Improved End-to-End Data Security Approach for Cloud Computing

被引:0
|
作者
Ghosh, Soumalya [1 ]
Verma, Shiv Kumar [1 ]
Ghosh, Uttam [2 ]
Al-Numay, Mohammed [3 ]
机构
[1] Galgotias Univ, Dept Comp Sci, Greater Noida 203201, UP, India
[2] Meharry Med Coll, Dept Comp Sci & Data Sci, Nashville, TN 37208 USA
[3] King Saud Univ, Coll Engn, Elect Engn Dept, Riyadh 11451, Saudi Arabia
关键词
cloud computing; data security; cyber security; hashing; salt; PRIVACY; MODEL; AUTHENTICATION; DESIGN;
D O I
10.3390/su152216010
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Cloud computing is one of the major cutting-edge technologies that is growing at a gigantic rate to redefine computation through service-oriented computing. It has addressed the issue of owning and managing computational infrastructure by providing service through a pay-and-use model. However, a major possible hindrance is security breaches, especially when the sender uploads or the receiver downloads the data from a remotely accessed server. It is a very generic approach to ensuring data security through different encryption techniques, but it might not be able to maintain the security standard. This paper proposes an end-to-end data security approach from the sender side to the receiver side by adding extra padding sequences, as well as randomized salting, followed by hashing and an encryption technique. The effectiveness of the proposed method was established using both a simulated system and mathematical formulations with different performance metrics. Furthermore, its performance was compared with those of contemporary algorithms, showing that the proposed algorithm creates a larger ciphertext that is almost impossible to crack due to randomization modules. However, it has significantly longer encryption and decryption times, although our primary concern is ensuring security, not reducing time.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data
    Roukounaki, Aikaterini
    Efremidis, Sofoklis
    Soldatos, John
    Neises, Juergen
    Walloschke, Thomas
    Kefalakis, Nikos
    [J]. 2019 GLOBAL IOT SUMMIT (GIOTS), 2019,
  • [42] A Cloud-RAN based end-to-end computation offloading in Mobile Edge Computing
    Gholivand, Rezvan
    Movahedi, Zeinab
    [J]. COMPUTER COMMUNICATIONS, 2021, 175 : 193 - 204
  • [43] FRAMESEC: a FRAMEwork for the application development with end-to-end SECurity provision in the mobile computing environment
    Fiiho, B
    Viana, W
    Braga, R
    Andrade, R
    [J]. Telecommunications 2005, Proceedings, 2005, : 72 - 77
  • [44] Leverage Data Security Policies Complexity for Users: An End-to-End Storage Service Management in the Cloud Based on ABAC Attributes
    Greneche, Nicolas
    Andres, Frederic
    Tanabe, Shihori
    Pester, Andreas
    Ali, Hesham H.
    Mahmoud, Amgad A.
    Bascle, Dominique
    [J]. MACHINE LEARNING FOR NETWORKING, MLN 2023, 2024, 14525 : 199 - 217
  • [45] A Markovian Approach for Improving End-to-End Data Rates in the Internet
    Segnere-Yter, Marine
    Brun, Olivier
    Prabhu, Balakrishna
    [J]. NETWORK GAMES, CONTROL AND OPTIMIZATION, NETGCOOP 2020, 2021, 1354 : 167 - 171
  • [46] Moving beyond traditional KPIs: an end-to-end data driven approach for improved system understanding and performance
    Behara, N.
    Stephan, C.
    [J]. OBSERVATORY OPERATIONS: STRATEGIES, PROCESSES, AND SYSTEMS IX, 2022, 12186
  • [47] OpenRTiST: End-to-End Benchmarking for Edge Computing
    George, Shilpa
    Eiszler, Thomas
    Iyengar, Roger
    Turki, Haithem
    Feng, Ziqiang
    Wang, Junjue
    Satyanarayanan, Mahadev
    Pillai, Padmanabhan
    [J]. IEEE PERVASIVE COMPUTING, 2020, 19 (04) : 10 - 18
  • [48] A survey on end-to-end point cloud learning
    Tang, Xikai
    Huang, Fangzheng
    Li, Chao
    Ban, Dayan
    [J]. IET IMAGE PROCESSING, 2023, 17 (05) : 1307 - 1321
  • [49] TrustCell: Towards the end-to-end trustworthiness in data-oriented scientific computing
    Pallickara, Sangmi Lee
    Plale, Beth
    [J]. 2006 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2006, : 33 - +
  • [50] CCAG: End-to-End Point Cloud Registration
    Wang, Yong
    Zhou, Pengbo
    Geng, Guohua
    An, Li
    Liu, Yangyang
    [J]. IEEE ROBOTICS AND AUTOMATION LETTERS, 2024, 9 (01) : 435 - 442