Abstract
There is a complex problem regarding security of data in cloud, it becomes more critical when the data in question is highly sensitive. One of the main approaches to overcome this problem is the encryption data at rest, which comes with its own difficulties such as efficient key management, access permissions and similar. In this paper, we propose a new approach to security that is controlled by the IT Security Specialist (ITSS) of the company/organization. The approach is based on multiple strategies of file encryption, partitioning and distribution among multiple storage providers, resulting in increased confidentiality since a supposed attacker will need to first obtain parts of a file from different storage providers, know how to combine them, before any decryption attempt. All details of the strategy used for a particular file are stored on a separate file, which can be considered as a master key for the file contents. Also, we will present each strategy with the results and comments related to the realized measurements.
Highlights
Cloud computing has brought impressive advantages to the clients interested to use cloud services such as flexibility in managing the space, automatic software update, easier access to needed information and pay per use services etc
At this point we can conclude that symmetric algorithms are faster than asymmetric algorithms, whereas the hybrid algorithm are in the middle (it is confirmed form Fig. 9), the difference of the time of execution for Upload/Download is emphasized when the file is large as in our case with size 2969 KB, Table II
Based on the recent trends of cloud computing, security practices in current researches have often overlooked the importance of mutual trust
Summary
Cloud computing has brought impressive advantages to the clients interested to use cloud services such as flexibility in managing the space, automatic software update, easier access to needed information and pay per use services etc. Two major concerns lie on the security of data: Data confidentiality and audibility, which seem to be one of the main obstacles to the adoption of cloud computing. Security concerns are preventing some organizations from adopting cloud computing to their businesses, others are considering using combination of a secure internal private cloud with less secured public cloud. This is an approach where sensitive data can be deployed in private cloud while less sensitive data can be externally deployed in a public cloud
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.