A Confidentiality Scheme for Storing Encrypted Data through Cloud

被引:2
|
作者
Timraz, Karim [1 ]
Barhoom, Tawfiq [2 ]
Fatayer, Tamer [3 ]
机构
[1] Open Al Quds Univ, Gaza, Palestine
[2] Islamic Univ, Gaza, Palestine
[3] Al Aqsa Univ, Gaza, Palestine
来源
2019 IEEE 7TH PALESTINIAN INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (PICECE) | 2019年
关键词
cloud computing; confidentiality; encryption; middle ware; dividing; rotation process; index table; time performance;
D O I
10.1109/picece.2019.8747193
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
the advantages of Cloud computing constitute the substantial motivation for user to store and access their data. The cloud storage capacity reduces the data owner's overhead. In spite of several techniques were proposed for storing data on cloud, the data owner still suffers from a lack of confidentiality and time delay in storing their data on cloud. In this paper, a new scheme is proposed for storing data which achieved data confidentiality and time efficiency. A Middleware Management Control (MWM) is built which is an-intermediary layer between customer and cloud providers. Several text documents sizes are prepared for downloading and uploading process to measure time performance. MWM rotates each document rows to columns; then, it divides document into sub-files vertically. Finally, it encrypts each sub-file and stores it into different cloud storage. The divided sub files are mapping with cloud providers through location table. The proposed scheme is evaluated to measure confidentiality and time performance for the upload and downloads process. In spite of the proposed scheme uses extra operations (rotation, dividing and encryption) to enhance confidentiality, the experimental results show that significantly the same time performance has been achieved for uploading and downloading process compared with other works.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage
    YANG Zhen
    WANG Wenyu
    HUANG Yongfeng
    LI Xing
    Chinese Journal of Electronics, 2019, 28 (01) : 179 - 187
  • [32] Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme
    Dawson, John Kwao
    Twum, Frimpong
    Acquah, James Benjamin Hayfron
    Missah, Yaw Marfo
    PLOS ONE, 2023, 18 (02):
  • [33] Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage
    Yang Zhen
    Wang Wenyu
    Huang Yongfeng
    Li Xing
    CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (01) : 179 - 187
  • [34] FSSE: An Effective Fuzzy Semantic Searchable Encryption Scheme Over Encrypted Cloud Data
    Liu, Guoxiu
    Yang, Geng
    Bai, Shuangjie
    Zhou, Qiang
    Dai, Hua
    IEEE ACCESS, 2020, 8 : 71893 - 71906
  • [35] A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud
    Yang, Wenyuan
    Zhu, Yuesheng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 100 - 115
  • [36] A Privacy-preserving Fuzzy Keyword Search Scheme over Encrypted Cloud Data
    Wang, Dongsheng
    Fu, Shaojing
    Xu, Ming
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 663 - 670
  • [37] Integrity and Confidentiality in Cloud Outsourced Data
    Rady, Mai
    Abdelkader, Tamer
    Ismail, Rasha
    AIN SHAMS ENGINEERING JOURNAL, 2019, 10 (02) : 275 - 285
  • [38] Separable Data-Hiding Scheme for Encrypted Image to Protect Privacy of User in Cloud
    Liu, Li
    Wang, Lifang
    Shi, Yun-Qing
    Chang, Chin-Chen
    SYMMETRY-BASEL, 2019, 11 (01):
  • [39] Encryption Techniques for Cloud Data Confidentiality
    Soofi, Aized Amin
    Khan, M. Irfan
    Fazal-e-Amin
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (04): : 11 - 20
  • [40] Confidentiality and Storage of Data in Cloud Environment
    Mohit, Prerna
    Biswas, G. P.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, (FICTA 2016), VOL 2, 2017, 516 : 289 - 295