Abstract
The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.
Highlights
Cloud computing has changed the way of delivering computing services [1]
When impersonating the identity of data owner and accessing the cloud, it can upload the files. It can download malicious files, or viruses destroy the safety of cloud computing. erefore, it emphasizes the identity of data owner when it uploads data necessary to ensure that the absence of any fake data owner is not allowed to access the cloud server
We find the process of decrypting data through each user difficult, and we can decrypt data by secret key and private key together to protect the data from any attacks or unauthorized user. is process provides the security of our model so as to ensure that each user can access data safely
Summary
E proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. This model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We implement our model using a simulation of the model called Generation Secure Cloud Server (NG-Cloud). ese results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.