such as the military, healthcare, industry, and education, facilitating the storage of vast datasets. Users can access shared resources, including software and information, at their convenience from any location. However, the security of cloud-stored data, categorized as private, public, or sensitive, poses challenges, especially when entrusting third-party providers with confidential information. Acknowledging that security is a joint responsibility of both enterprises and customers, even industry giants stress the need for a collaborative approach. Encrypting information stored in the cloud becomes imperative from the client's standpoint to prevent unauthorized access. Numerous challenges arise in cloud data storage, necessitating innovative solutions, and various algorithms have been developed to address these issues. This study employs cryptographic techniques to address security concerns, with a focus on the Asymmetric Key Cryptography with Related Key Set (AKC-RKS) technique. The paper introduces novel safety mechanisms using the AKC-RKS technique, comparing the proposed model with traditional encryption methods. The results demonstrate a high level of data security in the proposed model, showcasing the efficacy of cryptographic techniques in fortifying data security within cloud environments.

Downloads

Download data is not yet available.

References

Fursan Thabit, Sharaf Alhomdy, Sudhir Jagtap, A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions, International Journal of Intelligent Networks, Volume 2, 2021, Pages 18-33, ISSN 2666-6030, https://doi.org/10.1016/j.ijin.2021.03.001.

Hadisukmana, R.N. An Approach of Securing Data using Combined Cryptography and Steganography. Int. J. Math. Sci. Comput. 2020, 6, 1–9.

Alegro, J.K.P.; Arboleda, E.R.; Pereña, M.R.; Dellosa, R.M. Hybrid schnorr, rsa, and aes cryptosystem. Int. J. Sci. Technol. Res. 2019, 8, 1770–1776.

Chittibabu, P.; Kannan, M.; Priya, C.; Vaishnavisree, S.; Scholar, R. A Comparative Analysis of Des, Aes and Rsa Crypt Algorithms for Network Security in Cloud Computing. J. Emerg. Technol. Innov. Res. 2019, 6, 574–582.

Alsaffar, D.M.; Almutiri, A.S.; Alqahtani, B.; Alamri, R.M.; Alqahtani, H.F.; Alqahtani, N.N.; Alshammari, G.M.; Ali, A.A. Image Encryption Based on AES and RSA Algorithms. In Proceedings of the 2020 3rd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 19–21 March 2020; pp. 1–5.

Tamimi, A.A.; Dawood, R.; Sadaqa, L. Disaster recovery techniques in cloud computing. In Proceedings of the 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), Amman, Jordan, 9–11 April 2019; pp. 845–850.

Kumar, L.; Bandal, N. A review on hybrid encryption in cloud computing. In Proceedings of the 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), Ghaziabad, India, 18–19 April 2019.

Khan, I.A.; Qazi, R. Data Security in Cloud Computing Using Elliptic Curve Cryptography. Int. J. Comput. Commun. Netw. 2019, 1, 46–52.

Hamadah, S. Cloud-based disaster recovery and planning models: An overview. ICIC Express Lett. 2019, 13, 593–599.

Zaghloul, E.; Zhou, K.; Ren, J. P-MOD: Secure Privilege-Based Multilevel Organizational Data- Sharing in Cloud Computing. IEEE Trans. Big Data 2019, 6, 804–815.

Tao, Y.; Xu, P.; Jin, H. Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage. IEEE Access 2019, 8, 15963–15972.

Anjana; Singh, A. Security concerns and countermeasures in cloud computing: A qualitative analysis. Int. J. Inf. Technol. 2018, 11, 683–690.

Moulika Bollinadi, Vijay Kumar Damera, “Cloud Computing: Security Issues and Research Challenges” in Journal of Network Communications and Emerging Technologies (JNCET) Volume 7, Issue 11, (2017).

Anshika Negi, Mayank Singh, Sanjeev Kumar, “An Efficient Security Framework Design for Cloud Computing using Artificial Neural Networks” in International Journal of Computer Applications (0975 – 8887) Volume 129 – No.4, (2015).

A Venkatesh, Marrynal S Eastaff, “A Study of Data Storage Security Issues in Cloud Computing”, in International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume 3-No 1, (2018).

Y Z An, Z F Zaaba & N F Samsudin, “Reviews on Security Issues and Challenges in Cloud Computing”, International Engineering Research and Innovation Symposium (IRIS), Conf. Series: Materials Science and Engineering 160 (2016).

J. Yang and Z. Chen, "Cloud Computing Research and Security Issues," 2010 International Conference on Computational Intelligence and Software Engineering, Wuhan, 2010, pp. 1-3.doi: 10.1109/CISE.2010.5677076.

Deepanshi Nanda, Sonia Sharma, “Security in Cloud Computing using Cryptographic Techniques”, International Journal of Computer Science and Technology Vol. 8, Issue 2, (2017).

Adnaan Arbaaz Ahmed, Dr.M.I.Thariq Hussan, “Cloud Computing: Study of Security Issues and Research Challenges” in International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 7, Issue 4, ISSN: 2278 – 1323 (2018).

Rohit Bhadauria, Rituparna Chaki, Nabendu Chaki, Sugata Sanyal, “A Survey on Security Issues in Cloud Computing” in ACTA TEHNICA CORVINIENSIS – Bulletin of Engineering Tome VII [2014] Fascicule 4 ISSN: 2067 – 3809.

N.N Mosola, M.T Dlamini, J.M Blackledge, J.H.P Eloff, H.S Venter, “Chaos-based Encryption Keys and Neural Key-store for Cloudhosted Data Confidentiality”, in Southern Africa Telecommunication Networks and Applications Conference (SATNAC) (2017)

Shakeeba S. Khan, Prof.R.R. Tuteja, “Security in Cloud Computing using Cryptographic Algorithms”, in International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 3, Issue 1, (2015)

AL-Museelem Waleed, Li Chunlin, “User Privacy and Security in Cloud Computing”, in International Journal of Security and Its Applications Vol. 10, No. 2 (2016), pp.341-352

Dr. Ramalingam Sugumar, K. Raja, “EDSMCCE: Enhanced Data Security Methodology for Cloud Computing Environment” in International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Volume 3 | Issue 3 | ISSN: 2456-3307(2018).

Reshma Suryawanshi, Santosh Shelke, “Improving Data Storage Security in Cloud Environment Using Public Auditing and Threshold Cryptography Scheme”, in International Conference on Computing Communication Control and Automation (ICCUBEA),( 2016).

Downloads

Published

24.03.2024

How to Cite

M. Jagadeeshwar, D. Shanthi, M. P. (2024). Automated Data Security Model Using Cryptography Techniques in Cloud Environment. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 1910–1917. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5655

Issue

Section

Research Article