Towards reliable storage for cloud systems with selective data encryption and splitting strategy

1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Nowadays, reliability and security have become serious issues in Information and Communication Technology (ICT) since more and more data and services are accessed from computational cloud. Since cloud is an open platform and accessed through public networks like the Internet, user’s data become vulnerable for security attacks. Foul play of cloud operators to reach sensitive data of users is one of the serious issues that need wide consideration as it vividly reduces the adoptability of cloud computing. Many practical security challenges are arising due to the abundant volume of data. Time used up in data encryption heavily hinders the performance of cloud based systems since data transmission and data communication are slowed down due to the large amount of data to be encrypted and decrypted. To attain an adoptive performance altitude many applications reject data encryption. In this paper, we focus on privacy leakage issues, and promote security levels under predefined time and resource constraints. To this end, we propose a Selective Data Encryption and Splitting Strategy (SDE2S), a compact encrypting method to selectively encrypt data according to the privacy weight and execution time of data packages being sent. Also it randomly splits data into n parts and then performs XOR operations using different cipher keys in different cloud storage servers to protect users’ private information from possible untrusted cloud operators. Here, we put forward an overview of the problem and describe the algorithms used in the proposed solution. At the end, we present our simulation results, which reveal the advantages and improvements of our scheme over other schemes.

Cite

CITATION STYLE

APA

Asmathunnisa, Z., & Yogesh, P. (2019). Towards reliable storage for cloud systems with selective data encryption and splitting strategy. In Communications in Computer and Information Science (Vol. 941, pp. 61–74). Springer Verlag. https://doi.org/10.1007/978-981-13-3582-2_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free