An enhanced security tree to secure cloud data

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The Cloud computing services and security issues are growing exponentially with time. All the CSPs provide utmost security but the issues still exist. Number of technologies and methods are emerged and futile day by day. In order to overcome this situation, we have also proposed a data storage security system using a binary tree approach. Entire services of the binary tree are provided by a Trusted Third Party (TTP) .TTP is a government or reputed organization which facilitates to protect user data from unauthorized access and disclosure. The security services are designed and implemented by the TTP and are executed at the user side. Data classification, Data Encryption and Data Storage are the three vital stages of the security services. An automated file classifier classify unorganized files into four different categories such as Sensitive, Private, Protected and Public. Applied cryptographic techniques are used for data encryption. File splitting and multiple cloud storage techniques are used for data outsourcing which reduces security risks considerably. This technique offers  file protection even when the CSPs compromise. 


  • Keywords


    Trusted Third Party, Security Tree, Data Security, Data Classification, Data Storage.

  • References


      [1] The California State University (CSU) 8065.S02 Information Security Data Classification.

      [2] Renu S, “A Novel Method to Classify Organizational Data Using CIA Tree approach”, IEEE Explore, pp.1-5, (2015).

      [3] Renu S & Krishnaveni SH, “An Enhanced Automated Data Classification System Using Complex Network”, IJCTA, Vol.8, No5, pp. 2301-2306, (2015).

      [4] A. Surendar and Usha Rani Nelakuditi, “Editorial - New Developments in Electronics, Cloud and IoT”, Electronic Government, An International Journal, Vol. 13, No. 4, 2017, ISSN online: 1740-7508 ISSN print: 1740-7494,pp -287-289

      [5] Naone E, “Are we safeguarding social data? Technology”, MIT Review, (2009).

      [6] Sarno D, Microsoft says lost sidekick data will be restored to users, Los Angeles Times, (2009).

      [7] Abu-Libdeh H, Princehouse L & Weatherspoon H, “RACS: a case for cloud storage diversity”, Proceedings of the 1st ACM symposium on Cloud computing, pp. 229-240, (2010).

      [8] Viega J, “Cloud computing and the common man”, Computer, Vol.42, pp.106-108, (2009).

      [9] Cachin C, Keidar I & Shraer A, “Trusting the cloud”, ACM SIGACT News, Vol.40, pp.81-86, (2009).

      [10] Wang C, Wang Q, Ren K & Lou W, “Ensuring data storage security in cloud computing”, ARTCOM'10: Proc. Intl. Conf. on Advances in Recent Technologies in Communication and Computing, pp.1-9, (2010).

      [11] Wang C, Wang Q, Ren K, Cao N & Lou W, “Toward secure and dependable storage services in cloud computing”, IEEE transactions on Services Computing, Vol.5, No.2, pp.220-232, (2012).

      [12] Wang C, Wang Q, Ren K & Lou W, “Ensuring Data Storage Security in Cloud Computing”, Proc. 17th Int’l Workshop Quality of Service, pp.1-9, (2009).

      [13] Lin HY & Tzeng WG, “A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding”, IEEE Transactions Parallel and Distributed Systems, Vol.23, No.6, pp.995-1003, (2012).

      [14] Wang Q, Wang C, Ren K, Lou W & Li J, “Enabling public auditability and data dynamics for storage security in cloud computing”, IEEE transactions on parallel and distributed systems, Vol.22, No.5, pp.847-859, (2011).

      [15] Sood SK, “A combined approach to ensure data security in cloud computing”, Journal of Network and Computer Applications, Vol. 35, pp.1831–1838, (2012).

      [16] Esposito C, Castiglione A, Tudorica CA & Pop F, “Security and Privacy for Cloud-Based Data Management in the Health Network Service Chain: A Microservice Approach”, IEEE Communications Magazine, Vol.55, No.9, pp.102-108, (2017).

      [17] Chen H, Zhu X, Qiu D, Liu L & Du Z, “Scheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Clouds”, IEEE transactions on Parallel and Distributed Systems, Vol.28, No.9, pp:2674–2688, (2017).

      [18] Kolhar M, Abu-Alhaj MM & El-atty SMA, “Cloud Data Auditing Techniques with a Focus on Privacy and Security”, IEEE Security & Privacy, Vol.15, No.1, pp.42-51, (2017).

      [19] Barona R & Mary Anitha EA, “A survey on data breach challenges in cloud security: Issues and threats”, International Conference Circuit, Power and Computing Technologies, (2017).

      [20] Renu S & Krishnaveni SH, An Enhanced CIA tree Using String Matching Algorithms, IJAER, Vol.12, No.16, pp-6123-6126, (2017).

      [21] Surendar, A., Arun, M., Periasamy, P.S.”Hardware based algorithms for bioinformatics applications - A survey”,(2013) International Journal of Applied Engineering Research, 8 (6), pp. 745-754.

      [22] B. Saichandana, G. Rachana sri, A. Surendar and B. Suniltej “controlling of wall lamp using arduino”, International Journal of Pure and Applied Mathematics, Volume 116 No. 24 2017, 349-354, ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version)


 

View

Download

Article ID: 8925
 
DOI: 10.14419/ijet.v7i1.1.8925




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.