Secure Data Quiry Using Unique Hash Indexing Utilizing MAC Address in a Remote Data Storage

被引:0
作者
Kaabneh, Khalid [1 ]
Alhwaidi, Rakan [2 ]
机构
[1] Al Ahliyya Amman Univ, Dept Comp Sci, Fac Informat Technol, Amman, Jordan
[2] Amman Arab Univ, Fac Comp Sci & Informat, Dept Comp Sci, Amman, Jordan
来源
2019 INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT) | 2019年
关键词
MAC; SHA-256; Secure Data Storage; Secure Hash Values; ENCRYPTION;
D O I
10.1109/acit47987.2019.8991119
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data privacy and protection is the hottest topic in cloud computing-based systems. Cloud based systems users keen on finding a way to ensure the security of information and maintaining privacy using remote document search to eliminate the need to retrieve data from the cloud. In this paper, we propose a novel model to provide a unique index using SHA-256 Hashing and to utilize the uniqueness of MAC address to produce a unique MAC-HASH with no collision and minimal processing time. The results has been proven to be irreversible and give a unique value for each user and lies in dispersing infiltrators of data and the hacker would have no access to the original data. Therefore, the files will be blind searched and the cloud administrator and the hacker would have no knowledge of your search.
引用
收藏
页码:32 / 37
页数:6
相关论文
共 17 条
  • [1] Alhamazani K., 2014, IN PRESS, P1, DOI [10.1007/s00607-014-0398-5, DOI 10.1007/S00607-014-0398-5]
  • [2] SeDaSC: Secure Data Sharing in Clouds
    Ali, Mazhar
    Dhamotharan, Revathi
    Khan, Eraj
    Khan, Samee U.
    Vasilakos, Athanasios V.
    Li, Keqin
    Zomaya, Albert Y.
    [J]. IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 395 - 404
  • [3] Fast and Scalable Multi-Way Analysis of Massive Neural Data
    Chen, Dan
    Li, Xiaoli
    Wang, Lizhe
    Khan, Samee U.
    Wang, Juan
    Zeng, Ke
    Cai, Chang
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (03) : 707 - 719
  • [4] Chen YR, 2011, IEEE INFOCOM SER, P1952, DOI 10.1109/INFCOM.2011.5934999
  • [5] A quantitative analysis of current security concerns and solutions for cloud computing
    Gonzalez, Nelson
    Miers, Charles
    Redigolo, Fernando
    Simplicio, Marcos
    Carvalho, Tereza
    Naslund, Mats
    Pourzandi, Makan
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2012, 1 : 1 - 18
  • [6] Hamdallah R., 2019, 3 INT COMP SCI INF C
  • [7] Hwaidi R., 2019, 3 INT COMP SCI INF C
  • [8] Incremental proxy re-encryption scheme for mobile cloud computing environment
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Madani, Sajjad A.
    Ali, Mazhar
    Khan, Atta Ur Rehman
    Shamshirband, Shahaboddin
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 68 (02) : 624 - 651
  • [9] Martin J., 2017, P PRIV ENH TECHN, P365
  • [10] Mosa A., 2017, INT J ELECT INFORM E, V5, P93