Authors:
P. Jhansi Rani,Dr. M. Akkalakshmi,DOI NO:
https://doi.org/10.26782/jmcms.2019.02.00009Keywords:
Cloud computing,data security issues,UCDDES based data encryption,cloud network security,Abstract
Cloud computing is the evolving paradigm that provides the services in which cloud consumers can remotely save their data into the cloud and access the on-demand high-quality applications. In the existing technique explained an Extendable Access Control System procedure supposed that the authority is the trusted party, but in many cases, they may perform an illegal action which causes the data loss. The proposed work encrypted the data through Uncrackable Cipher Dynamic Double Encryption Standard (UCDDES). Generally, the UCDDES contains the key length of 32, 40 and 48. To randomly select the key length reduced the data security issues. After dynamically selecting the key length the data governor sent the key request to the authority. Then based on the obtained key length the data governor generated the partial secret key. It is further used to decrypt the data and stored in the cloud storage. The results improve the security of cloud and access control. It reduces the issue of unauthorized user/ hackers accessing data. It increases the cloud security and prevents from dictionary attacks, brute force attacks, collision attacks, and so on.Refference:
I.Cui, H., Deng, R. H., & Li, Y. (2018). Attribute-based cloud storage with secure provenance over encrypted data.Future Generation Computer Systems,79, 461-472.
II.Di Vimercati, S. D. C., Foresti, S., Jajodia, S., Paraboschi, S., &Samarati, P. (2007, November). A data outsourcing architecturecombining cryptography and access control. InProceedings of the 2007 ACM workshop on Computer security architecture(pp. 63-69). ACM.
III.Divya, S. V., Shaji, R. S., &Venkadesh, P. (2018). An Efficient Data Storage and Forwarding Mechanism Using Fragmentation-Replication and DADR Protocol for Enhancing the Security in Cloud. Journal of Computational and Theoretical Nanoscience,15(1), 111-120.
IV.Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006, October). Attribute-based encryptionfor fine-grained access control of encrypted data. InProceedings of the 13th ACM conference on Computer and communications security(pp. 89-98). Acm.
V.Hur, J. (2013). Improving security and efficiency in attribute-based data sharing.IEEE transactions on knowledge and data engineering,25(10), 2271-2282.
VI.Iyapparaja, M., Navaneethan, C., Meenatchi, S., Kumar, P. J., &Suganya, P. (2017). A Privacy-Preserving Secure Access Control Mechanism in Cloud.
VII.Kumar, K., & Lu, Y. H. (2010). Cloud computing for mobile users: Can offloading computation save energy?.Computer,43(4), 51-56.
VIII.Mell, Peter, and Tim Grance. “The NIST definition of cloud computing.” (2011).
IX.Ning, J., Cao, Z., Dong, X., Liang, K., Wei, L., & Choo, K. K. R. (2018). CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage.IEEE Transactions on Services Computing.
X.Patil, P., Narayankar, P., Narayan, D. G., &Meena, S. M. (2016). A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA, andBlowfish.Procedia Computer Science,78, 617-624.
XI.Qiu, M., Gai, K., Thuraisingham, B., Tao, L., &Zhao, H. (2018). Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financialindustry.Future Generation Computer Systems,80, 421-429.
XII.Sahai, A., & Waters, B. (2005, May). Fuzzy identity-based encryption. InAnnual International Conference on the Theory and Applications of Cryptographic Techniques(pp. 457-473). Springer, Berlin, Heidelberg.
XIII.Shiraz, M., Sookhak, M., Gani, A., & Shah, S. A. A. (2015). A study on the critical analysis of computational offloading frameworks for mobile cloud computing.Journal of Network and Computer Applications,47, 47-60.
XIV.Sookhak, M., Akhunzada, A., Gani, A., Khurram Khan, M., &Anuar, N. B. (2014). Towards dynamic remote data auditing in computational clouds.The Scientific World Journal,2014.
XV.Sookhak, M., Gani, A., Khan, M. K., &Buyya, R. (2017). Dynamic remote data auditing for securing big data storage in cloud computing.Information Sciences,380, 101-116.
XVI.Sookhak, M., Gani, A., Talebian, H., Akhunzada, A., Khan, S. U., Buyya, R., &Zomaya, A. Y. (2015). Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues.ACM Computing Surveys (CSUR),47(4), 65.
XVII.Sookhak, M., Talebian, H., Ahmed, E., Gani, A., & Khan, M. K. (2014). A review on remote data auditing in single cloud server: Taxonomy and open issues.Journal of Network and Computer Applications,43, 121-141.
XVIII.Sookhak, M., Yu, F. R., Khan, M. K., Xiang, Y., &Buyya, R. (2017). Attribute-based data access control in mobile cloud computing: Taxonomy and open issues.Future Generation Computer Systems,72, 273-287.
XIX.Srinivasan, S., & Raja, K. (2018). An Advanced Dynamic Authentic Security Method for Cloud Computing. InCyber Security: Proceedings of CSI 2015(pp. 143-152).Springer Singapore.
XX.Tang, H., Sun, Q. T., Yang, X., & Long, K. (2018). A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense.IEEE Access,6, 26059-26068.
XXI.Wang, C., Ren, K., Lou, W., & Li, J. (2010). Toward publicly auditable secure cloud data storage services.IEEE Network,24(4).
XXII.Whaiduzzaman, M., Sookhak, M., Gani, A., &Buyya, R. (2014). A survey on vehicular cloud computing.Journal of Network and Computer Applications,40, 325-344.
XXIII.Yuan, D., Song, X., Xu, Q., Zhao, M., Wei, X., Wang, H., & Jiang, H. (2018). An ORAM-based privacy-preservingdata sharing scheme for cloud storage.Journal of information security and applications,39, 1-9.
XXIV.Zhou, Z., & Huang, D. (2012, October). Efficient and secure data storage operations for mobile cloud computing. InProceedings of the 8th International Conference on Network and Service Management(pp. 37-45). International Federation for Information Processing.
XXV.Zuo, C., Shao, J., Liu, J. K., Wei, G.,& Ling, Y. (2018). Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage.IEEE Transactions on Information Forensics and Security,13(1), 186-196.
P. Jhansi Rani, Dr. M. Akkalakshmi View Download