Efficient Cloud Storage Confidentiality to Ensure Data Security
Abstract
Cloud computing provides an enormous amount of virtual storage to the users. Cloud storage mainly helps to small and medium scale industries to reduce their investments and maintenance of storage servers. Cloud storage is efficient for data storage. Users' data are sent to the cloud is to be stored in the public cloud environment. Data stored in the cloud storage might mingle with other users' data. This will lead to the data protection issue in cloud storage. If the confidentiality of cloud data is broken, then it will cause loss of data to the industry. Security of cloud storage is ensured through confidentiality parameter. To ensure the confidentiality, the most common used technique is encryption. But encryption alone doesn't give maximum protection to the data in the cloud storage. To have efficient cloud storage confidentiality, this paper uses encryption and obfuscation as two different techniques to protect the data in the cloud storage. Encryption is the process of converting the readable text into unreadable form using an algorithm and a key. Obfuscation is same like encryption. Obfuscation is a process which disguises illegal users by implementing a particular mathematical function or using programming techniques. Based on the type of data, encryption and obfuscation can be applied. Encryption can be applied to alphabets and alphanumeric type of data and obfuscation can be applied to a numeric type of data. Applying encryption and obfuscation techniques on the cloud data will provide more protection against unauthorized usage. Confidentiality could be achieved with a combination of encryption and obfuscation.
FAQs
AI
What security model is proposed for achieving cloud data confidentiality?
The paper proposes an integrated approach using both encryption and obfuscation techniques to enhance data confidentiality in cloud storage. This method addresses vulnerabilities from both insider and outsider attacks by ensuring that all data is encrypted and obfuscated before being uploaded.
How does the proposed confidentiality technique improve data security in cloud?
The proposed technique utilizes symmetric encryption for swift processing of large data volumes, combined with obfuscation to mitigate threats like reverse engineering. This dual-layer approach is essential for maintaining confidentiality, ensuring unauthorized access is significantly reduced.
What role does user responsibility play in data security during cloud storage?
Users must encrypt and obfuscate their data prior to transfer to the cloud, as the proposed model emphasizes user-side data protection. This proactive responsibility highlights the importance of user actions in safeguarding data against potential breaches.
How does the study address the challenges of monitoring cloud database security?
The research identifies monitoring difficulties due to the distributed nature of cloud databases, emphasizing the need for robust security models to detect unauthorized access. Effective monitoring mechanisms are crucial for safeguarding sensitive data stored across various virtual environments.
What are the implications of encryption choice for cloud storage efficiency?
The study recommends symmetric encryption as the optimal choice for cloud data storage due to its computational efficiency and speed, essential for managing large datasets. By focusing on encryption types based on data nature, it enhances both functionality and security.
References (16)
- Uegebe Ikechukwu Valentine and Omenka Ugochukwu Enyinna, " Building Trust and Confidentiality in Cloud computing Distributed Data Storage", West African Journal of Industrial & Academic Research, Vol. 6 No.1 March 2013, pp78-83.
- Xiaojun Yu, Qiaoyan Wen, "A View about Cloud Data Security from Data Life Cycle", International Conference on Computational Intelligence and Software Engineering (CiSE), IEEE, Dec 2010, pp 1-4.
- Atiq ur Rehman, M.Hussain, "Efficient Cloud Data Confidentiality for DaaS", International Journal of Advanced Science and Technology Vol. 35, October 2011, pp 1-10.
- Masayuki Okuhara et al, "Security Architecture for Cloud Computing", FUJITSU Sci. Tech. J., Vol. 46, No. 4, October 2010, pp. 397-402.
- Yvette E. Gelogo and Sunguk Lee, " Database Management System as a Cloud Service, International Journal of Future Generation Communication and Networking Vol. 5, No. 2, June 2012, pp 71-76.
- Hyun-Suk Yu, Yvette E. Gelogo, Kyung Jung Kim, "Securing Data Storage in Cloud Computing", Security Engineering Research Institute (Journal of Security Engineering), No. 9, No. 3, June 2012, pp 251-260.
- Nashaat el-Khameesy, Hossam Abdel Rahman, " A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems", Journal of Emerging Trends in Computing and Information Sciences, VOL. 3, NO. 6, June 2012, pp 970-974.
- R. Anitha, P. Pradeepan, P. Yogesh, and Saswati Mukherjee, "Data Storage Security in Cloud using Metadata", 2nd International Conference on Machine Learning and Computer Science(IMLCS' 2013), Kuala Lumpur (Malaysia), August 2013, pp 26-30.
- B. Raja Sekhar, B. Sunil Kumar, L. Swathi Reddy, and V. Poorna Chandar "CP-ABE Based Encryption for Secured Cloud Storage Access", International Journal of Scientific & Engineering Research, Volume 3, Issue 9, September 2012, pp 1-5.
- Cong Wang,Qian Wang,Kui Ren, and Wenjing Lou, "Ensuring Data Storage Security in Cloud Computing", 17th International Workshop on Quality of Service, IEEE, IWQoS, July 2009, pp 1-9.
- Anup Mathew, "Survey Paper on Security & Privacy Issues in Cloud Storage Systems", EECE, Term Survey Paper, April 2012, pp 1-13.
- Prince Mahajan, Srinath Setty, Sangmin Lee, Allen Clement, Lorenzo Alvisi, Mike Dahlin, and Michael Walfish, "Depot: Cloud storage with minimal trust", 9th USENIX Symposium on Operating System Design and Implementation, 2010, pp 1-26.
- Raluca Ada Popa, Jacob R. Lorch, David Molnar, Helen J. Wang, and Li Zhuang, "Enabling Security in Cloud Storage SLAs with CloudProof", USENIX Annual Technical Conference, 2011, pp 1-12.
- Tim Mather, Subra Kumaraswamy, and Shahed Latif, "Cloud Security and Privacy", O'Reilly Media, Inc., chapter 4, September 2009, pp 61-71.
- Dr. L. Arockiam, S. Monikandan, "Data Security and Privacy in Cloud Storage using Hybrid Symmetric Encryption Algorithm", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 8, August 2013, pp 3064-3070.
- S Kamara, K Lauter, "Cryptographic Cloud Storage", IFCA/ LNCS 6054, Springer-verlag, Berlin Heidelberg, 2010, pp 136-149.