An enhanced security tree to secure cloud data

  • Authors

    • S. Renu
    • S.H. Krishna Veni
  • Trusted Third Party, Security Tree, Data Security, Data Classification, Data Storage.
  • The Cloud computing services and security issues are growing exponentially with time. All the CSPs provide utmost security but the issues still exist. Number of technologies and methods are emerged and futile day by day. In order to overcome this situation, we have also proposed a data storage security system using a binary tree approach. Entire services of the binary tree are provided by a Trusted Third Party (TTP) .TTP is a government or reputed organization which facilitates to protect user data from unauthorized access and disclosure. The security services are designed and implemented by the TTP and are executed at the user side. Data classification, Data Encryption and Data Storage are the three vital stages of the security services. An automated file classifier classify unorganized files into four different categories such as Sensitive, Private, Protected and Public. Applied cryptographic techniques are used for data encryption. File splitting and multiple cloud storage techniques are used for data outsourcing which reduces security risks considerably. This technique offers  file protection even when the CSPs compromise. 

  • References

    1. [1] The California State University (CSU) 8065.S02 Information Security Data Classification.

      [2] Renu S, “A Novel Method to Classify Organizational Data Using CIA Tree approachâ€, IEEE Explore, pp.1-5, (2015).

      [3] Renu S & Krishnaveni SH, “An Enhanced Automated Data Classification System Using Complex Networkâ€, IJCTA, Vol.8, No5, pp. 2301-2306, (2015).

      [4] A. Surendar and Usha Rani Nelakuditi, “Editorial - New Developments in Electronics, Cloud and IoTâ€, Electronic Government, An International Journal, Vol. 13, No. 4, 2017, ISSN online: 1740-7508 ISSN print: 1740-7494,pp -287-289

      [5] Naone E, “Are we safeguarding social data? Technologyâ€, MIT Review, (2009).

      [6] Sarno D, Microsoft says lost sidekick data will be restored to users, Los Angeles Times, (2009).

      [7] Abu-Libdeh H, Princehouse L & Weatherspoon H, “RACS: a case for cloud storage diversityâ€, Proceedings of the 1st ACM symposium on Cloud computing, pp. 229-240, (2010).

      [8] Viega J, “Cloud computing and the common manâ€, Computer, Vol.42, pp.106-108, (2009).

      [9] Cachin C, Keidar I & Shraer A, “Trusting the cloudâ€, ACM SIGACT News, Vol.40, pp.81-86, (2009).

      [10] Wang C, Wang Q, Ren K & Lou W, “Ensuring data storage security in cloud computingâ€, ARTCOM'10: Proc. Intl. Conf. on Advances in Recent Technologies in Communication and Computing, pp.1-9, (2010).

      [11] Wang C, Wang Q, Ren K, Cao N & Lou W, “Toward secure and dependable storage services in cloud computingâ€, IEEE transactions on Services Computing, Vol.5, No.2, pp.220-232, (2012).

      [12] Wang C, Wang Q, Ren K & Lou W, “Ensuring Data Storage Security in Cloud Computingâ€, Proc. 17th Int’l Workshop Quality of Service, pp.1-9, (2009).

      [13] Lin HY & Tzeng WG, “A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwardingâ€, IEEE Transactions Parallel and Distributed Systems, Vol.23, No.6, pp.995-1003, (2012).

      [14] Wang Q, Wang C, Ren K, Lou W & Li J, “Enabling public auditability and data dynamics for storage security in cloud computingâ€, IEEE transactions on parallel and distributed systems, Vol.22, No.5, pp.847-859, (2011).

      [15] Sood SK, “A combined approach to ensure data security in cloud computingâ€, Journal of Network and Computer Applications, Vol. 35, pp.1831–1838, (2012).

      [16] Esposito C, Castiglione A, Tudorica CA & Pop F, “Security and Privacy for Cloud-Based Data Management in the Health Network Service Chain: A Microservice Approachâ€, IEEE Communications Magazine, Vol.55, No.9, pp.102-108, (2017).

      [17] Chen H, Zhu X, Qiu D, Liu L & Du Z, “Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Cloudsâ€, IEEE transactions on Parallel and Distributed Systems, Vol.28, No.9, pp:2674–2688, (2017).[18] Kolhar M, Abu-Alhaj MM & El-atty SMA, “Cloud Data Auditing Techniques with a Focus on Privacy and Securityâ€, IEEE Security & Privacy, Vol.15, No.1, pp.42-51, (2017).[19] Barona R & Mary Anitha EA, “A survey on data breach challenges in cloud security: Issues and threatsâ€, International Conference Circuit, Power and Computing Technologies, (2017).[20] Renu S & Krishnaveni SH, An Enhanced CIA tree Using String Matching Algorithms, IJAER, Vol.12, No.16, pp-6123-6126, (2017).[21] Surendar, A., Arun, M., Periasamy, P.S.â€Hardware based algorithms for bioinformatics applications - A surveyâ€,(2013) International Journal of Applied Engineering Research, 8 (6), pp. 745-754.[22] B. Saichandana, G. Rachana sri, A. Surendar and B. Suniltej “controlling of wall lamp using arduinoâ€, International Journal of Pure and Applied Mathematics, Volume 116 No. 24 2017, 349-354, ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version)
  • Downloads

  • How to Cite

    Renu, S., & Krishna Veni, S. (2017). An enhanced security tree to secure cloud data. International Journal of Engineering & Technology, 7(1.1), 64-70.