SecureCloud Guardian: Advancing Data Security via Advanced Dispersion and Encryption in Cloud Strorage (SCG)
DOI:
https://doi.org/10.32628/IJSRSET24116162Keywords:
Cloud Computing, Dispersion of Data, Encrypting the Data, Key Management, Security for StorageAbstract
Cloud storage, being one of the foundational pillars of modern computing, has been readily embraced and spurred fast growth in the cloud computing domain. Despite this massive and widespread acceptance, major security issues hang over the cloud storage scene and often result in huge security breaches and leaks of information. SecureCloud Guardian, or SCG, comes into the picture as an important instrument that guarantees privacy in information stored over the cloud. SCG follows a multi-pronged approach, including data dispersal techniques, storage distribution protocols, and encryption formats that guarantee efficient data storage. It also employs a hierarchical management approach that leverages user-level secret code as well as secret division algorithms for maintaining cryptographic material, preventing unauthorized access. The experimental studies carried out on SCG verify the effectiveness of this security-centered cloud storage technology in terms of avoiding data leakage. For instance, SCG uploads and downloads 5G files in a mere 646 seconds and 269 seconds, respectively—an attractive choice for consumers looking for secure cloud information storage.
Downloads
References
A. Bhardwaj, F. Al-Turjman, M. Kumar, T. Stephan, and L. Mostarda, ‘‘Capturing-the-invisible (CTI): Behavior-based attacks recognition in IoT-oriented industrial control systems,’’ IEEE Access, vol. 8, pp. 104956–104966, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.2998983
M. Kumar, A. Rani, and S. Srivastava, ‘‘Image forensics based on lighting estimation,’’ Int. J. Image Graph., vol. 19, no. 3, Jul. 2019, Art. no. 1950014. DOI: https://doi.org/10.1142/S0219467819500141
M. Kumar, S. Srivastava, and N. Uddin, ‘‘Image forensic based on lighting estimation,’’ Austral. J. Forensic Sci., vol. 51, no. 3, pp. 243– 250, Aug. 2017. DOI: https://doi.org/10.1080/00450618.2017.1356871
J. Li, Y. Zhang, X. Chen, and Y. Xiang, ‘‘Secure attribute-based data sharing for resource-limited users in cloud computing,’’ Comput. Secur., vol. 72, pp. 1–12, Jan. 2018. DOI: https://doi.org/10.1016/j.cose.2017.08.007
Y. Zhang, X. Chen, J. Li, D. S. Wong, H. Li, and I. You, ‘‘Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing,’’ Inf. Sci., vol. 379, pp. 42–61, Feb. 2017. DOI: https://doi.org/10.1016/j.ins.2016.04.015
https://www.irjmets.com/uploadedfiles/paper//issue_3_march_2022/2 0284/final/fin_irjmets1648556573.pdf
https://ijarsct.co.in/Paper4613.pdf
The OpenStack Project. OSSA-2015-006: Unauthorized Delete of Versioned Swift Object. Accessed: Apr. 14, 2015. [Online]. Available: https://security.openstack.org/ossa/OSSA-2015-006.html.
The OpenStack Project. OSSA-2015-016: Information Leak Via Swift Tempurls. Accessed: Aug. 26, 2015. [Online]. Available: https://security. openstack.org/ossa/OSSA-2015-016.html.
The OpenStack Project. Possible Glance Image Exposure Via Swift. Accessed: Feb. 23, 2015. [Online]. Available: https://wiki. openstack.org/wiki/OSSN/OSSN-0025
Gao, Chong-zhi & Cheng, Qiong & He, Pei & Susilo, Willy & Li, Jin. (2018). Privacy-Preserving Naive Bayes Classifiers Secure against the Substitution-then-Comparison Attack. Information Sciences. 444. 10.1016/j.ins.2018.02.058. DOI: https://doi.org/10.1016/j.ins.2018.02.058
Song, Heqing & Li, Jifei & Li, Haoteng. (2021). A Securecloud guardian Based on Data Dispersion and Encryption. IEEE Access. 9. 63745-63751. 10.1109/ACCESS.2021.3075340.
Cloud Security Alliance. Top Threats to Cloud Computing: Deep Dive. Accessed: Aug. 8, 2018. [Online]. Available: https://downloads.
cloudsecurityalliance.org/assets/research/top-threats/top-threats-to- cloud-computing-deep-dive.pdf
Li, Ping & Li, Tong & Ye, Heng & Li, Jin & Chen, Xiaofeng & Xiang, Yang. (2018). Privacy-preserving machine learning with multiple data providers. Future Generation Computer Systems. 87. 10.1016/j.future.2018.04.076. DOI: https://doi.org/10.1016/j.future.2018.04.076
Albelooshi, Bushra & Salah, Khaled & Martin, T. & Damiani, Ernesto. (2015). Securing Cryptographic Keys in the IaaS Cloud Model. 397- 401. 10.1109/UCC.2015.64. DOI: https://doi.org/10.1109/UCC.2015.64
Dhanusha, Dr. (2023). A Securecloud guardian Based on Data Dispersion and Encryption. International Journal for Research in Applied Science and Engineering Technology. 11. 1809-1811. 10.22214/ijraset.2023.56893. DOI: https://doi.org/10.22214/ijraset.2023.56893
P, Dinesh & T, Sneha. (2022). A Securecloud guardian Based on Data Dispersion and Encryption. International Journal of Advanced Research in Science, Communication and Technology. 419-422. 10.48175/IJARSCT-4613. DOI: https://doi.org/10.48175/IJARSCT-4613
Harnik, Danny & Kolodner, Hillel & Ronen, Shahar & Satran, Julian & Shulman-Peleg, Alexandra & Tal, Sivan. (2011). Secure Access Mechanism for Cloud Storage.. Scalable Computing: Practice and Experience. 12.
Song, Heqing & Li, Jifei & Li, Haoteng. (2021). A Securecloud guardian Based on Data Dispersion and Encryption. IEEE Access. 9. 63745-63751. 10.1109/ACCESS.2021.3075340. DOI: https://doi.org/10.1109/ACCESS.2021.3075340
More, Pranav & Gaikwad, Sheetal. (2017). An Advanced Mechanism for Secure Data Sharing in Cloud Computing using Revocable Storage Identity Based Encryption. International Journal of Engineering Business Management. 1. 12-14.
More, Pranav & Gaikwad, Sheetal. (2017). An Advanced Mechanism for Secure Data Sharing in Cloud Computing using Revocable Storage Identity Based Encryption. International Journal of Engineering Business Management. 1. 12-14.
Anantharam, Banoth & Scholar i, Research. (2021). A SURVEY OF SECURE CLOUD STORAGE MECHANISM: CHALLENGES AND ITS SOLUTIONS. INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING & TECHNOLOGY. 12. 354-361. 10.34218/IJARET.12.1.2021.032.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Science, Engineering and Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.