scholarly journals Ensuring Better Privacy of Cloud Storage Using Elliptic Curve Cryptography

Author(s):  
A. V. Deorankar ◽  
Khushboo T. Khobragade

Cloud technology is very profitable for the business evolution. In cloud computing, the data is mostly outsourced. The security and integrity of the data in the cloud system is always a main worry. Because of rapid development of adaptable cloud services, it becomes increasingly vulnerable to use cloud services to share data in a friend circle in the environment of cloud computing. The user privacy is also an important concern. Many systems and technique are being developed to address these issues, but still there is always a scope of improvement. While addressing the issues related to the user privacy and data security and integrity, we must consider the efficiency of the system while accessing and searching for the data. In this paper, we discuss about the major challenges in cloud environment. Also, presented is a brief overview on proposed system with elliptical curve cryptography is a public key encryption technique uses the properties of elliptic curve in order to generate keys instead of using the traditional methodology of generation of keys.

Author(s):  
Fangfang Shan ◽  
Hui Li ◽  
Fenghua Li ◽  
Yunchuan Guo ◽  
Jinbo Xiong

With the rapid development of cloud computing, it has been increasingly attractive for individuals and groups to store and share data via cloud storage. Once stored in the third-party cloud storage service providers, the privacy and integrity of outsourced data should be attached with more attention as a challenging task. This article presents the attribute-based assured deletion scheme (AADS) which aims to protect and assuredly delete outsourced data in cloud computing. It encrypts outsourced data files with standard cryptographic techniques to guarantee the privacy and integrity, and assuredly deletes data upon revocations of attributes. AADS could be applied to solve important security problems by supporting fine-grained attribute-based policies and their combinations. According to the comparison and analysis, AADS provides efficient data encryption and flexible attribute-based assured deletion for cloud-stored data with an acceptable concession in performance cost.


Author(s):  
P. NagaRaju ◽  
N. Nagamalleswara Rao

Cloud computing (CC) is one amongst the developing technologies, which get more attention from academia as well as industries. It offers diverse benefits like sharing computing resources, service flexibility, reducing costs, etc. The Cloud Services Provider (CSP) is accountable for the data that are delivered to the cloud. The threat of seeing the stored data and using sensitive raw data by strangers is the main barrier in the utilization of cloud services. So, Data Security (DS) along with privacy is the chief issue, which is an obstacle while adopting the CC. Countless techniques are existent for ensuring data confidentiality, but they do not completely give protection to the data. To trounce these drawbacks, this paper introduces the Obfuscation (OB) based Modified Elliptical Curve Cryptography (MECC) algorithm for protecting data as of malicious attacks, which is termed as OB-MECC. Primarily, the proposed method obfuscates the data before they are uploaded to the cloud. For the OB of the data, the proposed work employs methods like substitution cipher (SC), position update, Ceaser cipher, binary conversion, 8-bit binary conversion, decimal(),  two complex(), and ASCII(). Then, encryption of the obfuscated data is done with the utilization of the MECC algorithm. After encryption, the data on the cloud is retrieved. The retrieved data is then decrypted by reversing the OB and encryption process to get the actual data. The outcomes corroborate that the confidentiality and security level are maximum for the proposed OB-MECC when contrasted to the existing approaches.


2021 ◽  
Vol 11 (2) ◽  
pp. 193-199
Author(s):  
Anuj Kumar Yadav ◽  
Ritika ◽  
Madan Garg

Cloud computing has emerged as a potential substitute over traditional computing systems during the time of the COVID-19 pandemic. Almost all organizations shift their working from conventional ways to the online form of working. Most of the organizations are planning to permanently change some % of their work to online WFH (Work from Home) mode. There are numerous benefits of using cloud services in terms of cost, portability, platform independence, accessibility, elasticity, etc. But security is the biggest barrier when one wants to move towards cloud computing services, especially the cloud storage service. To overcome the problem of security in cloud storage systems, we have presented an approach for data security in cloud storage. The proposed approach uses the cryptographic methods and provides security and monitoring features to the user data stored in cloud storage systems. The proposed approach continuously monitors user’s data for any kind of modification by attackers. Thus, approach not only provides data security but also improves user’s trust on cloud based storage services.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2664 ◽  
Author(s):  
Luis Belem Pacheco ◽  
Eduardo Pelinson Alchieri ◽  
Priscila Mendez Barreto

The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security.


