Open Access Open Access  Restricted Access Subscription Access

Effective Security in Comparison to Distributed Storage

Rahul Krishna K

Abstract


Because it makes it possible to access a large amount of data that is stored in the cloud and transferred over the internet, businesses can benefit from cloud computing. There are no hardware compatibility restrictions on this data, which can be accessed without restriction. However, man in the middle, ciphered text, and pollution attacks can all compromise data transmission. Additionally, this vulnerability poses a significant threat of confidential data loss. SA-EDS, RFDA, and EST are just a few of the cryptography methods highlighted in a recent literature review for multi-cloud data storage security. However, the current methods made it possible for numerous attacks. The data are divided into two categories by PSDS: as typical and delicate. This further divides sensitive into two categories. When compared to the standard, which is transmitted over a single cloud with encryption enabled, the first and second are then encrypted and transmitted over multiple clouds. This PSDS method has been tested against a variety of attacks and has been shown to block all of them, including the man in the middle attack, the known ciphered text attack, the pollution attack, and many others. Additionally, PSDS takes less time to compute than the STTN and RFD encryption processes.

Full Text:

PDF

References


P. Kumar, P. S. Kumar, and P. J. A. Alphonse, ‘‘Attribute based encryption in cloud computing: A survey, gap analysis, and future directions,’’ J. Netw. Comput. Appl., vol. 108, pp. 37–52, Apr. 2018, doi: 10.1016/ j.jnca.2018.02.009.

A. Botta, W. de Donato, V. Persico, and A. Pescapé, ‘‘Integration of cloud computing and Internet of Things: Asurvey,’’Future Gener. Comput. Syst., vol. 56, pp. 684–700, Mar. 2016.

S. Ramgovind, M. M. Eloff, and E. Smith, ‘‘The management of security in cloudcomputing,’’in Proc. Inf. Secur. South Africa ,Aug.2010, pp. 1–7.

S. Chandra, B. Mandal, S. S. Alam, and S. Bhattacharyya, ‘‘Content based double encryption algorithm using symmetric key cryptography,’’ Procedia Comput. Sci., vol. 57, pp. 1228– 1234, Jan. 2015.

R. F. Olanrewaju, B. U. I. Khan, A. Baba, R. N. Mir, and S. A. Lone, ‘‘RFDA: Reliable framework for data administration based on split-merge policy,’’ in Proc. SAI Comput. Conf. (SAI), Jul. 2016, pp. 545–552.

D. P. Yellamma, D. B. C. Narasimham, and M. T. Kumar, ‘‘Cloud computing security using secret sharing algorithm over single tomulti-clouds,’’ Latest Res. Eng. Manag., vol. 1, pp. 1–6, Apr. 2016.

Y. Li, K. Gai, L. Qiu, M. Qiu, and H. Zhao, ‘‘Intelligent cryptography approach for secure distributed big data storage in cloud computing,’’ Inf. Sci., vol. 387, pp. 103– 115, May 2017.

B. S. Rawal, V. Vijayakumar, G. Manogaran, R. Varatharajan, and N. Chilamkurti, ‘‘Secure disintegration protocol for privacy preserving cloud storage,’’ Wireless Pers. Commun., vol. 103, no. 2, pp. 1161–1177, Nov. 2018.

O.Zibouh ,A.Dalli ,and H.Drissi, ‘‘Cloud computing security through parallelizing fully homomorphic encryption applied multi-cloudapproach,’’ J. Theor. Appl. Inf. Technol., vol. 87, no. 2, pp. 300–307, 2016.

K. Subramanian and F. L. John, ‘‘Secure and reliable unstructured data sharing in multi-cloud storage using the hybrid crypto system,’’ Int. J. Comput. Sci. Netw. Secur., vol. 17, no. 6, pp. 196–206, 2017.


Refbacks

  • There are currently no refbacks.