Abstract
Cloud storage suffers from security. It is more prone to security breaches due to multitenant architecture and data remanence. Cloud storage is robust as well as promising platform from economic point of view as no extra cost for purchasing hardware is required. Security breaches hamper the market of cloud. Instead of attracting the mind of customers, it creates a picture of dilemma in their minds whether to cloudify or not. Many algorithms have already been designed and implemented to make cloud storage robust and secure place to outsource data but the attacks of twenty-first century uncover that they are inadequate to provide all round security to it. This research paper proposed an algorithm which determines whether the data being uploaded on cloud are sensitive or normal data. On testing data sensitivity, algorithm decides whether to upload it on public cloud or on private cloud. Moreover, if data are found to be sensitive, it is bifurcated and uploaded on private cloud after encryption with two different algorithms, else it is uploaded on public cloud.





Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Deng Z, Li K, Li K, Zhou J. A multi-user searchable encryption scheme with keyword authorization in a cloud storage. Future Gener Comput Syst. 2017;72:208–18.
Wei L, et al. Security and privacy for storage and computation in cloud computing. Inf Sci. 2014;258:371–86.
Armbrust M, Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, et al. A view of cloud computing. Commun ACM. 2010;53(4):50–8.
Duan Q, Yan Y, Vasilakos AV. A survey on service-oriented network virtualization toward convergence of networking and cloud computing. IEEE Trans Netw Serv Manag. 2012;9(4):373–92.
Tajammul M, Parveen R. Auto encryption algorithm for uploading data on cloud storage. Int J Inf Technol. 2020;12:831–7. https://doi.org/10.1007/s41870-020-00441-9.
Tajammul M, Parveen R. Key generation algorithm coupled with DES for securing cloud storage. Int J Eng Adv Technol. 2019;8(5):1452–8.
Tajammul M, Parveen R. Algorithm for document integrity testing pre upload and post download from cloud storage. Int J Recent Technol Eng. 2019;2:973–9.
Tajammul M, Parveen R. Two pass multidimensional key generation and encryption algorithm for data storage security in cloud computing. Int J Recent Technol Eng. 2019;8(2):4152–8.
Takabi H, Joshi J, Ahn G. Security and privacy challenges in cloud computing environments. IEEE Secur Priv. 2010;8(6):24–31.
Tajammul M, Parveen R. Comparative study of big ten information security management system standards. Int J Eng Res Comput Sci Eng. 2018;5(2):5–14.
Tajammul M, Parveen R (2017) Comparative analysis of big ten ISMS standards and their effect on cloud computing. In: 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), pp. 362–367. https://doi.org/10.1109/IC3TSN.2017.8284506.
Rasheed H. Data and infrastructure security auditing in cloud computing environments. Int J Inf Manag. 2014;34(3): 364368. https://doi.org/10.1016/j.ijinfomgt.2013.11.002.
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS’07), Alexandria, Virginia, USA, October 28–31, 2007.
Ateniese G, Di Pietro R, Mancini L, Tsudik G. Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey, September 22–26, 2008.
Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In: 14th European Symposium on Research in Computer Security (ESORICS’09), Saint Malo, France, September 21–23, 2009.
Golle P, Mironov I (2001) Uncheatable Distributed Computations. In: Naccache D (eds) Topics in Cryptology — CT-RSA 2001. CT-RSA 2001. Lecture Notes in Computer Science, vol 2020. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45353-9_31.
Monrose F, Wyckoff P, Rubin AD (1999) Distributed Execution with Remote Audit. In Ndss vol. 99, pp 3–5.
Wei L, Zhu H, Cao Z, Jia W, Vasilakos A. Seccloud: bridging secure storage and computation in cloud. In: 30th International Conference on Distributed Computing Systems Workshops (IEEE ICDCSW 2010), Genova, Italy, June 21–25, 2010.
Yuen TH, Susilo W, Mu Y (2010) How to construct identity-based signatures without the key escrow problem. Int J Inf Sec 9(4):297–311.
Canetti R, Riva B, Rothblum G (2011) Verifiable computation with two or more clouds. In: Workshop on Cryptography and Security in Clouds.
Sadeghi A, Schneider T, Winandy M (2010) Token-based cloud computing: Secure outsourcing of data and arbitrary computations with lower latency. In: Trust and Trustworthy Computing, Berlin, Germany 21–23.
Tajammul M, Parveen R (2020) To Carve out Private Cloud with Total Functionality. In: 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), pp 831–835. https://doi.org/10.1109/ICACCCN51052.2020.9362826.
https://blog.syncsort.com/2018/08/data-security/aes-vs-des-encryption-standard-3des-tdea/ DES Encryption withdrawn in 2005.
Chuang I, Li S, Huang K, Kuo Y (2011) An effective privacy protection scheme for cloud computing. In: 13th International Conference on Advanced Communication Technology (ICACT2011), pp 260–265.
Azougaghe A, Kartit Z, Hedabou M, Belkasmi M, El Marraki M (2015) An efficient algorithm for data security in Cloud storage. In: 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA), pp 421–427. https://doi.org/10.1109/ISDA.2015.7489267.
Li Y, Gai K, Qiu L, Qiu M, Zhao H. Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci (NY). 2017;387:103–15.
Funding
No funding sources.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
On behalf of all the authors, the corresponding author states that there is no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the topical collection “Advanced Computing and Data Sciences” guest edited by Mayank Singh, Vipin Tyagi and P.K. Gupta.
Rights and permissions
About this article
Cite this article
Tajammul, M., Parveen, R. & Asif, S. Deterministic Algorithm for Cloud Outsourced Data. SN COMPUT. SCI. 3, 223 (2022). https://doi.org/10.1007/s42979-022-01089-x
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-022-01089-x