Improved End-to-End Data Security Approach for Cloud Computing

被引:0
|
作者
Ghosh, Soumalya [1 ]
Verma, Shiv Kumar [1 ]
Ghosh, Uttam [2 ]
Al-Numay, Mohammed [3 ]
机构
[1] Galgotias Univ, Dept Comp Sci, Greater Noida 203201, UP, India
[2] Meharry Med Coll, Dept Comp Sci & Data Sci, Nashville, TN 37208 USA
[3] King Saud Univ, Coll Engn, Elect Engn Dept, Riyadh 11451, Saudi Arabia
关键词
cloud computing; data security; cyber security; hashing; salt; PRIVACY; MODEL; AUTHENTICATION; DESIGN;
D O I
10.3390/su152216010
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Cloud computing is one of the major cutting-edge technologies that is growing at a gigantic rate to redefine computation through service-oriented computing. It has addressed the issue of owning and managing computational infrastructure by providing service through a pay-and-use model. However, a major possible hindrance is security breaches, especially when the sender uploads or the receiver downloads the data from a remotely accessed server. It is a very generic approach to ensuring data security through different encryption techniques, but it might not be able to maintain the security standard. This paper proposes an end-to-end data security approach from the sender side to the receiver side by adding extra padding sequences, as well as randomized salting, followed by hashing and an encryption technique. The effectiveness of the proposed method was established using both a simulated system and mathematical formulations with different performance metrics. Furthermore, its performance was compared with those of contemporary algorithms, showing that the proposed algorithm creates a larger ciphertext that is almost impossible to crack due to randomization modules. However, it has significantly longer encryption and decryption times, although our primary concern is ensuring security, not reducing time.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] End-To-End Security for Video Distribution
    Boho, Andras
    Van Wallendael, Glenn
    Dooms, Ann
    De Cock, Jan
    Braeckman, Geert
    Schelkens, Peter
    Preneel, Bart
    Van de Walle, Rik
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 97 - 107
  • [32] End-to-End Security for Personal Telehealth
    Koster, Paul
    Asim, Muhammad
    Petkovic, Milan
    [J]. USER CENTRED NETWORKED HEALTH CARE, 2011, 169 : 621 - 625
  • [33] End-to-End Security for Enterprise Mashups
    Rosenberg, Florian
    Khalaf, Rania
    Duftler, Matthew
    Curbera, Francisco
    Austel, Paula
    [J]. SERVICE-ORIENTED COMPUTING - ICSOC 2009, PROCEEDINGS, 2009, 5900 : 389 - +
  • [34] Synthesising End-to-End Security Protocols
    Thevathayan, Charles
    Bertok, Peter
    Fernandez, George
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 440 - 447
  • [35] A transparent end-to-end security solution
    Thomas, S
    Misra, D
    Eswari, PRL
    Babu, NSC
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 336 - 339
  • [36] An end-to-end security solution for SCTP
    Lindskog, Stefan
    Brunstrom, Anna
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 526 - +
  • [37] End-to-end security for GSM users
    Rekha, AB
    Umadevi, B
    Solanke, Y
    Kolli, SR
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 434 - 437
  • [38] End To End Cloud Computing Architecture Based On A Novel Classification Of Security Issues
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    Kamoun, Farouk
    [J]. 2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 303 - 310
  • [39] Hybrid End-to-End VPN Security Approach for Smart IoT Objects
    Juma, Mazen
    Monem, Azza Abdel
    Shaalan, Khaled
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 158
  • [40] END-TO-END SECURITY: AN APPROACH TO A NATIONAL NETWORK FOR TELE-COOPERATION
    Staemmler, M.
    Walz, M.
    Weisser, G.
    Engelmann, U.
    Weininger, R.
    Ernstberger, A.
    Sturm, J.
    [J]. EHEALTH2012 - HEALTH INFORMATICS MEETS EHEALTH - VON DER WISSENSCHAFT ZUR ANWENDUNG UND ZURUCK: MOBILE HEALTH & CARE - GESUNDHEITSVORSORGE IMMER UND UBERALL, 2012, : 109 - 114