Multilevel Cryptography with Metadata and Lock Approach for Storing Data in Cloud
DOI:
https://doi.org/10.14738/tnc.26.591Keywords:
Cloud service provider, Data storage as a Service, Multilevel Cryptography, Secure Cloud Data, Secure Communication.Abstract
Cryptography is a technique for secure communication. Cryptography main objectives are confidentiality, integrity, non-repudiation, availability and authentication. Cryptography is a well defined and used technique to secure sensitive data. It has been using in cloud computing technology by various cloud service provider. Customers across the world are looking for storage infrastructure to store huge amount of data securely. Hence they are opting on demand, ready available, internet based and maintenance free infrastructure known as cloud data storage as a service. Many potential vendors like Microsoft and Amazon providing this service to customer across the globe. But major challenge is customer trust on vendor. Vendor has to prove customer that their data is safe via cryptography, security breach penalty, policies and security agreement so on. However, it is difficult to gain customer confident on vendor security. Hence we are proposing customer end algorithm called multilevel cryptography for secure cloud data storage where customer performs multiple cryptography operations on their data before storing into a cloud. In this paper we present the multilevel cryptography algorithm for secure cloud data storage with design and analysis.
References
. Kawser Wazed Nafi, Tonny Shekha Kar,Sayed Anisul Hoque, Dr. M. M. A Hashem, Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture, (IJACSA ) International Journal of Advanced Computer Science and Applications, Vol. 3, No. 10, 2012, 181-185.
. Eman M.Mohamed, Hatem S. Abdelkader, Enhanced Data Security Model for Cloud Computing, The 8th International Conference on INFOrmatics and Systems (INFOS2012) - 14-16 May Cloud and Mobile Computing Track, Faculty of Computers and Information - Cairo University, CC-12.
. Kan Yang, Xiaohua Jia, An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 9, SEPTEMBER 2013, 1717-1726.
. Cong wang, Qian wang, and Kui ren, Wenjing Lou,”Ensuring data storage security in cloud computing” at IEEE (8-1-4244-3876-1/09).
. William, S., 2005. Cryptography and Network Security Principles and Practices. 4th Edn. PHI.
. CA Technologies cloud authentication system http://www.ca.com/us/authentication-system.aspx
. X. Suo, Y. Zhu, G. S. Owen, “Graphical passwords: A survey,” in Proc. 21st Annual Computer Security Application Conf. Dec. 5–9, 2005, pp. 463–472.
. S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, “Authentication using graphical passwords: Basic results,” in Proc. Human-Compute. Interaction Int., Las Vegas, NV, Jul. 25–27, 2005.
. Fawaz A. Alsulaiman and Abdulmotaleb El Saddik,“Three-Dimensional Password for More Secure Authentication,” IEEE, http://ieeexplore.ieee.org, Last Updated – 6 Feb 2008.
. [10]Dinesha H A, Dr.V.K. Agrawal, Multi-level Authentication Technique for Accessing Cloud Services, IEEE conference , Dindigul.
. Mostafa Hajivali , Faraz Fatemi Moghaddam , Maen T. Alrashdan , Abdualeem Z. M. Alothmani , Applying an Agent-Based User Authentication and Access Control Model for Cloud Servers, ICTC 2013, 978-1-4799-0698-7/13, 807-902,2013.
. Laurent Hubert, Renaud Sirdey, Authentication and secured execution for the Infrastructure-as-a-Service layer of the Cloud Computing model, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 978-0-7695-5094-7, 291-296, 2013.
. Ming-Huang Guo, Horng-Twu Liaw, Li-Lin Hsiao, Chih-Ta Yen, Authentication Using Graphical Password in Cloud, 177-181, 2013.
. H. B. Tang*, Z. J. Zhu, Z. W. Gao, Y. Li, A SECURE BIOMETRIC-BASED AUTHENTICATION SCHEME USING SMART CARD,IEEE, 39-43,2013.
. A. K. Das. “Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards”, IET Information Security, 5 (3), pp. 145-151, 2011.
. Wei Xie1, Lei Xie2, Chen Zhang1, Quan Zhang1, Chaojing Tang1, Cloud-based RFID Authentication, 2013 IEEE International Conference on RFID, 978-1-4673-5750-0/13,168-175, 2013.
. Bernd Zwattendorfer, Arne Tauber, SECURE CLOUD AUTHENTICATION USING EIDS, Proceedings of IEEE CCIS2012, 978-1-4673-1857-0/12/, 397-401, 2012.