A Study on Enhanced Cloud-Based Storage with Confidentiality Assurance, Verifiable Access Control, and Improved MD5 Schema

Authors

  • Govind Murari Upadhyay Devender Kumar , Sandeep Kumar Budhani , Saneh Lata Yadav , Prashant Vats , Shalendra Kumar

Keywords:

Cloud-based storage, Confidentiality assurance, Access control, MD5 schema, Encryption, Cryptographic hashing, Data integrity.

Abstract

Cloud-based storage solutions have revolutionized the way data is handled, saved, and accessed in today's digital world. The guarantee of data confidentiality, the implementation of strong access control measures, and the verification of data integrity are the three main difficulties that have been highlighted by this paradigm shift. An in-depth analysis of these issues is provided in this paper, along with a thorough plan for improving cloud-based storage systems that include enhanced integrity validation, verifiable access control, and confidentiality guarantee via the use of an upgraded MD5 schema. Understanding the complexity of data security in cloud systems is fundamental to the suggested approach. Despite their ease and adaptability, conventional cloud storage strategies frequently fall. Conventional cloud storage solutions are convenient and scalable, but they frequently don't sufficiently address the inherent risks that result from sharing infrastructure across several tenants. In response, our research promotes a comprehensive strategy that strengthens the security posture of cloud-based storage by combining cryptographic hashing, access control methods, and encryption approaches. The use of cutting-edge encryption methods to protect the privacy of stored data is a key component of our strategy. Before being sent to the cloud, data is encrypted using methods like AES (Advanced Encryption Standard), making it unintelligible to unauthorized parties. Users may feel confident about the privacy of their data since this guarantees that, even in the case of a breach or unauthorized access, critical information is shielded from prying eyes. Users may feel confident about the privacy of their data since this guarantees that, even in the case of a breach or unauthorized access, critical information is shielded from prying eyes. Additionally, a novel structure for controlling access that allows for the verifiable implementation of access restrictions in a cloud context is proposed in our study. By utilizing cryptographic methods like digitally signed documents and authorization tokens, the suggested approach guarantees that only those with permission may access certain data resources. Furthermore, by including strong audit trails and logging systems, administrators may monitor and confirm access attempts with great care, improving access management transparency and accountability.

Downloads

Download data is not yet available.

References

Zhiguo Wan, Jun’e Liu, and R.-H. Deng. Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. Information Forensics and Security, IEEE Transactions on, Vol. 7, No. 2, pp. 743–754, 2012.

Iankoulova and M. Daneva. Cloud computing security requirements: A systematic review. In Research Challenges in Information Science (RCIS), 2012 Sixth International Conference on, pp. 1–7, May. 7, 8

Haiying Ma, Zhanjun Wang, and Zhijin Guan, “Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation”, Security and Communication Networks, Vol. 19, pp. 1-11, 2019.

Hefeng Chen and Chin-Chen Chang, “A Novel Secret Sharing Scheme Based upon Euler’s Theorem, Security and Communication Networks”, Vol. 19, pp. 1-7, 2019.

Dindayal Mahto, Dilip Kumar Yadav, RSA and ECC: A Comparative Analysis, International Journal of Applied Engineering Research, Vol. 12, No. 19, pp. 9053-9061, 2017.

NTRU Cryptosystem was created by J. Hoffstein in 1996, J. Pipher and J. H. Silverman.

Yanjiang Yang and Youcheng Zhang. A generic scheme for secure data sharing in cloud. In Parallel Processing Workshops (ICPPW), 2011 40th International Conference on, pp. 145–153, 2011.

Nguyen Thanh Hung, Do Hoang Giang, Ng Wee Keong, and Huafei Zhu. Cloud-enabled data sharing model. In Intelligence and Security Informatics (ISI), 2012 IEEE International Conference on, pp. 1–6, 2012.

M.R. Islam and M. Habiba. Agent based framework for providing security to data storage in cloud. In Computer and Information Technology (ICCIT), 2012, 15th International Conference on, pp. 446–451, 2012.

Kumar, Byung Gook Lee, HoonJae Lee, and A. Kumari. Secure storage and access of data in cloud computing. In ICT Convergence (ICTC), 2012 International Conference on, pp. 336–339, 2012.

S. Gupta, S.R. Satapathy, P. Mehta, and A. Tripathy. A secure and searchable data storage in cloud computing. In Advance Computing Conference (IACC),2013 IEEE 3rd International, pp. 106–109, 2013.

