Secure Data Storage and Retrieval over the Encrypted Cloud Computing

Jaydip Kumar, Hemant Kumar, K. Singh, Vipin Saxena
{"title":"Secure Data Storage and Retrieval over the Encrypted Cloud Computing","authors":"Jaydip Kumar, Hemant Kumar, K. Singh, Vipin Saxena","doi":"10.5815/ijcnis.2024.04.04","DOIUrl":null,"url":null,"abstract":"Information security in cloud computing refers to the protection of data items such as text, images, audios and video files. In the modern era, data size is increasing rapidly from gigabytes to terabytes or even petabytes, due to development of a significant amount of real-time data. The majority of data is stored in cloud computing environments and is sent or received over the internet. Due to the fact that cloud computing offers internet-based services, there are various attackers and illegal users over the internet who are consistently trying to gain access to user’s private data without the appropriate permission. Hackers frequently replace any fake data with actual data. As a result, data security has recently generated a lot of attention. To provide access rights of files, the cloud computing is only option for authorized user. To overcome from security threats, a security model is proposed for cloud computing to enhance the security of cloud data through the fingerprint authentication for access control and genetic algorithm is also used for encryption/decryption of cloud data. To search desired data from cloud, fuzzy encrypted keyword search technique is used. The encrypted keyword is stored in cloud storage using SHA256 hashing techniques. The proposed model minimizes the computation time and maximizes the security threats over the cloud. The computed results are presented in the form of figures and tables.","PeriodicalId":36488,"journal":{"name":"International Journal of Computer Network and Information Security","volume":"20 4","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Network and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5815/ijcnis.2024.04.04","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 1

Abstract

Information security in cloud computing refers to the protection of data items such as text, images, audios and video files. In the modern era, data size is increasing rapidly from gigabytes to terabytes or even petabytes, due to development of a significant amount of real-time data. The majority of data is stored in cloud computing environments and is sent or received over the internet. Due to the fact that cloud computing offers internet-based services, there are various attackers and illegal users over the internet who are consistently trying to gain access to user’s private data without the appropriate permission. Hackers frequently replace any fake data with actual data. As a result, data security has recently generated a lot of attention. To provide access rights of files, the cloud computing is only option for authorized user. To overcome from security threats, a security model is proposed for cloud computing to enhance the security of cloud data through the fingerprint authentication for access control and genetic algorithm is also used for encryption/decryption of cloud data. To search desired data from cloud, fuzzy encrypted keyword search technique is used. The encrypted keyword is stored in cloud storage using SHA256 hashing techniques. The proposed model minimizes the computation time and maximizes the security threats over the cloud. The computed results are presented in the form of figures and tables.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
加密云计算上的安全数据存储和检索
云计算中的信息安全是指对文本、图像、音频和视频文件等数据项的保护。在现代社会,由于大量实时数据的发展,数据量从千兆字节迅速增加到 TB 甚至 PB。大部分数据都存储在云计算环境中,并通过互联网发送或接收。由于云计算提供基于互联网的服务,互联网上有各种攻击者和非法用户,他们总是试图在未经适当许可的情况下获取用户的私人数据。黑客经常用真实数据替换任何虚假数据。因此,数据安全问题近来备受关注。为了提供文件访问权限,云计算是授权用户的唯一选择。为了克服安全威胁,我们提出了一种云计算安全模型,通过指纹验证进行访问控制,并使用遗传算法对云数据进行加密/解密,从而提高云数据的安全性。为从云中搜索所需数据,使用了模糊加密关键字搜索技术。加密关键词使用 SHA256 哈希技术存储在云存储中。所提出的模型最大限度地减少了计算时间,并最大限度地降低了云安全威胁。计算结果以图和表的形式呈现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
4.10
自引率
0.00%
发文量
33
期刊最新文献
Universal On-board Neural Network System for Restoring Information in Case of Helicopter Turboshaft Engine Sensor Failure Secure Data Storage and Retrieval over the Encrypted Cloud Computing An Enhanced Process Scheduler Using Multi-Access Edge Computing in An IoT Network BSHOA: Energy Efficient Task Scheduling in Cloud-fog Environment Chaotic Map based Random Binary Key Sequence Generation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1