Skip to main content

Cloud Data Security Solution Based on Data Access Classification, Advanced Encryption Standard and Message Authentication Code

  • Conference paper
  • First Online:
Proceedings of the Future Technologies Conference (FTC) 2018 (FTC 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 881))

Included in the following conference series:

  • 1951 Accesses

Abstract

Cloud computing currently plays an increasingly important role in the information technology industry given its enhanced performance, wide accessibility, low cost, and many other benefits. Cloud computing provides a large storage space for data and ensures rapid processing of data to different users over the Internet. Cloud data security is a major ongoing challenge, which acts as a limiting factor for the extensive deployment of cloud computing. Thus, the problem selected for this work is enhancing data storage security in cloud computing with multiple methods to provide enhanced trusted, secure, and reliable cloud data storage services. In this paper, the framework for data security is mainly to protect data by combining double authentication for appropriate data classification and encryption and digital signature verification to analyze the integrity of the data during the transmission and retrieving processes. This analysis is performed through a certain message authentication code to ensure that the data are delivered without any alterations during transmission. An important contribution of this proposal is the different techniques and specialized procedures that can efficiently protect the data throughout the process, that is, from the owner to the cloud and then to the delivery to the end user. High-level security is achieved by double authentication as one by the user/owner and the other by the cloud. High-level security can enhance the performance of storing data in the cloud, particularly for certain important issues, such as data leakage, tampering of data, and preventing unauthorized access even from the cloud service provider.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Suciu, G., Suciu, V., Martian, A., Craciunescu, R., Vulpe, A., Marcu, I., Halunga, S., Fratu, O.: Big data, internet of things and cloud convergence–an architecture for secure e-health applications. J. Med. Syst. 39(11), 141 (2015)

    Google Scholar 

  2. Liu, Y., Xu, X.: Industry 4.0 and cloud manufacturing: a comparative analysis. J. Manuf. Sci. Eng. 139(3), 034701 (2017)

    Article  Google Scholar 

  3. Guerrero-Ibanez, J.A., Zeadally, S., Contreras-Castillo, J.: Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies. IEEE Wirel. Commun. 22(6), 122–128 (2015)

    Article  Google Scholar 

  4. Fang, S., Da Xu, L., Zhu, Y., Ahati, J., Pei, H., Yan, J., Liu, Z.: An integrated system for regional environmental monitoring and management based on internet of things. IEEE Trans. Industr. Inf. 10(2), 1596–1605 (2014)

    Article  Google Scholar 

  5. Botta, A., De Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)

    Article  Google Scholar 

  6. Ahmed, M., Hossain, M.A.: Cloud computing and security issues in the cloud. Int. J. Network Secur. Appl. 6(1), 25 (2014)

    Article  Google Scholar 

  7. Khanezaei, N., Hanapi, Z.M.: A framework based on RSA and AES encryption algorithms for cloud computing services. In: 2014 IEEE Conference on Systems, Process and Control (ICSPC), pp. 58–62. IEEE, December 2014

    Google Scholar 

  8. Wang, H., Wu, S., Chen, M., Wang, W.: Security protection between users and the mobile media cloud. IEEE Commun. Mag. 52(3), 73–79 (2014)

    Article  Google Scholar 

  9. Li, J., Chen, X., Li, M., Li, J., Lee, P.P., Lou, W.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25(6), 1615–1625 (2014)

    Article  Google Scholar 

  10. Talli, G., Porto, S., Carey, D., Brandonisio, N., Ossieur, P., Townsend, P., Bonk, R., Pfeiffer, T., Slyne, F., McGettrick, S., Blümm, C.: Technologies and architectures to enable SDN in converged 5G/optical access networks. In: 2017 International Conference on  Optical Network Design and Modeling (ONDM), pp. 1–6. IEEE, May 2017

    Google Scholar 

  11. Dharani, P., Berlin, M.A.: Survey on secret sharing scheme with deduplication in cloud computing. In: 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO), pp. 1–5. IEEE, January 2015

    Google Scholar 

  12. Shingare, M.M., Birajdar, P., Bibrale, H.: Hybrid cloud approach for secure authorized deduplication. Int. J. Eng. Sci. 7, 12766 (2017)

    Google Scholar 

  13. Eide, O.W.: Elliptic Curve Cryptography-Implementation and Performance Testing of Curve Representations. Master’s thesis (2017)

    Google Scholar 

  14. Rabah, K.: Implementing Elliptic Curve Digital Signature Algorithm (ECDSA) Schemes. Mara Res. J. Comput. Sci. Secur. 1(1), 29–50 (2017). ISSN 2518-8453

    Google Scholar 

  15. Gupta, D.S., Biswas, G.P.: A secure cloud storage using ECC-based homomorphic encryption. Int. J. Inf. Secur. Priv. (IJISP) 11(3), 54–62 (2017)

    Article  Google Scholar 

  16. Wulf, J., Winkler, T.J., Brenner, W.: Measuring IT service management capability: Scale development and empirical validation (2015)

    Google Scholar 

  17. Khalilian, A., Ibrahim, O.: The state of data quality arts in (technical) service reporting. J. Theor. Appl. Inf. technol. 95(16) (2017)

    Google Scholar 

  18. Ab Rahman, N.H., Cahyani, N.D.W., Choo, K.K.R.: Cloud incident handling and forensic-by-design: cloud storage as a case study. Concurr. Comput. Pract. Exp. 29(14) (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Saeed Jawad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jawad, M.S. (2019). Cloud Data Security Solution Based on Data Access Classification, Advanced Encryption Standard and Message Authentication Code. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Proceedings of the Future Technologies Conference (FTC) 2018. FTC 2018. Advances in Intelligent Systems and Computing, vol 881. Springer, Cham. https://doi.org/10.1007/978-3-030-02683-7_12

Download citation

Publish with us

Policies and ethics