A Robust Lightweight Data Security Model for Cloud Data Access and Storage

被引:5
作者
Pajany, M. [1 ]
Zayaraz, G. [2 ]
机构
[1] Pondicherry Engn Coll, Pondicherry, India
[2] Pondicherry Engn Coll, Dept Comp Sci & Engn, Pondicherry, India
关键词
Cloud Computing; Data Retrieval; Data Security; Data Storage; Decryption; Encryption; Hybrid Crypto Algorithm (HCA); Lightweight Cloud-Based Data Security Model (LCDS); Secure Cloud; OF-THE-ART; PRIVACY; CHALLENGES; EFFICIENT;
D O I
10.4018/IJITWE.2021070103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, an efficient lightweight cloud-based data security model (LCDS) is proposed for building a secured cloud database with the assistance of intelligent rules, data storage, information collection, and security techniques. The major intention of this study is to introduce a new encryption algorithm to secure intellectual data, proposing a new data aggregation algorithm for effective data storage and improved security, developing an intelligent data merging algorithm for accessing encrypted and original datasets. The major benefit of the proposed model is that it is fast in the encryption process at the time of data storage and reduced decryption time during data retrieval. In this work, the authors proposed an enhanced version of the hybrid crypto algorithm (HCA) for cloud data access and storage. The proposed system provides secured storage for storing data within the cloud.
引用
收藏
页码:39 / 53
页数:15
相关论文
共 22 条
[1]   A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds [J].
Abbas, Assad ;
Khan, Samee U. .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (04) :1431-1441
[2]  
Bhaladhare PR, 2016, J INF SCI ENG, V32, P63
[3]   Study on the security models and strategies of cloud computing [J].
Che, Jianhua ;
Duan, Yamin ;
Zhang, Tao ;
Fan, Jie .
PEEA 2011, 2011, 23
[4]   Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing [J].
Chenthara, Shekha ;
Ahmed, Khandakar ;
Wang, Hua ;
Whittaker, Frank .
IEEE ACCESS, 2019, 7 :74361-74382
[5]  
Dua Dheeru, 2017, UCI machine learning repository
[6]   Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data [J].
Fu, Zhangjie ;
Huang, Fengxiao ;
Ren, Kui ;
Weng, Jian ;
Wang, Cong .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) :1874-1884
[7]   An analysis of security issues for cloud computing [J].
Hashizume, Keiko ;
Rosado, David G. ;
Fernandez-Medina, Eduardo ;
Fernandez, Eduardo B. .
JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2013, 4 (01) :1-13
[8]  
Kumar A., 2019, INT J INFORM SYSTEMS, V2
[9]   Efficient Encrypted Data Comparison Through a Hybrid Method [J].
Li, Xing-Xin ;
Zhu, You-Wen ;
Wang, Jian .
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (04) :953-964
[10]   CloudGenius: A Hybrid Decision Support Method for Automating the Migration of Web Application Clusters to Public Clouds [J].
Menzel, Michael ;
Ranjan, Rajiv ;
Wang, Lizhe ;
Khan, Samee U. ;
Chen, Jinjun .
IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (05) :1336-1348