Improved End-to-End Data Security Approach for Cloud Computing

被引:0
|
作者
Ghosh, Soumalya [1 ]
Verma, Shiv Kumar [1 ]
Ghosh, Uttam [2 ]
Al-Numay, Mohammed [3 ]
机构
[1] Galgotias Univ, Dept Comp Sci, Greater Noida 203201, UP, India
[2] Meharry Med Coll, Dept Comp Sci & Data Sci, Nashville, TN 37208 USA
[3] King Saud Univ, Coll Engn, Elect Engn Dept, Riyadh 11451, Saudi Arabia
关键词
cloud computing; data security; cyber security; hashing; salt; PRIVACY; MODEL; AUTHENTICATION; DESIGN;
D O I
10.3390/su152216010
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Cloud computing is one of the major cutting-edge technologies that is growing at a gigantic rate to redefine computation through service-oriented computing. It has addressed the issue of owning and managing computational infrastructure by providing service through a pay-and-use model. However, a major possible hindrance is security breaches, especially when the sender uploads or the receiver downloads the data from a remotely accessed server. It is a very generic approach to ensuring data security through different encryption techniques, but it might not be able to maintain the security standard. This paper proposes an end-to-end data security approach from the sender side to the receiver side by adding extra padding sequences, as well as randomized salting, followed by hashing and an encryption technique. The effectiveness of the proposed method was established using both a simulated system and mathematical formulations with different performance metrics. Furthermore, its performance was compared with those of contemporary algorithms, showing that the proposed algorithm creates a larger ciphertext that is almost impossible to crack due to randomization modules. However, it has significantly longer encryption and decryption times, although our primary concern is ensuring security, not reducing time.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Development of a end-to-end Cloud Computing MetOcean solution
    McKenna, Brian
    Knee, Kelly
    Howlett, Eoin
    [J]. OCEANS 2016 MTS/IEEE MONTEREY, 2016,
  • [2] Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing
    Liu, Pengtao
    [J]. IEEE ACCESS, 2020, 8 : 16750 - 16759
  • [3] An End-to-End Security Aware WSN Approach with Localization & Authentication and Data Exchange Security
    Priyanka, R.
    Reddy, K. Satyanarayan
    [J]. INTERNATIONAL TRANSACTION JOURNAL OF ENGINEERING MANAGEMENT & APPLIED SCIENCES & TECHNOLOGIES, 2022, 13 (07):
  • [4] An end-to-end hardware approach security for the GPRS
    Kitsos, P
    Sklavos, N
    Koufopavlou, O
    [J]. MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 791 - 794
  • [5] End-to-end Security Architecture for Federated Cloud and IoT Networks
    Massonet, Philippe
    Deru, Laurent
    Achour, Amel
    Dupont, Sebastien
    Levin, Anna
    Villari, Massimo
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2017, : 463 - 468
  • [6] The end of end-to-end security?
    Bradner, S
    [J]. IEEE SECURITY & PRIVACY, 2006, 4 (02) : 76 - 79
  • [7] SECUPerf: End-to-End Security and Performance Assessment of Cloud Services
    Xiong, Kaiqi
    Pantangi, Ajay
    Makati, Mufaddal
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1747 - 1752
  • [8] From IoT to Cloud: An End-to-End Virtualization Approach
    Leivadeas, Aris
    [J]. 2020 EUROPEAN CONTROL CONFERENCE (ECC 2020), 2020, : 1554 - 1557
  • [9] Selective End-To-End Data-Sharing in the Cloud
    Hoerandner, Felix
    Ramacher, Sebastian
    Roth, Simon
    [J]. INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 175 - 195
  • [10] Selective end-to-end data-sharing in the cloud
    Felix Hörandner
    Sebastian Ramacher
    Simon Roth
    [J]. Journal of Banking and Financial Technology, 2020, 4 (1): : 139 - 157