An enhanced security tree to secure cloud data
Keywords:Trusted Third Party, Security Tree, Data Security, Data Classification, Data Storage.
The Cloud computing services and security issues are growing exponentially with time. All the CSPs provide utmost security but the issues still exist. Number of technologies and methods are emerged and futile day by day. In order to overcome this situation, we have also proposed a data storage security system using a binary tree approach. Entire services of the binary tree are provided by a Trusted Third Party (TTP) .TTP is a government or reputed organization which facilitates to protect user data from unauthorized access and disclosure. The security services are designed and implemented by the TTP and are executed at the user side. Data classification, Data Encryption and Data Storage are the three vital stages of the security services. An automated file classifier classify unorganized files into four different categories such as Sensitive, Private, Protected and Public. Applied cryptographic techniques are used for data encryption. File splitting and multiple cloud storage techniques are used for data outsourcing which reduces security risks considerably. This technique offers file protection even when the CSPs compromise.
 The California State University (CSU) 8065.S02 Information Security Data Classification.
 Renu S, â€œA Novel Method to Classify Organizational Data Using CIA Tree approachâ€, IEEE Explore, pp.1-5, (2015).
 Renu S & Krishnaveni SH, â€œAn Enhanced Automated Data Classification System Using Complex Networkâ€, IJCTA, Vol.8, No5, pp. 2301-2306, (2015).
 A. Surendar and Usha Rani Nelakuditi, â€œEditorial - New Developments in Electronics, Cloud and IoTâ€, Electronic Government, An International Journal, Vol. 13, No. 4, 2017, ISSN online: 1740-7508 ISSN print: 1740-7494,pp -287-289
 Naone E, â€œAre we safeguarding social data? Technologyâ€, MIT Review, (2009).
 Sarno D, Microsoft says lost sidekick data will be restored to users, Los Angeles Times, (2009).
 Abu-Libdeh H, Princehouse L & Weatherspoon H, â€œRACS: a case for cloud storage diversityâ€, Proceedings of the 1st ACM symposium on Cloud computing, pp. 229-240, (2010).
 Viega J, â€œCloud computing and the common manâ€, Computer, Vol.42, pp.106-108, (2009).
 Cachin C, Keidar I & Shraer A, â€œTrusting the cloudâ€, ACM SIGACT News, Vol.40, pp.81-86, (2009).
 Wang C, Wang Q, Ren K & Lou W, â€œEnsuring data storage security in cloud computingâ€, ARTCOM'10: Proc. Intl. Conf. on Advances in Recent Technologies in Communication and Computing, pp.1-9, (2010).
 Wang C, Wang Q, Ren K, Cao N & Lou W, â€œToward secure and dependable storage services in cloud computingâ€, IEEE transactions on Services Computing, Vol.5, No.2, pp.220-232, (2012).
 Wang C, Wang Q, Ren K & Lou W, â€œEnsuring Data Storage Security in Cloud Computingâ€, Proc. 17th Intâ€™l Workshop Quality of Service, pp.1-9, (2009).
 Lin HY & Tzeng WG, â€œA Secure Erasure Code-Based Cloud Storage System with Secure Data Forwardingâ€, IEEE Transactions Parallel and Distributed Systems, Vol.23, No.6, pp.995-1003, (2012).
 Wang Q, Wang C, Ren K, Lou W & Li J, â€œEnabling public auditability and data dynamics for storage security in cloud computingâ€, IEEE transactions on parallel and distributed systems, Vol.22, No.5, pp.847-859, (2011).
 Sood SK, â€œA combined approach to ensure data security in cloud computingâ€, Journal of Network and Computer Applications, Vol. 35, pp.1831â€“1838, (2012).
 Esposito C, Castiglione A, Tudorica CA & Pop F, â€œSecurity and Privacy for Cloud-Based Data Management in the Health Network Service Chain: A Microservice Approachâ€, IEEE Communications Magazine, Vol.55, No.9, pp.102-108, (2017). Chen H, Zhu X, Qiu D, Liu L & Du Z, â€œScheduling for Workflows with Security-Sensitive Intermediate Data by Selective Tasks Duplication in Cloudsâ€, IEEE transactions on Parallel and Distributed Systems, Vol.28, No.9, pp:2674â€“2688, (2017). Kolhar M, Abu-Alhaj MM & El-atty SMA, â€œCloud Data Auditing Techniques with a Focus on Privacy and Securityâ€, IEEE Security & Privacy, Vol.15, No.1, pp.42-51, (2017). Barona R & Mary Anitha EA, â€œA survey on data breach challenges in cloud security: Issues and threatsâ€, International Conference Circuit, Power and Computing Technologies, (2017). Renu S & Krishnaveni SH, An Enhanced CIA tree Using String Matching Algorithms, IJAER, Vol.12, No.16, pp-6123-6126, (2017). Surendar, A., Arun, M., Periasamy, P.S.â€Hardware based algorithms for bioinformatics applications - A surveyâ€,(2013) International Journal of Applied Engineering Research, 8 (6), pp. 745-754. B. Saichandana, G. Rachana sri, A. Surendar and B. Suniltej â€œcontrolling of wall lamp using arduinoâ€, International Journal of Pure and Applied Mathematics, Volume 116 No. 24 2017, 349-354, ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version)