SecureCloud Guardian: Advancing Data Security via Advanced Dispersion and Encryption in Cloud Strorage (SCG)

Authors

  • Mrs. Viswanadapalli Anusha Assistant Professor, Department of Computer Science & Engineering Vignan’s Foundation for Science, Technology and Research, Guntur, India Author
  • Velagala Tata Naga Sai Subbi Reddy Department of Computer Science & Engineering Vignan’s Foundation for Science, Technology and Research Guntur, India Author

DOI:

https://doi.org/10.32628/IJSRSET24116162

Keywords:

Cloud Computing, Dispersion of Data, Encrypting the Data, Key Management, Security for Storage

Abstract

Cloud storage, being one of the foundational pillars of modern computing, has been readily embraced and spurred fast growth in the cloud computing domain. Despite this massive and widespread acceptance, major security issues hang over the cloud storage scene and often result in huge security breaches and leaks of information. SecureCloud Guardian, or SCG, comes into the picture as an important instrument that guarantees privacy in information stored over the cloud. SCG follows a multi-pronged approach, including data dispersal techniques, storage distribution protocols, and encryption formats that guarantee efficient data storage. It also employs a hierarchical management approach that leverages user-level secret code as well as secret division algorithms for maintaining cryptographic material, preventing unauthorized access. The experimental studies carried out on SCG verify the effectiveness of this security-centered cloud storage technology in terms of avoiding data leakage. For instance, SCG uploads and downloads 5G files in a mere 646 seconds and 269 seconds, respectively—an attractive choice for consumers looking for secure cloud information storage.

Downloads

Download data is not yet available.

References

A. Bhardwaj, F. Al-Turjman, M. Kumar, T. Stephan, and L. Mostarda, ‘‘Capturing-the-invisible (CTI): Behavior-based attacks recognition in IoT-oriented industrial control systems,’’ IEEE Access, vol. 8, pp. 104956–104966, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.2998983

M. Kumar, A. Rani, and S. Srivastava, ‘‘Image forensics based on lighting estimation,’’ Int. J. Image Graph., vol. 19, no. 3, Jul. 2019, Art. no. 1950014. DOI: https://doi.org/10.1142/S0219467819500141

M. Kumar, S. Srivastava, and N. Uddin, ‘‘Image forensic based on lighting estimation,’’ Austral. J. Forensic Sci., vol. 51, no. 3, pp. 243– 250, Aug. 2017. DOI: https://doi.org/10.1080/00450618.2017.1356871

J. Li, Y. Zhang, X. Chen, and Y. Xiang, ‘‘Secure attribute-based data sharing for resource-limited users in cloud computing,’’ Comput. Secur., vol. 72, pp. 1–12, Jan. 2018. DOI: https://doi.org/10.1016/j.cose.2017.08.007

Y. Zhang, X. Chen, J. Li, D. S. Wong, H. Li, and I. You, ‘‘Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing,’’ Inf. Sci., vol. 379, pp. 42–61, Feb. 2017. DOI: https://doi.org/10.1016/j.ins.2016.04.015

https://www.irjmets.com/uploadedfiles/paper//issue_3_march_2022/2 0284/final/fin_irjmets1648556573.pdf

https://ijarsct.co.in/Paper4613.pdf

The OpenStack Project. OSSA-2015-006: Unauthorized Delete of Versioned Swift Object. Accessed: Apr. 14, 2015. [Online]. Available: https://security.openstack.org/ossa/OSSA-2015-006.html.

The OpenStack Project. OSSA-2015-016: Information Leak Via Swift Tempurls. Accessed: Aug. 26, 2015. [Online]. Available: https://security. openstack.org/ossa/OSSA-2015-016.html.

