A Hybrid Multi-Cloud Framework Using the IBBE Key Management System for Securing Data Storage

被引:5
作者
Sohal, Manreet [1 ]
Bharany, Salil [2 ]
Sharma, Sandeep [2 ]
Maashi, Mashael S. [3 ]
Aljebreen, Mohammed [4 ]
机构
[1] Guru Nanak Dev Engn Coll, Dept Comp Applicat, Ludhiana 141006, Punjab, India
[2] Guru Nanak Dev Univ, Dept Comp Engn & Technol, Amritsar 143005, Punjab, India
[3] King Saud Univ, Coll Comp & Informat Sci, Software Engn Dept, Riyadh 11451, Saudi Arabia
[4] King Saud Univ, Community Coll, Dept Comp Sci, Riyadh 11437, Saudi Arabia
关键词
multi-clouds; storage security; client-side cryptography; key management; BROADCAST ENCRYPTION;
D O I
10.3390/su142013561
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Information storage and access in multi-cloud environments have become quite prevalent. In this paper, a multi-cloud framework is presented that secures users' data. The primary goal of this framework is to secure users' data from untrusted Cloud Service Providers (CSPs). They can collude with other malicious users and can hand over users' data to these malicious users for their beneficial interests. In order to achieve this goal, the data are split into parts, and then each part is encrypted and uploaded to a different cloud. Therefore, client-side cryptography is used in this framework. For encrypting users' data, the BDNA encryption technique is used. This framework presents a hybrid cryptographic approach that uses Identity-based Broadcast Encryption (IBBE) for managing the keys of the symmetric key algorithm (BDNA) by encrypting them with the particular version of IBBE. The work presented in this research paper is the first practical implementation of IBBE for securing encryption keys. Earlier, IBBE was only used for securely broadcasting data across many users over a network. The security of this hybrid scheme was proved through Indistinguishable Chosen-Ciphertext Attacks. This double encryption process makes the framework secure against all insiders and malicious users' attacks. The proposed framework was implemented as a web application, and real-time storage clouds were used for storing the data. The workflow of the proposed framework is presented through screenshots of different working modules.
引用
收藏
页数:24
相关论文
共 44 条
  • [1] Althamary Ebrahim Abdullah, 2016, T NETWORK COMMUNICAT, V4, P53
  • [2] AlZain M. A., 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P5490, DOI 10.1109/HICSS.2012.153
  • [3] [Anonymous], 2019, DIGITAL GUARDIAN
  • [4] Balasaraswathi VR, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), P1190, DOI 10.1109/ICACCCT.2014.7019286
  • [5] Bharany S., 2022, Machine Learning, Blockchain, Aand Cyber Security in Smart Environments, P1
  • [6] Efficient Middleware for the Portability of PaaS Services Consuming Applications among Heterogeneous Clouds
    Bharany, Salil
    Kaur, Kiranbir
    Badotra, Sumit
    Rani, Shalli
    Kavita
    Wozniak, Marcin
    Shafi, Jana
    Ijaz, Muhammad Fazal
    [J]. SENSORS, 2022, 22 (13)
  • [7] Energy Efficient Clustering Protocol for FANETS Using Moth Flame Optimization
    Bharany, Salil
    Sharma, Sandeep
    Bhatia, Surbhi
    Rahmani, Mohammad Khalid Imam
    Shuaib, Mohammed
    Lashari, Saima Anwar
    [J]. SUSTAINABILITY, 2022, 14 (10)
  • [8] A Systematic Survey on Energy-Efficient Techniques in Sustainable Cloud Computing
    Bharany, Salil
    Sharma, Sandeep
    Khalaf, Osamah Ibrahim
    Abdulsahib, Ghaida Muttashar
    Al Humaimeedy, Abeer S.
    Aldhyani, Theyazn H. H.
    Maashi, Mashael
    Alkahtani, Hasan
    [J]. SUSTAINABILITY, 2022, 14 (10)
  • [9] Energy-Efficient Clustering Scheme for Flying Ad-Hoc Networks Using an Optimized LEACH Protocol
    Bharany, Salil
    Sharma, Sandeep
    Badotra, Sumit
    Khalaf, Osamah Ibrahim
    Alotaibi, Youseef
    Alghamdi, Saleh
    Alassery, Fawaz
    [J]. ENERGIES, 2021, 14 (19)
  • [10] Security and Privacy-Enhancing Multicloud Architectures
    Bohli, Jens-Matthias
    Gruschka, Nils
    Jensen, Meiko
    Lo Iacono, Luigi
    Marnau, Ninja
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (04) : 212 - 224