Security Framework to Ensure the Confidentiality of Outsourced Data in Public Cloud Storage

نویسنده

  • L. Arockiam
چکیده

Cloud makes data storage very smart. It provides enormous amount of space to store the user’s data. These data are instantly available for the users at any time and it reduces the cost with respect to hardware support, technical experts available and license of the database. It leverages the small and medium scale enterprise straight away to start their business. Nevertheless cloud has many advantages; enterprises are undecided to deploy their data in the cloud storage, because data security issue is the top concern in Cloud Storage (CS). Security issues arose from the attack of cloud data by the hackers. Hackers are either outsiders from the enterprises or insiders from cloud service providers. This paper considers the issue that the CS is attacked by insiders from the cloud service provider. To protect this attack, this paper proposes the data confidentiality framework called AROMO. As per the proposed framework, user’s data are protected in the Cloud Storage. The proposed framework has a mechanism which uses two techniques to protect the data that are encryption and obfuscation. The data are encrypted and obfuscated before it is uploaded to CS. A metadata is maintained in the client. It contains the details of encryption and obfuscation applied on the data. To retrieve data from the CS, query is generated to run on encrypted and obfuscated data on the server side. Based on the query from the client, required data is fetched out from the CS; it could be decrypted and deobfuscated in client side based on the metadata details.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Specification and Deployment of Integrated Security Policies for Outsourced Data

Recent advance in cloud computing has transformed the way information is managed and consumed, since this new paradigm provides cost efficient solutions that allow the transmission, storage, and intensive computing of information. Therefore, Cloud service providers are increasingly required to take responsibility for the storage as well as the efficient and reliable sharing of information, thus...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

Secure Deduplication Scheme for Cloud Storage

Nowadays, the explosive growth of digital contents continues to rise the demand for new storage and network capacities, along with an increasing need for more cost effective use of storage and network bandwidth for data transfer. As such, the use of remote storage systems is gaining an expanding interest, namely the cloud storage based services, since it provides cost efficient architectures. T...

متن کامل

AROCRYPT: A CONFIDENTIALITY TECHNIQUE FOR SECURING ENTERPRISE’s DATA IN CLOUD

Cloud dominates the IT enterprises by way of its computing services. One of the services provided by the cloud is data storage. Cloud storage mainly supports Small and Medium scale Enterprises (SMEs) by reducing their capital investments and maintenance of storage servers. Most of the SMEs are outsourcing their data to cloud storage. Enterprises’ data that are forwarded to the cloud have to be ...

متن کامل

Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage

Mobile cloud computing is referred as the combination of cloud computing and mobile networks to bring benefits for both mobile users and cloud computing providers. While once the data of mobile users is outsourced to the cloud, it is a formidable and challenging task for the data owners to realize both the data confidentiality and the utilization because it seems unachievable to search and retr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014