A Confidentiality Scheme for Storing Encrypted Data through Cloud

被引:2
|
作者
Timraz, Karim [1 ]
Barhoom, Tawfiq [2 ]
Fatayer, Tamer [3 ]
机构
[1] Open Al Quds Univ, Gaza, Palestine
[2] Islamic Univ, Gaza, Palestine
[3] Al Aqsa Univ, Gaza, Palestine
来源
2019 IEEE 7TH PALESTINIAN INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (PICECE) | 2019年
关键词
cloud computing; confidentiality; encryption; middle ware; dividing; rotation process; index table; time performance;
D O I
10.1109/picece.2019.8747193
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
the advantages of Cloud computing constitute the substantial motivation for user to store and access their data. The cloud storage capacity reduces the data owner's overhead. In spite of several techniques were proposed for storing data on cloud, the data owner still suffers from a lack of confidentiality and time delay in storing their data on cloud. In this paper, a new scheme is proposed for storing data which achieved data confidentiality and time efficiency. A Middleware Management Control (MWM) is built which is an-intermediary layer between customer and cloud providers. Several text documents sizes are prepared for downloading and uploading process to measure time performance. MWM rotates each document rows to columns; then, it divides document into sub-files vertically. Finally, it encrypts each sub-file and stores it into different cloud storage. The divided sub files are mapping with cloud providers through location table. The proposed scheme is evaluated to measure confidentiality and time performance for the upload and downloads process. In spite of the proposed scheme uses extra operations (rotation, dividing and encryption) to enhance confidentiality, the experimental results show that significantly the same time performance has been achieved for uploading and downloading process compared with other works.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Balancing Storage Efficiency and Data Confidentiality with Tunable Encrypted Deduplication
    Li, Jingwei
    Yang, Zuoru
    Ren, Yanjing
    Lee, Patrick P. C.
    Zhang, Xiaosong
    PROCEEDINGS OF THE FIFTEENTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS (EUROSYS'20), 2020,
  • [42] Encrypted Data Deduplication in Cloud Storage
    Fan, Chun-I
    Huang, Shi-Yuan
    Hsu, Wen-Che
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 18 - 25
  • [43] Deduplication on Encrypted Big Data in Cloud
    Yan, Zheng
    Ding, Wenxiu
    Yu, Xixun
    Zhu, Haiqi
    Deng, Robert H.
    IEEE Transactions on Big Data, 2016, 2 (02): : 138 - 150
  • [44] An Efficient Fuzzy Keyword Matching Technique for Searching Through Encrypted Cloud Data
    Ahsan, M. A. Manazir
    Chowdhury, Fahad Zaman
    Sabilah, Musarat
    Wahab, Ainuddin Wahid Bin Abdul
    Bin Idris, Mohd Yamani Idna
    2017 5TH INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS 2017): SOCIAL TRANSFORMATION THROUGH DATA SCIENCE, 2017,
  • [45] An Encrypted File Deduplication Scheme with Permission in Cloud Storage
    Deng, Zuojie
    Tan, Xiaolan
    Chen, Shuhong
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2018, 2018
  • [46] A scheme for encrypted image data compression
    Thakur, Nileshsingh V.
    Deshmukh, Kalyani
    Shah, Saurabh A.
    Semwal, Vijay Bhaskar
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 409 - 420
  • [47] A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing
    Zhu, Xiaoyu
    Liu, Qin
    Wang, Guojun
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 845 - 851
  • [48] Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data
    Zhu, Youwen
    Takagi, Tsuyoshi
    Hu, Rong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (02): : 326 - 330
  • [49] A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
    Xia, Zhihua
    Wang, Xinhui
    Sun, Xingming
    Wang, Qian
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (02) : 340 - 352
  • [50] On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing
    Xiong, Lizhi
    Shi, Yunqing
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 55 (03): : 523 - 539