Abstract

In today’s society, cloud computing has significantly impacted nearly every section of our lives and business structures. Cloud computing is, without any doubt, one of the strategic directions for many companies and the most dominating infrastructure for enterprises as long as end users. Instead of buying IT equipment (hardware and/or software) and managing it themselves, many organizations today prefer to buy services from IT service providers. The number of service providers increase dramatically and the cloud is becoming the tools of choice for more cloud storage services. However, as more personal information and data are moved to the cloud, into social media sites, DropBox, Baidu WangPan, etc., data security and privacy issues are questioned. Daily, academia and industry seek to find an efficient way to secure data migration in the cloud. Various solution approaches and encryption techniques have been implemented. In this work, we will discuss some of these approaches and evaluate the popular ones in order to find the elements that affect system performance. Finally, we will propose a model that enhances data security and privacy by combining Advanced Encryption Standard-256, Information Dispersal Algorithms and Secure Hash Algorithm-512. Our protocol achieves provable security assessments and fast execution times for medium thresholds.

Highlights

  • Over the past several decades, our IT society has been overwhelmed by a new buzzword of “going Cloud”

  • Consumers move information into the cloud without any consideration of security. Once their data is outsourced to the cloud service providers, they have to trust the CSP, which means that data is out of control and the service provider can access the data in the cloud at any time

  • We have described throughout this paper a number of key risks associated with cloud data storage and examined the existing ways of mitigating data security and privacy threats

Read more

Summary

Introduction

Over the past several decades, our IT society has been overwhelmed by a new buzzword of “going Cloud”. This new buzzword refers to a business moving toward cloud computing. The basic premise of cloud computing is that consumers (individuals, industry, government, academia and so on) pay for IT services from cloud service providers (CSP). There are a ton of services on the internet that consumers can take advantage of. As more cloud-based services available to users, their oceans of data are outsourced in the cloud as well. The cloud becomes, the tools of choice for more data storage services

Lower Complexity and Costs
Archival and Disaster Recovery Purposes
Greater Accessibility and Reliability
Cloud Storage Security and Privacy Threats
Cryptographic Algorithms
Symmetric-Key Algorithm Also Known as Secret Key Encryption
Asymmetric-Key Algorithm or Public-Key Encryption
Data Masking or Obfuscation
Information Dispersal Algorithm
Existing Solutions and Prior Works
Proposed Model
Overview of the Encoding Process
Procedure
Overview of the Decoding Process
Experimental And Result Evaluations
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call