Skip to main content

Advertisement

Log in

Deterministic Algorithm for Cloud Outsourced Data

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Cloud storage suffers from security. It is more prone to security breaches due to multitenant architecture and data remanence. Cloud storage is robust as well as promising platform from economic point of view as no extra cost for purchasing hardware is required. Security breaches hamper the market of cloud. Instead of attracting the mind of customers, it creates a picture of dilemma in their minds whether to cloudify or not. Many algorithms have already been designed and implemented to make cloud storage robust and secure place to outsource data but the attacks of twenty-first century uncover that they are inadequate to provide all round security to it. This research paper proposed an algorithm which determines whether the data being uploaded on cloud are sensitive or normal data. On testing data sensitivity, algorithm decides whether to upload it on public cloud or on private cloud. Moreover, if data are found to be sensitive, it is bifurcated and uploaded on private cloud after encryption with two different algorithms, else it is uploaded on public cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

References

  1. Deng Z, Li K, Li K, Zhou J. A multi-user searchable encryption scheme with keyword authorization in a cloud storage. Future Gener Comput Syst. 2017;72:208–18.

    Article  Google Scholar 

  2. Wei L, et al. Security and privacy for storage and computation in cloud computing. Inf Sci. 2014;258:371–86.

    Article  Google Scholar 

  3. Armbrust M, Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, et al. A view of cloud computing. Commun ACM. 2010;53(4):50–8.

    Article  Google Scholar 

  4. Duan Q, Yan Y, Vasilakos AV. A survey on service-oriented network virtualization toward convergence of networking and cloud computing. IEEE Trans Netw Serv Manag. 2012;9(4):373–92.

    Article  Google Scholar 

  5. Tajammul M, Parveen R. Auto encryption algorithm for uploading data on cloud storage. Int J Inf Technol. 2020;12:831–7. https://doi.org/10.1007/s41870-020-00441-9.

    Article  Google Scholar 

  6. Tajammul M, Parveen R. Key generation algorithm coupled with DES for securing cloud storage. Int J Eng Adv Technol. 2019;8(5):1452–8.

    Google Scholar 

  7. Tajammul M, Parveen R. Algorithm for document integrity testing pre upload and post download from cloud storage. Int J Recent Technol Eng. 2019;2:973–9.

    Google Scholar 

  8. Tajammul M, Parveen R. Two pass multidimensional key generation and encryption algorithm for data storage security in cloud computing. Int J Recent Technol Eng. 2019;8(2):4152–8.

    Google Scholar 

  9. Takabi H, Joshi J, Ahn G. Security and privacy challenges in cloud computing environments. IEEE Secur Priv. 2010;8(6):24–31.

    Article  Google Scholar 

  10. Tajammul M, Parveen R. Comparative study of big ten information security management system standards. Int J Eng Res Comput Sci Eng. 2018;5(2):5–14.

    Google Scholar 

  11. Tajammul M, Parveen R (2017) Comparative analysis of big ten ISMS standards and their effect on cloud computing. In: 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), pp. 362–367. https://doi.org/10.1109/IC3TSN.2017.8284506.

  12. Rasheed H. Data and infrastructure security auditing in cloud computing environments. Int J Inf Manag. 2014;34(3): 364368. https://doi.org/10.1016/j.ijinfomgt.2013.11.002.

    Article  Google Scholar 

  13. https://www.stackscale.com/blog/cloud-service-models/.

  14. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D. Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS’07), Alexandria, Virginia, USA, October 28–31, 2007.

  15. Ateniese G, Di Pietro R, Mancini L, Tsudik G. Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey, September 22–26, 2008.

  16. Wang Q, Wang C, Li J, Ren K, Lou W. Enabling public verifiability and data dynamics for storage security in cloud computing. In: 14th European Symposium on Research in Computer Security (ESORICS’09), Saint Malo, France, September 21–23, 2009.

  17. Golle P, Mironov I (2001) Uncheatable Distributed Computations. In: Naccache D (eds) Topics in Cryptology — CT-RSA 2001. CT-RSA 2001. Lecture Notes in Computer Science, vol 2020. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45353-9_31.

  18. Monrose F, Wyckoff P, Rubin AD (1999) Distributed Execution with Remote Audit. In Ndss vol. 99, pp 3–5.

  19. Wei L, Zhu H, Cao Z, Jia W, Vasilakos A. Seccloud: bridging secure storage and computation in cloud. In: 30th International Conference on Distributed Computing Systems Workshops (IEEE ICDCSW 2010), Genova, Italy, June 21–25, 2010.

  20. Yuen TH, Susilo W, Mu Y (2010) How to construct identity-based signatures without the key escrow problem. Int J Inf Sec 9(4):297–311.

    Article  Google Scholar 

  21. Canetti R, Riva B, Rothblum G (2011) Verifiable computation with two or more clouds. In: Workshop on Cryptography and Security in Clouds.

  22. Sadeghi A, Schneider T, Winandy M (2010) Token-based cloud computing: Secure outsourcing of data and arbitrary computations with lower latency. In: Trust and Trustworthy Computing, Berlin, Germany 21–23.

  23. Tajammul M, Parveen R (2020) To Carve out Private Cloud with Total Functionality. In: 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), pp 831–835. https://doi.org/10.1109/ICACCCN51052.2020.9362826.

  24. https://blog.syncsort.com/2018/08/data-security/aes-vs-des-encryption-standard-3des-tdea/ DES Encryption withdrawn in 2005.

  25. Chuang I, Li S, Huang K, Kuo Y (2011) An effective privacy protection scheme for cloud computing. In: 13th International Conference on Advanced Communication Technology (ICACT2011), pp 260–265.

  26. Azougaghe A, Kartit Z, Hedabou M, Belkasmi M, El Marraki M (2015) An efficient algorithm for data security in Cloud storage. In: 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA), pp 421–427. https://doi.org/10.1109/ISDA.2015.7489267.

  27. Li Y, Gai K, Qiu L, Qiu M, Zhao H. Intelligent cryptography approach for secure distributed big data storage in cloud computing. Inf Sci (NY). 2017;387:103–15.

    Article  Google Scholar 

Download references

Funding

No funding sources.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohd Tajammul.

Ethics declarations

Conflict of Interest

On behalf of all the authors, the corresponding author states that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the topical collection “Advanced Computing and Data Sciences” guest edited by Mayank Singh, Vipin Tyagi and P.K. Gupta.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tajammul, M., Parveen, R. & Asif, S. Deterministic Algorithm for Cloud Outsourced Data. SN COMPUT. SCI. 3, 223 (2022). https://doi.org/10.1007/s42979-022-01089-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-022-01089-x

Keywords