2018 ◽  
Vol 8 (12) ◽  
pp. 2519
Author(s):  
Wei Li ◽  
Wei Ni ◽  
Dongxi Liu ◽  
Ren Liu ◽  
Shoushan Luo

With the rapid development of cloud computing, it is playing an increasingly important role in data sharing. Meanwhile, attribute-based encryption (ABE) has been an effective way to share data securely in cloud computing. In real circumstances, there is often a mutual access sub-policy in different providers’ access policies, and the significance of each attribute is usual diverse. In this paper, a secure and efficient data-sharing scheme in cloud computing, which is called unified ciphertext-policy weighted attribute-based encryption (UCP-WABE), is proposed. The weighted attribute authority assigns weights to attributes depending on their importance. The mutual information extractor extracts the mutual access sub-policy and generates the mutual information. Thus, UCP-WABE lowers the total encryption time cost of multiple providers. We prove that UCP-WABE is selectively secure on the basis of the security of ciphertext-policy weighted attribute-based encryption (CP-WABE). Additionally, the results of the implementation shows that UCP-WABE is efficient in terms of time.


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
K. A. Fedosiva ◽  
◽  
I. M. Sribna

The article is devoted to the analysis of the Ukrainian market for the spread of cloud technologies, an overview of growth dynamics, application segments and identifies leading companies that offer services using cloud computing. According to the unanimous forecasts of the world’s leading consulting companies, the rapid improvement and spread of cloud computing is now one of the key trends that in the next 5-8 years will significantly affect the global development of not only the IT industry but also business, finance, public administration, medicine, education and many other areas of human life. Prospects for the rapid development of cloud services in Ukraine encourage more careful consideration of the experience of their application in more «mature» markets and identify the main benefits and risks of these technologies in local conditions. People perceive the cloud as a platform only for storage and computing. However, there are many other opportunities that cloud technologies offer with cloud computing. Currently, cloud computing technologies are becoming increasingly popular. The advantages of this technology are obvious: economy, speed, elasticity, versatility of access. In the future, their use will create a powerful information and telecommunications system, which will be a technological solution for the construction and development of new infrastructure in the country. The world’s largest IT vendors (Microsoft, Amazon, Google and others) somehow implement cloud computing services, providing a wide range of opportunities for users. Thus, cloud computing is software and hardware that is available to the user via the Internet (or local network) in the form of a service that allows you to use a user-friendly web interface for remote access to dedicated resources (computing resources, programs and data). Thus, cloud computing is the next stage of information development of mankind.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Shurui Gao ◽  
Weidong Meng

PurposeCloud-based technologies are reliably improving Information Technology (IT) environment incorporating changes and modifications to the present business structure. Cloud computing enables small and medium-sized businesses (SMBs) to organize and exchange pertinent data and information in real time. This study checks out the influence of cloud-based services (IT infrastructure, expenses of cloud services, cloud data security and IT knowledge of human resources) on customers' satisfaction in SMBs.Design/methodology/approachCloud computing offers a way to coordinate and share organizational and personal information and data. The adoption of cloud services is one of the most emerging technological advances in the current competitive business environment. Cloud-based services allow start-ups or SMBs to take advantage of technological advancements and respond more quickly to changing consumer demands. In the available literature, cloud computing has received a lot of attention. However, there is also a research gap in creating a paradigm that links the value development drivers in the electronic industry with the leveraging impact of cloud and intercloud computing resources for start-ups and SMBs. A hypothetical model was constructed based on a literature review, and the associations between the latent variables were investigated utilizing structural equations.FindingsFindings from the study confirmed the validity of the proposed model for customer satisfaction assessment. Besides, the results showed that customer satisfaction is affected by cloud-based services in SMBs. The results illustrated that IT infrastructure influences customer satisfaction significantly and positively, with a T-value of 2.42. Also, the results confirmed that the cost of cloud services with a T-value of 2.68 affects customer satisfaction significantly and positively. Cloud data security also impacts customer satisfaction with a T-value of 5.20. The results also showed that the IT knowledge of human resources affects customer satisfaction with a T-value of 3.01.Originality/valueThe main originality of this research is proposing a new conceptual model to assess the impact of cloud-based services on the satisfaction of the customers in SMBs.