Xiao Zhang, Hongtao Du, JianquanChen, YiLin, and LeijieZeng. Ensure data security in cloud storage. In Network Computing and Information Security (NCIS), 2011 International Conference on, volume 1, pages 284–287, 2011.

Kumbhare, Y. Simmhan, and V. Prasanna. Cryptonite: A secure and performant data repository on public clouds. In Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on, pp. 510–517, 2012.

S. Gupta, S.R. Satapathy, P. Mehta, and A. Tripathy. A secure and searchable data storage in cloud computing. In Advance Computing Conference (IACC), 2013 IEEE 3rd International, pages 106–109, 2013.

Raluca Ada Popa, JacobR.Lorch, DavidMolnar, HelenJ.Wang, and LiZhuang. Enabling security in cloud storage SLAs with cloud proof. In Proceedings of the 2011USENIX conference on USENIX annual technical conference, USENIXATC’11, pages 31–31, Berkeley, CA, USA, 2011. USENIX Association.

Guojun Wang, Qin Liu, and Jie Wu. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In Proceedings of the 17th ACM conference on Computer and communications security, CCS ’10, pp. 735–737, New York, NY, USA, 2010. ACM.

Zhiguo Wan, Jun’e Liu, and R.-H. Deng. Hasbe: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. Information Forensics and Security, IEEE Transactions on, Vol. 7, No. 2, pp. 743–754, 2012.

Kan Yang and Xiaohua Jia. Attributed-based access control for multi-authority systems in cloud storage. In Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International Conference on, pp. 536–545, 2012.

Zhu Tianyi, Liu Weidong, and Song Jiaxing. An efficient role-based access control system for cloud computing. In Computer and Information Technology (CIT), 2011 IEEE 11th International Conference on, pp. 97–102, 2011.

Amit Sangroya, Saurabh Kumar, Jaideep Dhok, and Vasudeva Varma. Towards analyzing data security risks in cloud computing environments. In Sushil K. Prasad, Harrick M. Vin, Sartaj Sahni, MahadeoP. Jaiswal, and Bundit Thipakorn, editors, Information Systems, Technology and Management, volume 54 of Communications in Computer and Information Science, pages 255–265. Springer Berlin Heidelberg, 2010.

S. Berger, R. C´aceres, K. Goldman, D. Pendarakis, R. Perez, J. R. Rao, E. Rom, R. Sailer, W. Schildhauer, D. Srinivasan, S. Tal, and E. Valdez. Security for the cloud infrastructure: trusted virtual data center implementation. IBM J. Res. Dev., Vol. 53, No. 4, pp. 560–571, July 2009.

Sirisha and G.G. Kumari. API access control in cloud using the role-based access control model. In Trendz in Information Sciences Computing (TISC), 2010, pages 135–137, 2010.

Hema Andal Jayaprakash Narayanan, Mehmet Hadi Gunes, “Ensuring access control in cloud provisioned health care systems”, IEEE Consumer Communications and Networking Conference, 2011.

Li J, Wang H, Zhang Y, Shen J (2016) Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing. Ksii Transactions on Internet & Information Systems 10: 3339–3352

Hu, D. Ferraiolo, Kuhn, Information Technology Laboratory National Institute Standards, and Technology. Assessment of Access Control Systems, Interagency Report 7316. Technical report, National Institute of Standards and Technology, 2006.

Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis Kafura, and Sumit Shah. First experiences using XACML for access control in distributed systems. In Proceedings of the 2003 ACM workshop on XML security, XMLSEC ’03, pages 25–37, New York, NY, USA, 2003. ACM.

Rathish, C. R., and A. Rajaram. "Efficient path reassessment based on node probability in wireless sensor network." International Journal of Control Theory and Applications 34.2016 (2016): 817-832.

Kumar, K. Vinoth, and A. Rajaram. "Energy efficient and node mobility-based data replication algorithm for MANET." (2019).

CR Rathish, A Rajaram, "Sweeping inclusive connectivity-based routing in wireless sensor networks," ARPN Journal of Engineering and Applied Sciences, vol. 3, no. 5. pp. 1752-1760, 2018.

