A Confidentiality Scheme for Storing Encrypted Data through Cloud

被引:2
|
作者
Timraz, Karim [1 ]
Barhoom, Tawfiq [2 ]
Fatayer, Tamer [3 ]
机构
[1] Open Al Quds Univ, Gaza, Palestine
[2] Islamic Univ, Gaza, Palestine
[3] Al Aqsa Univ, Gaza, Palestine
来源
2019 IEEE 7TH PALESTINIAN INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (PICECE) | 2019年
关键词
cloud computing; confidentiality; encryption; middle ware; dividing; rotation process; index table; time performance;
D O I
10.1109/picece.2019.8747193
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
the advantages of Cloud computing constitute the substantial motivation for user to store and access their data. The cloud storage capacity reduces the data owner's overhead. In spite of several techniques were proposed for storing data on cloud, the data owner still suffers from a lack of confidentiality and time delay in storing their data on cloud. In this paper, a new scheme is proposed for storing data which achieved data confidentiality and time efficiency. A Middleware Management Control (MWM) is built which is an-intermediary layer between customer and cloud providers. Several text documents sizes are prepared for downloading and uploading process to measure time performance. MWM rotates each document rows to columns; then, it divides document into sub-files vertically. Finally, it encrypts each sub-file and stores it into different cloud storage. The divided sub files are mapping with cloud providers through location table. The proposed scheme is evaluated to measure confidentiality and time performance for the upload and downloads process. In spite of the proposed scheme uses extra operations (rotation, dividing and encryption) to enhance confidentiality, the experimental results show that significantly the same time performance has been achieved for uploading and downloading process compared with other works.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A Novel Data Deduplication Scheme for Encrypted Cloud Databases
    Li, Jung-Shian
    Liu, I-Hsien
    Lee, Chao-Yuan
    Li, Chu-Fen
    Liu, Chuan-Gang
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (04): : 1115 - 1125
  • [2] Fast Cloud-RSA Scheme for Promoting Data Confidentiality in the Cloud Computing
    El Makkaoui, Khalid
    Beni-Hssane, Abderrahim
    Ezzati, Abdellah
    El-Ansari, Anas
    8TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS (EUSPN 2017) / 7TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE (ICTH-2017) / AFFILIATED WORKSHOPS, 2017, 113 : 33 - 40
  • [3] A SCHEME OF DATA CONFIDENTIALITY AND FAULT-TOLERANCE IN CLOUD STORAGE
    Fu, Yongkang
    Sun, Bin
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 228 - 233
  • [4] Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing
    Ghimes, Ana-Maria
    Patriciu, Victor Valeriu
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, (SECITC 2016), 2016, 10006 : 274 - 285
  • [5] SafeBox: A Scheme for Searching and Sharing Encrypted Data in Cloud Applications
    Wang, Guofeng
    Liu, Chuanyi
    Dong, Yingfei
    Pan, Hezhong
    Han, Peiyi
    Fang, Binxing
    2017 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2017, : 648 - 653
  • [6] Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing
    El Makkaoui, Khalid
    Beni-Hssane, Abderrahim
    Ezzati, Abdellah
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (12) : 4629 - 4640
  • [7] A swift Cloud-Paillier scheme to protect sensitive data confidentiality in cloud computing
    El Makkaoui, Khalid
    Ezzati, Abdellah
    Beni-Hssane, Abderrahim
    Ouhmad, Slimane
    15TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2018) / THE 13TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2018) / AFFILIATED WORKSHOPS, 2018, 134 : 83 - 90
  • [8] Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing
    Khalid El Makkaoui
    Abderrahim Beni-Hssane
    Abdellah Ezzati
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 4629 - 4640
  • [9] A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality
    Zhen Yang
    Wenyu Wang
    Yongfeng Huang
    Xing Li
    Mobile Networks and Applications, 2021, 26 : 842 - 850
  • [10] A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality
    Yang, Zhen
    Wang, Wenyu
    Huang, Yongfeng
    Li, Xing
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (02): : 842 - 850