D2i2D: A Novel Secure Approach for Cloud Storage with Cost Minimization
نویسندگان
چکیده
Nowadays Cloud computing has made a revolutionary change in the concept of computation on the web. It has been able to provide low cost services to its users all over the world. Millions of users are using the service of cloud either by IaaS, PaaS and SaaS. Now the main concern of cloud service providers and users how to preserve security in these low cost services. Throughout this research we have first reviewed some cost minimization technique and data security approaches used in the cloud. Then we propose a novel data hiding approach called ‘D2i2D’ which is able to provide security to any data stored in the cloud as well as reduce the file size in cloud storage. Our technique is based on data to RGB image and RGB image to data conversion technique with multiple-key-cryptography (MKC) to provide more security on cloud data. We have been able to show that this technique is able to reduce 38.82% of storage where file size is less than 1 MB and 30.34% of storage where file size is within 1 to 2 MB. Lastly we propose a framework to implement this technique in cloud.
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملAn Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملA risk model for cloud processes
Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JSW
دوره 11 شماره
صفحات -
تاریخ انتشار 2016