K. Mahalakshmi, K. Kousalya, Himanshu Shekhar, Aby K. Thomas, L. Bhagyalakshmi, Sanjay Kumar Suman, S. Chandragandhi, Prashant Bachanna, K. Srihari, Venkatesa Prabhu Sundramurthy, "Public Auditing Scheme for Integrity Verification in Distributed Cloud Storage System", Scientific Programming, vol. 2021, Article ID 8533995, 5 pages, 2021. https://doi.org/10.1155/2021/8533995.

J. Divakaran, Somashekhar Malipatil, Tareeq Zaid, M. Pushpalatha, Vilaskumar Patil, C. Arvind, T. Joby Titus, K. Srihari, M. Ragul Vignesh, Baswaraj Gadgay, Venkatesa Prabhu Sundramurthy, "Technical Study on 5G Using Soft Computing Methods", Scientific Programming, vol. 2022, Article ID 1570604, 7 pages, 2022. https://doi.org/10.1155/2022/1570604.

S. Shitharth, Pratiksha Meshram, Pravin R. Kshirsagar, Hariprasath Manoharan, Vineet Tirth, Venkatesa Prabhu Sundramurthy, "Impact of Big Data Analysis on Nanosensors for Applied Sciences Using Neural Networks", Journal of Nanomaterials, vol. 2021, Article ID 4927607, 9 pages, 2021. https://doi.org/10.1155/2021/4927607.

Upadhyay, G. M., et al. "Impact of Nanotechnology in the Development of Smart Cities." NanoWorld J 9.S5 (2023): S313-S318.

Upadhyay GM, Kumar S, Chawla R, Gupta SK. 2023. Impact of Nanotechnology in the Development of Smart Cities. NanoWorld J 9(S5): S313-S318.

Upadhyay, Govind Murari, and Shashi Kant Gupta. "A Novel Approach for Minimizing the Latency in Fog Computing." NVEO-NATURAL VOLATILES & ESSENTIAL OILS Journal| NVEO (2021): 12882-12892.

Varshney, Pankaj Kumar, and Govind Murari Upadhyay. "Significance of terrain dimension on the performance of wireless ad hoc proactive routing protocols." INROADS-An International Journal of Jaipur National University 6.2 (2017): 143-149.

Vats, P., Mandot, M., & Gosain, A. (2014, February). A comparative study of Genetic Algorithms for its applications in Object oriented testing. In 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) (pp. 559-565). IEEE.

Vats, P. (2014, March). A novel study of fuzzy clustering algorithms for their applications in various domains. In The 4th joint international conference on information and communication technology, electronic and electrical engineering (JICTEE) (pp. 1-6). IEEE.

Vats, Prashant, et al. "A multi-factorial code coverage-based test case selection and prioritization for object oriented programs." ICT Systems and Sustainability: Proceedings of ICT4SD 2020, Volume 1. Springer Singapore, 2021.

Aalam, Zunaid, et al. "A comprehensive analysis of testing efforts using the avisar testing tool for object oriented softwares." Intelligent Sustainable Systems: Selected Papers of WorldS4 2021, Volume 2. Springer Singapore, 2022.

Sharma, Nishi, et al. "A robust framework for governing blockchain-based distributed ledgers during COVID-19 for academic establishments." ICT with Intelligent Applications: Proceedings of ICTIS 2022, Volume 1. Singapore: Springer Nature Singapore, 2022. 35-41.

Sharma, Anupam Kumar, et al. "Deep learning and machine intelligence for operational management of strategic planning." Proceedings of Third International Conference on Computing, Communications, and Cyber-Security: IC4S 2021. Singapore: Springer Nature Singapore, 2022.

Gupta, Anjani, et al. "A sustainable green approach to the virtualized environment in cloud computing." Smart Trends in Computing and Communications: Proceedings of SmartCom 2022. Singapore: Springer Nature Singapore, 2022. 751-760.

Varshney, Shipra, et al. "A blockchain-based framework for IoT based secure identity management." 2022 2nd international conference on innovative practices in technology and management (ICIPTM). Vol. 2. IEEE, 2022.

Downloads

Published

24.03.2024

How to Cite

Devender Kumar , Sandeep Kumar Budhani , Saneh Lata Yadav , Prashant Vats , Shalendra Kumar , G. M. U. . (2024). A Study on Enhanced Cloud-Based Storage with Confidentiality Assurance, Verifiable Access Control, and Improved MD5 Schema . International Journal of Intelligent Systems and Applications in Engineering, 12(3), 2643–2652. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5737

Issue

Section

Research Article