Skip to main content
Log in

Block based data security and data distribution on multi cloud environment

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Cloud provides storage and computation services to users at a low cost. However, there are many major concerns while using cloud services for data storage, such as data security, confidentiality and authenticity, as cloud services may be compromised either internally or by cloud hackers. Those issues become very serious when the data contains critical information such as personal information, medical data, or credit card information. In the proposed work, we developed a prototype application to distribute data at multiple clouds for data security. In our approach, we label the data bytes in a block of data using finite numbers, which are considered a finite field called a Galois Field. Then we apply the logarithm function over the Galois Field to shuffle data bytes in each of the data blocks of a user file and encrypt using block based data (BBD) encryption algorithm. After the data shuffling and encryption, the user data can be nonlinearly distributed at multiple clouds. When the user data are retrieved from the clouds, and decrypt using BBD decryption and the inverse logarithm function over the Galois Field is applied to restore the original user file. With this mechanism, the contents of the user file can be properly protected, and no particular cloud service provider can understand the data content. Comparing with traditional encryption mechanism, this approach provides a simpler and much more efficient way for hiding data. To demonstrate the feasibility of our approach, we use existing cloud services, such as Amazon S3 and Drop-box to simulate multiple clouds. The experimental result shows that user data can be efficiently distributed at multiple clouds and the intended data security can be properly achieved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Adki VM, Hatkar SS (2016) A survey on cryptography techniques. Int J Adv Res Comput Sci Softw Eng 6(6):469–475

    Google Scholar 

  • Agrawal S, Boneh D, Boyen X (2010) Efficient lattice (h)ibe in the standard model. In: Gilbert H (ed) Advances in cryptology (EUROCRYPT’10), vol 6110. Springer, Berlin, pp 553–572

    Google Scholar 

  • Aishwarya S, Dhivya KDR (2015) Online payment fraud prevention using cryptographic algorithm TDES. Int J Comput Sci Mob Comput 4(4):317–323

    Google Scholar 

  • Alanazi HO, Zaidan BB, Zaidan AA, Jalab HA, Shabbir M, Al-Nabhani Y (2010) New comparative study between DES, 3DES and AES within nine factors. J Comput 2(3):152–157

    Google Scholar 

  • Berad G, Jaggi A, Jagadales V (2016) Review on implementation of AES algorithm for device based encryption. Int J Adv Comput Eng Netw 4(2):75–78

    Google Scholar 

  • Bessani A, Correia M, Quaresma B, Andre F, Sousa P (2013) DEPSKY: dependable and secure storage in a cloud-of-clouds. ACM Trans Storage 9(4):12

    Article  Google Scholar 

  • Bohli J-M, Gruschka N, Jensen M, Marnau N, Lo Iacono L (2013) Security and privacy enhancing in multi-cloud architectures. IEEE Trans Dependable Secure Comput 10(4):212–224

    Article  Google Scholar 

  • Cash D, Hofheinz D, Kiltz E, Peikert C (2010) Bonsai trees, or how to delegate a lattice basis. In: Gilbert H (ed) Advances in cryptology (EUROCRYPT’ 10), vol 6110. Springer, Berlin, pp 523–552

    Google Scholar 

  • Chen C-A, Won M, Stoleru R, Xie G (2014) Energy-efficient fault-tolerant data storage and processing in mobile cloud. IEEE Trans Cloud Comput 3(1):28–41

    Article  Google Scholar 

  • Debnath R, Agrawal P, Vaishnav G (2014) DES, AES AND triple DES: symmetric key cryptography algorithm. Int J Sci Eng Technol Res 3(3):652–654

    Google Scholar 

  • El-Deen AE, El-Badawy EA, Gobran SN (2014) Digital image encryption based on RSA algorithm. IOSR J Electron Commun Eng 9(1):69–73

    Article  Google Scholar 

  • Fabian B, Ermakova T, Junghanns P (2015) Collaborative and secure sharing of healthcare data in multi-clouds. Inf Syst 48:132–150

    Article  Google Scholar 

  • Ghosh N, Ghosh S, Das S (2015) SelCSP: a framework to facilitate selection of cloud service providers. IEEE Trans Cloud Comput 3(1):66–79

    Article  Google Scholar 

  • Gong W, Qi L, Xu Y (2018) Privacy-aware multidimensional mobile service quality prediction and recommendation in distributed fog environment. Wirel Commun Mob Comput 2018:3075849

