Safe Haven in the Cloud: Secure Access Controlled File Encryption (SAFE) System

被引:0
|
作者
Shahzad, Farrukh [1 ]
机构
[1] King Fahd Univ Petr & Minerals, Informat & Comp Sci, Dhahran 31261, Saudi Arabia
关键词
Cloud computing; Data privacy; Encryption; Cryptography; Secure storage; Access control; Assured deletion;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The evolution of cloud computing has revolutionized how the computing is abstracted and utilized on remote third party infrastructure. It is now feasible to try out novel ideas over the cloud with no or very low initial cost. There are challenges in adopting cloud computing; but with obstacles, we have opportunities for research in several aspects of cloud computing. One of the main issue is the data security and privacy of information stored and processed at cloud provider's systems. In this work, a practical system (called SAFE) is designed and implemented to securely store/retrieve user's files on the third party cloud storage systems using well established cryptographic techniques. It utilizes the client-side, multilevel, symmetric/asymmetric encryption and decryption operations to provide policy-based access control and assured deletion of remotely hosted client's files. The SAFE is a generic application which can be extended to support any cloud storage provider as long as there is an API which support basic file upload and download operations.
引用
收藏
页码:1329 / 1334
页数:6
相关论文
共 50 条
  • [1] Secure borders, safe haven: A contradiction in terms?
    Sales, R
    ETHNIC AND RACIAL STUDIES, 2005, 28 (03) : 445 - 462
  • [2] Safe Genetic File System
    Mao XinYu
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 398 - 402
  • [3] SAFE - SECURE ACCESS FACILITY FOR THE ENTERPRISE
    BERGMANN, GJ
    COMPUTER, 1993, 26 (12) : 93 - 93
  • [4] A Secure Cloud Computing System by Using Encryption and Access Control Model
    Mahmood, Ghassan Sabeeh
    Huang, Dong Jun
    Jaleel, Baidaa Abdulrahman
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (03): : 538 - 549
  • [5] Secure Zones: an Attribute-Based Encryption Advisory System for Safe Firearms
    Portnoi, Marcos
    Shen, Chien-Chung
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 397 - 398
  • [6] Safe and secure storage of controlled drugs
    Pragnell, Robert
    VETERINARY RECORD, 2016, 179 (22) : 578 - 578
  • [7] Design of cluster safe file system
    Zheng, G
    Ding, K
    He, ZX
    ADVANCED PARALLEL PROCESSING TECHNOLOGIES, PROCEEDINGS, 2003, 2834 : 249 - 253
  • [8] Secure Cloud Distributed File System
    Mar, Kheng Kok
    Hu, ZhengQing
    Law, Chee Yong
    Wang, Meifen
    2016 11TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2016, : 176 - 181
  • [9] Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment
    Sumitra, Binu
    Raj, Pethuru
    Misbahuddin, M.
    ADVANCED COMPUTING AND SYSTEMS FOR SECURITY, VOL 1, 2016, 395 : 183 - 202
  • [10] Secure Cloud Migration Strategy (SCMS): A Safe Journey to the Cloud
    Alharthi, Dalal N.
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 1 - 6