A Framework to Secure cloud Data Server Information Using Data Obfuscation

Authors

  • Bakul Panchal  Information Technology, L. D. Engineering College, Ahmedabad, Gujarat, India
  • Juli Chaudhari  Computer Engineering, Merchant Engineering College, Basna, Gujarat, India
  • Krunal Suthar  Computer Engineering, Sankalchand Patel College of Engineering, Vinegar, Gujarat, India

Keywords:

Cloud Storage, Data protection, Confidentiality, Encryption, Obfuscation

Abstract

Cloud computing provide a high amount of virtual storage to the user. Cloud storage mainly help to small and medium scale industries to reduce their investment and maintenance of storage server. Users’ data are sent to the cloud is to be stored in the public cloud environment. Data stored in the cloud storage might combined with other users’ data. So, the issue about Security of cloud storage is ensured through confidentiality parameter. To ensure the confidentiality, the most common used technique is encryption. But encryption alone doesn’t give maximum protection to the data in the cloud storage. To have efficient cloud storage confidentiality, this paper uses encryption and obfuscation as two different techniques to protect the data in the cloud storage. Applying encryption and obfuscation techniques on the cloud data will provide more protection against unauthorized usage. The proposed scheme, guarantees along with encryption, obfuscation technique is used to increase the confidentiality of data and also provide the verification & right management .where the users data is secure on the server. We hope this paper will help quality analyst in pulling data, is secure to store in the cloud storage with more accuracy with higher speed and verify content by preserving privacy.

References

  1. Rabi Prasad Padhy, Manas Ranjan Patra, Suresh Chandra Satapathy , “Cloud Computing: Security Issues and Research Challenges”. (IJCSITS) Vol. 1, No. 2, December 2011.
  2. Xiaojun Yu, Qiaoyan Wen, ”A View about Cloud Data Security fromData Life Cycle”, International Conference on Computational Intelligence and Software Engineering (CiSE), IEEE, Dec 2010, pp 1-4.
  3. Shilpashree Srinivasamurthy and David Q. Liu “Survey on Cloud Computing Security” Department of Computer Science,Indiana University – Purdue University Fort Wayne,Fort Wayne, IN 46805,2010.
  4. Anca Apostu, Florina Puican, Geanina Ularu, George Suciu, Gyorgy Todoran, “Study On Advantages And Disadvantages Of Cloud Computing” ISBN 2013.
  5. Christian Collberg,Clark Thomborson,Douglas Low,” A Taxonomy of Obfuscating Transformation ,” Department of computer science ,The University of Auckland, Private Bag 92019 Auckland,New Zealand. {collberg,cthombor,dlow001}@ cs.auckland.ac.nz”2012
  6. Muhammad Hataba and Ahmed EI-Mahdy, “Cloud Protection by Obfuscation : Techniques and Metrics,”2012 IEEE Seventh International conference on P2P,Parallel,Grid,Cloud and Internet Computing,
  7. L.Arockiam and S.Monikandan ,”Efficient Cloud Storage Confidentiality to Ensure Data Security”2014 International conference on Computer communication and Information(2014 IEEE) ,jan.03-05,2014,coimbatore,India.
  8. Atiq ur Rehman,M.Hussain SZABIST Islamabad Pakistan,”Efficient Cloud Data Confidentiality for DaaS,” International Journal of Advanced Science and Technology Vol.35,october,2011.
  9. Arvind Narayanan and Vitaly Shamatikov , “Obfuscated Database and Group Privacy”, The University of Texas at Austin{arvind,shmat}@cs.utexas.edu,2013.
  10. Martin M,Agnew G.,Bole.J,Page M,Rhodes W.,”Information Right Management & Digital Right Management ”Published on the IEEE Emerging Technology Portal,2006-2012.(http://www.ieee.org/go/emergingtech)
  11. A Net 2000 Ltd. White Paper ,”Data Masking: What You Need to Know” (http://www.Net.2000Ltd.com & Info@Net2000Ltd.com)
  12. Priyank Rajvanshi, Varun Singh Nagar, Priyanka Chawla , ”Data Protection in Cloud Computing” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-3, Issue-3, August 2013.
  13. Sergey Vinogradov and Alexande Pastsyak,”Evaluation of Data Anonymization (Obfuscation) Tools” The Fourth International conference on Advances in Database,Knoweldge, and Data Application ,DBKDA 2012.
  14. Christian S. Collberg and Clark Thombor-son. Watermarking, tamper-proofing, and obfuscation - tools for software protection.In IEEE Transactions on Software Engineering, svolume 28, pages 735–746, August 2002.
  15. United States Patent” System and Method for Management of secure Data in Cloud Network” Patent No.:US 8,108,912 B2(Jan.31,2012)
  16. Google app engine. http://code.google.com/appengine/.
  17. Juli Chaudhari, Jayesh mevada,“A Framework to Secure Cloud Data Server Information Using Data Obfuscation” Technix International Journal for Engineering Research, Volume 2 Issue 08,March-2016.

 Book 

  1. Rajkumar Buyaa , Joshy Josef , Craig Fellentein ,Michael Miller” Advance Computing Technology
  2. Rajkumar Buyya et. el., Cloud Computing: Principles and Paradigms, Wiley India Edition
  3. Martin Lambert OCtober2009 “Information Rights Management “– Managing information everywhere it is stored and used . Copyright © 2009, Oracle.

Downloads

Published

2016-10-30

Issue

Section

Research Articles

How to Cite

[1]
Bakul Panchal, Juli Chaudhari, Krunal Suthar, " A Framework to Secure cloud Data Server Information Using Data Obfuscation , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 5, pp.316-323, September-October-2016.