Abstract

Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party's premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions.

Highlights

  • In today’s global electronic village, cloud computing is emerging rapidly as a ubiquitous internet based computing service

  • Following is the list of industry standard cryptography algorithms which can be applied for the classified data [15]: (i) Advanced Encryption Standard (AES), 128, 192, or 256 bits, (ii) Rivest Cipher 6 (RC6), 256 bits, (iii) Blowfish, 128 or 448 bits, (iv) Triple Data Encryption Standard (Triple DES), 112 or 168 bits, (v) Rivest Cipher 4 (RC4), 128, (vi) International Data Encryption Algorithm (IDEA), 128, (vii) Carlisle Adams and Stafford Tavares (CAST), 128, (viii) Rivest Cipher (RC5), 128, (ix) Secure and Fast Encryption Routine (SAFER), 128 bits, (x) Rivest-Shamir-Adleman (RSA), minimum 1024 bits, (xi) Elliptic Curve Cryptography (ECC), minimum 384 bits, (xii) Symmetric Substitution and Transposition Techniques

  • In spite of significant benefits, concerns about data security hold back cloud adoption widely

Read more

Summary

Introduction

In today’s global electronic village, cloud computing is emerging rapidly as a ubiquitous internet based computing service. Cloud computing requires strong security in its foundational elements like virtualization, distributed computing, SOA, broadband networks, application, data transmission, data storage, and so forth. These cloud fundamental elements require adequate security that varies with respect to the deployment model being used by the cloud user [2]. The data migrated to cloud is being accessed and shared by several internal and external users and it is highly important for an organization to defend their data from unauthorized access, use, and disclosure that may be detrimental to the organization These data security threats force the data owners to provide adequate security in order to protect their sensitive data. The rest of the paper is organized as follows: Section 2 elaborates security challenges and measures to protect the data stored in cloud, Section 3 deals with proposed security framework, Section 4 discusses implementation and results, and Section 5 concludes with conclusion

Security Measures to Protect Stored Data
Measure 1
Measure 2
Measure 3
Measure 4
Measure 5
Data Security Framework for Cloud Environment
D11 Decrypting data
Implementation and Results
Conclusion
Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call