    Google Scholar 

  • Kumar P, Rajaanadan NS (2016) Data encryption and decryption using by triple DES performance efficiency analysis of cryptosystem. Int J Innov Res Comput Commun Eng 4(3):4030–4040

    Google Scholar 

  • Kumar A, Jakhar S, Makkar S (2012) Comparative analysis between DES and RSA algorithm’s. Int J Adv Res Comput Sci Softw Eng 2(7):386–391

    Google Scholar 

  • Liang G, Weller SR, Luo F, Zhao J, Dong ZY (2019) Distributed blockchain-based data protection framework for modern power systems against cyber attacks. IEEE Trans Smart Grid 10(3):3162–3173

    Article  Google Scholar 

  • Lin H, Cao Z, Fang Y, Zhou M, Zhu H (2011) How to design space efficient revocable IBE from non-monotonic ABE. In: Proceedings of 6th ACM symposium information, computer and communications security (ASIACCS’11), pp 381–385

  • Mankotia S, Sood M (2015) A critical analysis of some symmetric key block cipher algorithms. Int J Comput Sci Inf Technol 6:495–499

    Google Scholar 

  • Qi L, Zhang X, Dou W, Ni Q (2017) A distributed locality-sensitive hashing-based approach for cloud service recommendation from multi-source data. IEEE J Sel Areas Commun 35(11):2616–2624

    Article  Google Scholar 

  • Qi L, Meng S, Zhang X et al (2018) An exception handling approach for privacy-preserving service recommendation failure in a cloud environment. Sensors 18(7):2037

    Article  Google Scholar 

  • Rao S (2015) Performance analysis of DES and triple DES. Int J Comput Appl 130(14):30–34

    Google Scholar 

  • Saravanan T, Srinivasan V, Udayakumar R (2013) MATLAB-simulink implementation of AES algorithm for image transfer. Middle-East J Sci Res 18(12):1709–1712

    Google Scholar 

  • Shetty A, Shravya K, Krithika K (2014) A review on asymmetric cryptography—RSA and ElGamal algorithm. Int J Innov Res Comput Commun Eng 2(Special Issue 5):98–105

    Google Scholar 

  • Silva-Garcia VM, Flores-Carapia R, Luna-Benoso B (2013) The triple-DES-96 cryptographic system. Int J Contemp Math Sci 8(19):925–934

    Article  Google Scholar 

  • Singh G (2013) A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int J Comput Appl 67(19):33–38

    Google Scholar 

  • Thilakanathan D, Chen S, Nepal S, Calvo RA (2014) Secure data sharing in the cloud. In: Nepal S, Pathan M (eds) Security, privacy and trust in cloud systems. Springer, Berlin, pp 45–72

    Chapter  Google Scholar 

  • Tripathi R, Agrawal S (2014) Comparative study of symmetric and asymmetric cryptography techniques. Int J Adv Found Res Comput (IJAFRC) 1(6):68–76

    Google Scholar 

  • Vijayakumar K, Arun C (2017a) Continuous security assessment of cloud based applications using distributed hashing algorithm in SDLC. Cluster Comp. https://doi.org/10.1007/s10586-017-1176-x

    Google Scholar 

  • Vijayakumar K, Arun C (2017b) Automated risk identification using NLP in cloud based development environments. J Ambient Intell Hum Comp. https://doi.org/10.1007/s12652-017-0503-7

    Google Scholar 

  • Vijayakumar K, Arun C (2018) Integrated cloud-based risk assessment model for continuous integration. Int J Reasoning-Based Intell Syst 10(3/4):316. https://doi.org/10.1504/IJRIS.2018.096227

    Article  Google Scholar 

  • Xu Y, Qi L, Dou W, Yu J (2017) Privacy-preserving and scalable service recommendation based on SimHash in a distributed cloud environment. Complexity 2017:3437854

    Google Scholar 

  • Yan C, Cui X, Qi L, Xu X, Zhang X (2018) Privacy-aware data publishing and integration for collaborative service recommendation. IEEE Access 6:43021–43028

    Article  Google Scholar 

  • Zhang Q, Li S, Li Z, Xing Y, Yang Z, Dai Y (2015) CHARM: a cost efficient multi cloud data hosting scheme with high availability. IEEE Trans Cloud Comput 3(3):372–386

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Latha.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Latha, K., Sheela, T. Block based data security and data distribution on multi cloud environment. J Ambient Intell Human Comput (2019). https://doi.org/10.1007/s12652-019-01395-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12652-019-01395-y

Keywords

Navigation