A Robust Lightweight Data Security Model for Cloud Data Access and Storage

被引:7
作者
Pajany, M. [1 ]
Zayaraz, G. [2 ]
机构
[1] Pondicherry Engn Coll, Pondicherry, India
[2] Pondicherry Engn Coll, Dept Comp Sci & Engn, Pondicherry, India
关键词
Cloud Computing; Data Retrieval; Data Security; Data Storage; Decryption; Encryption; Hybrid Crypto Algorithm (HCA); Lightweight Cloud-Based Data Security Model (LCDS); Secure Cloud; OF-THE-ART; PRIVACY; CHALLENGES; EFFICIENT;
D O I
10.4018/IJITWE.2021070103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, an efficient lightweight cloud-based data security model (LCDS) is proposed for building a secured cloud database with the assistance of intelligent rules, data storage, information collection, and security techniques. The major intention of this study is to introduce a new encryption algorithm to secure intellectual data, proposing a new data aggregation algorithm for effective data storage and improved security, developing an intelligent data merging algorithm for accessing encrypted and original datasets. The major benefit of the proposed model is that it is fast in the encryption process at the time of data storage and reduced decryption time during data retrieval. In this work, the authors proposed an enhanced version of the hybrid crypto algorithm (HCA) for cloud data access and storage. The proposed system provides secured storage for storing data within the cloud.
引用
收藏
页码:39 / 53
页数:15
相关论文
共 22 条
  • [1] A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds
    Abbas, Assad
    Khan, Samee U.
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (04) : 1431 - 1441
  • [2] Bhaladhare PR, 2016, J INF SCI ENG, V32, P63
  • [3] Study on the security models and strategies of cloud computing
    Che, Jianhua
    Duan, Yamin
    Zhang, Tao
    Fan, Jie
    [J]. PEEA 2011, 2011, 23
  • [4] Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing
    Chenthara, Shekha
    Ahmed, Khandakar
    Wang, Hua
    Whittaker, Frank
    [J]. IEEE ACCESS, 2019, 7 : 74361 - 74382
  • [5] Dua D., UCI Machine Learning Repository
  • [6] Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data
    Fu, Zhangjie
    Huang, Fengxiao
    Ren, Kui
    Weng, Jian
    Wang, Cong
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1874 - 1884
  • [7] An analysis of security issues for cloud computing
    Hashizume, Keiko
    Rosado, David G.
    Fernandez-Medina, Eduardo
    Fernandez, Eduardo B.
    [J]. JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2013, 4 (01) : 1 - 13
  • [8] Kumar A., 2019, INT J INFORM SYSTEMS, V2
  • [9] Efficient Encrypted Data Comparison Through a Hybrid Method
    Li, Xing-Xin
    Zhu, You-Wen
    Wang, Jian
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (04) : 953 - 964
  • [10] CloudGenius: A Hybrid Decision Support Method for Automating the Migration of Web Application Clusters to Public Clouds
    Menzel, Michael
    Ranjan, Rajiv
    Wang, Lizhe
    Khan, Samee U.
    Chen, Jinjun
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (05) : 1336 - 1348