The OpenStack Project. Possible Glance Image Exposure Via Swift. Accessed: Feb. 23, 2015. [Online]. Available: https://wiki. openstack.org/wiki/OSSN/OSSN-0025

Gao, Chong-zhi & Cheng, Qiong & He, Pei & Susilo, Willy & Li, Jin. (2018). Privacy-Preserving Naive Bayes Classifiers Secure against the Substitution-then-Comparison Attack. Information Sciences. 444. 10.1016/j.ins.2018.02.058. DOI: https://doi.org/10.1016/j.ins.2018.02.058

Song, Heqing & Li, Jifei & Li, Haoteng. (2021). A Securecloud guardian Based on Data Dispersion and Encryption. IEEE Access. 9. 63745-63751. 10.1109/ACCESS.2021.3075340.

Cloud Security Alliance. Top Threats to Cloud Computing: Deep Dive. Accessed: Aug. 8, 2018. [Online]. Available: https://downloads.

cloudsecurityalliance.org/assets/research/top-threats/top-threats-to- cloud-computing-deep-dive.pdf

Li, Ping & Li, Tong & Ye, Heng & Li, Jin & Chen, Xiaofeng & Xiang, Yang. (2018). Privacy-preserving machine learning with multiple data providers. Future Generation Computer Systems. 87. 10.1016/j.future.2018.04.076. DOI: https://doi.org/10.1016/j.future.2018.04.076

Albelooshi, Bushra & Salah, Khaled & Martin, T. & Damiani, Ernesto. (2015). Securing Cryptographic Keys in the IaaS Cloud Model. 397- 401. 10.1109/UCC.2015.64. DOI: https://doi.org/10.1109/UCC.2015.64

Dhanusha, Dr. (2023). A Securecloud guardian Based on Data Dispersion and Encryption. International Journal for Research in Applied Science and Engineering Technology. 11. 1809-1811. 10.22214/ijraset.2023.56893. DOI: https://doi.org/10.22214/ijraset.2023.56893

P, Dinesh & T, Sneha. (2022). A Securecloud guardian Based on Data Dispersion and Encryption. International Journal of Advanced Research in Science, Communication and Technology. 419-422. 10.48175/IJARSCT-4613. DOI: https://doi.org/10.48175/IJARSCT-4613

Harnik, Danny & Kolodner, Hillel & Ronen, Shahar & Satran, Julian & Shulman-Peleg, Alexandra & Tal, Sivan. (2011). Secure Access Mechanism for Cloud Storage.. Scalable Computing: Practice and Experience. 12.

Song, Heqing & Li, Jifei & Li, Haoteng. (2021). A Securecloud guardian Based on Data Dispersion and Encryption. IEEE Access. 9. 63745-63751. 10.1109/ACCESS.2021.3075340. DOI: https://doi.org/10.1109/ACCESS.2021.3075340

More, Pranav & Gaikwad, Sheetal. (2017). An Advanced Mechanism for Secure Data Sharing in Cloud Computing using Revocable Storage Identity Based Encryption. International Journal of Engineering Business Management. 1. 12-14.

More, Pranav & Gaikwad, Sheetal. (2017). An Advanced Mechanism for Secure Data Sharing in Cloud Computing using Revocable Storage Identity Based Encryption. International Journal of Engineering Business Management. 1. 12-14.

Anantharam, Banoth & Scholar i, Research. (2021). A SURVEY OF SECURE CLOUD STORAGE MECHANISM: CHALLENGES AND ITS SOLUTIONS. INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING & TECHNOLOGY. 12. 354-361. 10.34218/IJARET.12.1.2021.032.

Downloads

Published

08-11-2024

Issue

Section

Research Articles

How to Cite

[1]
Mrs. Viswanadapalli Anusha and Velagala Tata Naga Sai Subbi Reddy, “SecureCloud Guardian: Advancing Data Security via Advanced Dispersion and Encryption in Cloud Strorage (SCG)”, Int J Sci Res Sci Eng Technol, vol. 11, no. 6, pp. 57–66, Nov. 2024, doi: 10.32628/IJSRSET24116162.

Similar Articles

1-10 of 145

You may also start an advanced similarity search for this article.