Author(s):  
Djamel Benmerzoug

The challenges that Cloud computing poses to business processes integration, emphasize the need for addressing two major issues: (i) which integration approach should be used allowing an adequate description of interaction aspects of the composed software components ? (ii) how are these interaction descriptions stored and shared to allow other software artifacts to (re)use them ? To address these issues, in this paper the authors propose an Agent Interaction Protocols (AiP)-based approach for reusing and aggregating existing Cloud services to create a new desired business application. The proposed approach facilitates rapid development and provisioning of composite Cloud services by specifying what to compose as an AiP. Furthermore, the authors develop an agent-based architecture that supports flexible scaling of business processes in a virtualized Cloud computing environment. The main goal of the proposed architecture is to address and tackle interoperability challenges at the Cloud application level. It solves the interoperability issues between heterogeneous Cloud services environments by offering a harmonized API. Also, it enables the deployment of applications at public, private or hybrid multi-Cloud environments.


2018 ◽  
Vol 16 (1) ◽  
pp. 1-16 ◽  
Author(s):  
Mbarek Marwan ◽  
Ali Kartit ◽  
Hassan Ouahmane

Nowadays, modern healthcare providers create massive medical images every day because of the recent progress in imaging tools. This is generally due to the increasing number of patients demanding medical services. This has resulted in a continuous demand of a large storage space. Unfortunately, healthcare domains still use local data centers for storing medical data and managing business processes. This has significant negative impacts on operating costs associated with licensing fees and maintenance. To overcome these challenges, healthcare organizations are interested in adopting cloud storage rather than on-premise hosted solutions. This is mainly justified by the scalability, cost savings and availability of cloud services. The primary objective of this model is to outsource data and delegate IT computations to an external party. The latter delivers needed storage systems via the Internet to fulfill client's demands. Even though this model provides significant cost advantages, using cloud storage raises security challenges. To this aim, this article describes several solutions which were proposed to ensure data protection. The existing implementations suffer from many limitations. The authors propose a framework to secure the storage of medical images over cloud computing. In this regard, they use multi-region segmentation and watermarking techniques to maintain both confidentiality and integrity. In addition, they rely on an ABAC model to ensure access control to cloud storage. This solution mainly includes four functions, i.e., (1) split data for privacy protection, (2) authentication for medical dataset accessing, (3) integrity checking, and (4) access control to enforce security measures. Hence, the proposal is an appropriate solution to meet privacy requirements.


Author(s):  
Е.А. Исаев ◽  
E.A. Isaev

The rapid development of information technology in today's society dictates new requirements for information security technologies of data, methods of remote access and data processing, integrated reduction of financial expenses on working with information. In recent years, the ideal solution to all these problems that is widely suggested is the concept of cloud computing. This technique really makes a number of clear advantages when working with information and is already widely used in a number of areas of scientific and business activities, but many aspects of information security, characteristic of cloud computing is still far from a satisfactory solution. The article discusses the main challenges of information security of cloud computing. A review of methods to ensure data security, the choice of the most secure cloud computing is discussed, and models to provide the method of increasing the security of cloud computing are looked at.


Sign in / Sign up

Export Citation Format

Share Document