An Enhanced Salted Challenge Response Authentication Mechanism (scram) for Secret Key Authentication and File Sharing Process in Cloud Storage

  • Authors

    • Atif M. , Ph.D Qatan
    2018-11-27
    https://doi.org/10.14419/ijet.v7i4.16.22891
  • In the present digital world, different types of organization generate a huge volume of sensitive data comprising with financial data, health records, electronic health records, personal information and so on. The volume of digital data is tremendously improving at a staggering rate and it is expanding almost each and every year  and outperforming the ability of storage restriction. These data often required to be stored at multiple locations for a long time because of the regulatory compliance and operational purposes. The local management of such great volume of cloud data is costly as well as problematic because of the needs of qualified personnel capability and great storage capacity. While there is a secure drop in the cost of the storage management and hardware storage, cost has become more complex. The Storage-as-a-Service (SaaS) provided by CSPs is a developing solution to lessen the load of huge local data storage and data maintenance cost in terms of outsourcing data storage. In the scenario of outsourcing data, the organization delegates the management and storage of their data to a CSP in the exchange of already declared fees and it has been metered in GB per month. The number of outsourced data is stored on the remote server instead of using private computer systems. This research paper concentrates to provide secure cloud auditing process within the multiple groups of users. In addition this improves the data integrity, provable security and data recovery process. Thus it minimizes the communication complexity and storage cost. The proposed research work based on Enhanced Salted Challenge Response Authentication Mechanism (SCRAM) which is used for secret key authentication and sharing process.

  • References

    1. [1] Kaushal, V., Bala, A. (2011),“Autonomic fault tolerance using haproxy in cloud environmentâ€, International Journal of Advanced Engineering Sciences and Technologies, Vol.7, No.2, PP.54-59

      [2] VeeralakshmiPonnuramu, LathaTamilselvan (2012), “Data Integrity Proof and Secure Computation in Cloud Computingâ€,Journal of Computer Science, Vol.8, No.12, PP.1987-1995.

      [3] Sultan Aldossary, William Allen (2016), “Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutionsâ€,International Journal of Advanced Computer Science and Applications (IJACSA),Vol. 7, No. 4.

      [4] JasbirKaur, SupriyaKinger (2014), “Analysis of Different Techniques Used For Fault Toleranceâ€, International Journal of Computer Science and Information Technologies, Vol. 5, No.3, PP.4086-4090

      [5] SABAHI. F (2011), “Cloud computing security threats and responsesâ€, IEEE 3rd International Conference on Communication Software and Networks (ICCSN), PP.245 – 249

      [6] Akhilesh Kumar Bhardwaj, Surinder, Rajiv Mahajan (2015), “A Modified Heuristic-Block Protocol Model for Privacy and Concurrency in Cloudâ€, International Journal of Advanced Computer Science and Applications, Vol. 6, No. 9, PP. 179-184.

      [7] AnamikaSirohi, Vishal Shrivastava (2015), “Implementing Data Storage in Cloud Computing with HMAC Encryption Algorithm to Improve Data Securityâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 8, PP. 678-684.

      [8] AutadeDhanshri P, Raut S.Y (2015), “Review of Public Integrity Auditing and Group User Revocation for Shared Dynamic Cloud Dataâ€, International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering, Vol. 3, Issue 12, PP. 48-52.

      [9] Aameek Singh, Ling Liu (2008), “Sharoes: A data sharing platform for outsourced enterprise storage environmentsâ€, In Proceedings of the 24th International Conference on Data Engineering, ICDE, IEEE, PP.993-1002.

      [10] AkankshaRana (2015), “Security in Cloud using Implicit Security Model and OTPâ€, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 3, PP.554- 555.

      [11] Ankush R. Nistane, ShubhangiSapkal, R. R. Deshmukh (2016), “Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storage Using Third Party Auditorâ€, International Journal of Advanced Engineering, Management and Science (IJAEMS), Vol-2, Issue-2, PP. 30- 34.

      [12] Aarthi T, Rathi G, Prabakaran R. S (2014), “Towards Secure and Dependable Storage Services in Cloud Computingâ€, International Journal of Modern Engineering Research (IJMER), Vol.4 Issue.1, PP. 194-197.

      [13] E. Aguiar, Y. Zhang, and M. Blanton (2014), “An overview of issues and recent developments in cloud computing and storage securityâ€, High Performance Cloud Auditing and Applications, Springer, PP.3–33.

      [14] ÃineMacDermott, Qi Shi, KashifKifayat (2015), “Detecting Intrusions in Federated Cloud Environments Using Security as a Serviceâ€, International Conference on Developments of E-Systems Engineering (DeSE), PP.91 – 96.

      [15] F. S. Al-Anzi, A. A. Salman, N. K. Jacob, J. Soni (2014), “Towards robust, scalable and secure network storage in cloud computing,†in Digital Information and Communication Technology and it’s Applications (DICTAP), Fourth International Conference on IEEE, PP. 51–55.

      [16] Bo Donga, QinghuaZhenga, FengTiana, Kuo-Ming Chaoc, RuiMaa, RachidAnanec, (2012), “An optimized approach for storing and accessing small files on cloud storageâ€, Journal of Network and Computer Applications, 35 (6), PP.1847–1862.

      [17] BadiAlekhya (2013), “Improving Data Dynamics and Storage Security In Cloud Computingâ€, International Journal of Advancements in Research & Technology, Vol.2, Issue 4, PP. 327- 332.

      [18] R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, I. Brandic (2009), “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility,†Future Generation Computer Systems, Vol.25,No.6, PP. 599-616.

      [19] Boyang Wang, Baochun Li, Hui Li (2015), “Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloudâ€, IEEE Transactions on Services Computing Vol. 8, Issue.1, PP. 92 – 106.

      [20] M. Bellare, P. Rogaway (1966), “The exact security of digital signatures: How to sign with RSA and Rabinâ€, In U. Maurer, editor, Proceedings of Eurocrypt, Springer-Verlag, Vol.1070, PP. 399–416.

      [21] Borja Sotomayor, Rub´en Santiago Montero, Ignacio Mart´ınLlorente, Ian Foster (2008), “Capacity Leasing in Cloud Systems using the OpenNebula Engineâ€,http://haizea.cs.uchicago.edu/pubs/Haizea_CCA08.pdf.

      [22] D. Bogdanov, S. Laur, J. Willemson (2008), “Sharemind: A Framework for Fast Privacy-Preserving Computations,†the 13th European Symposium on Research in Computer Security (ESORICS), https://eprint.iacr.org/2008/289.pdf

      [23] Cash, D., Kup¸cu, A., and Wichs, D. (2013), “Dynamic proofs of retrievability via oblivious ramâ€, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 26-30.

      [24] Cong Wang, Qian Wang, KuiRen, Ning Cao, Wenjing Lou (2012), “Towards Secure and Dependable Storage Services in Cloud Computingâ€, IEEE Transactions on Cloud Computing, Vol.5, Issue.2, PP.1-14.

      [25] Cong Wang, Sherman S.M. Chow, Qian Wang, KuiRen, Wenjing Lou (2013), “Privacy-Preserving Public Auditing for Secure Cloud Storageâ€, IEEE Transactions On Computers, Vol. 62, No. 2, PP. 362 – 375.

  • Downloads

  • How to Cite

    Qatan, A. M. , P. (2018). An Enhanced Salted Challenge Response Authentication Mechanism (scram) for Secret Key Authentication and File Sharing Process in Cloud Storage. International Journal of Engineering & Technology, 7(4.16), 218-224. https://doi.org/10.14419/ijet.v7i4.16.22891