Abstract
In spite of all the advantages delivered by cloud computing, several challenges are hindering the migration of customer software and data into the cloud. On top of the list is the security and privacy concerns arising from the storage and processing of sensitive data on remote machines that are not owned, or even managed by the customers themselves. In this paper, initially a homomorphic encryption-based Cryptographic Agent is proposed. The proposed Cryptographic Agent is based on Paillier scheme, and is supported by user-configurable software protection and data privacy categorization agents, as well as set of accountable auditing services required to achieve legal compliance and certification. This scheme was tested using different text documents with different sizes. Testing results showed that as the size of the document increases, the size of the generated key increases dramatically causing a major problem in regards to the processing time and the file size especially for large documents. This leaded us to the second part of this research which is: a modified security architecture that adds two major autonomic security detective agents to the multi-agent architecture of cloud data storage. In this paper, we focus on the first agent namely (Automated Master Agent, AMA) that is added to the Multi Agent System Architecture (MASA) layer (cloud client-side) by which any changes happen in the document are mapped in a QR code encoded key print (KP). Experimental results after integrating these agents showed a 100% alternation detection accuracy and a superiority in extracting the KP of large and very large size documents which exceeds the currently available products and leverage the tamper-proof capabilities of cryptographic coprocessors to establish a secure execution domain in the computing cloud that is physically and logically protected from unauthorized access.
Highlights
Due to the fast development of cloud computing technologies, there’s been a remarkable increase in the cloud services which made the job for securing user’s data more challenging and one of the hottest research areas [1]
In 2014, the international data cooperation (IDC) conducted a survey showing that 87.5% from IT executives to chief executive officers (CEOs) believe that the challenge that faces every cloud service lies in its security [2]
The Final Matrix (FM), which is the output of this agent, and the second of the two matrices that would be the input for the QR Code Encoding Agent
Summary
Due to the fast development of cloud computing technologies, there’s been a remarkable increase in the cloud services which made the job for securing user’s data more challenging and one of the hottest research areas [1]. When data arrives to the data center; data at rest in the life cycle, the users lose any physical possession over them They only use Virtual Machines (VMs) interfaces to have partial control over the data [7], and the cloud service providers are responsible for managing the underlying systems and have constant access to the VM. This threatens the security in terms of its integrity and confidentiality [8]. As data auditing entitles the service providers to take the appropriate measures to ensure user’s data security and gives the users the ability to verify that these measures are up and running, i.e. it gives the users the transparency of how their data is being handled [13]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Interactive Mobile Technologies (iJIM)
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.