Skip to main content
Log in

Robust technique for data security in multicloud storage using dynamic slicing with hybrid cryptographic technique

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Multi cloud storage is one of the most important services in cloud computing, used to store and access the data remotely. With the advancement in internet technology, the use of cloud computing has improved rapidly in many countries. Data security is considered as one of the most critical aspects in cloud computing due to the valuable and sensitive information stored in the cloud for the clients. To enhance the privacy and security of the information in the multi cloud, a robust technique is presented in this paper. The main focus of this study is to address the privacy and security risks of data in the multi cloud storage. The proposed technique is based on the cryptographic technique with dynamic file slicing method for securing data in multi cloud. Specifically, data is fragmented into many slices. The number of slices is defined by the data owner. The sliced files are encrypted with 3 DES (data encryption standard) and elliptical curve cryptography (ECC) algorithm. The performance of the proposed technique is evaluated using latency time. Efficacy of the technique is analyzed by varying the file size and format. Results reveal that the proposed technique outperforms the other methods. In addition to this, five prime security issues such as privacy, confidentiality, data integrity, malicious files and insider attacks are also examined and compared with the other existing models.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Ali M, Dhamotharan R, Khan E, Khan SU, Vasilakos AV, Li K, Zomaya AY (2015) SeDaSC: secure data sharing in clouds. IEEE Syst J 11(2):395–404

    Article  Google Scholar 

  • Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16(08):2129–2151

    Article  MathSciNet  Google Scholar 

  • Alzain MA, Pardede E, Soh B, Thom JA (2012) Cloud computing security: from single to multi-clouds. In: 2012 45th Hawaii international conference on system sciences, IEEE, pp 5490–5499

  • Alzain Mohammed A, Soh Ben, Pardede Eric (2012b) A new model to ensure security in cloud computing services. J Serv Sci Res 4:49–70

    Article  Google Scholar 

  • Balasaraswathi VR, Manikandan S (2014) Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach. In: 2014 IEEE international conference on advanced communications, control and computing technologies, IEEE, pp 1190–1194

  • Bhushan K, Gupta BB (2019) Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J Ambient Intell Humaniz Comput 10(5):1985–1997

    Article  Google Scholar 

  • Bohli Jens-Matthias, Gruschka Nils, Jensen Meiko, Iacono Luigi Lo, Marnau Ninja (2013) Security and privacy-enhancing multicloud architectures. IEEE Trans Dependable Secur Comput 10(4):212–224

    Article  Google Scholar 

  • Borazjani PN (2017) Security issues in cloud computing. International conference on green, pervasive, and cloud computing. Springer, Cham, pp 800–811

    Chapter  Google Scholar 

  • Cloud AEC (2011) Amazon web services. Retrieved 9 Nov 2011

  • Elminaam DSA, Abdual-Kader HM, Hadhoud MM (2010) Evaluating the performance of symmetric encryption algorithms. IJ Netw Secur 10(3):216–222

    Google Scholar 

  • Fabian B, Ermakova T, Junghanns P (2015) Collaborative and secure sharing of healthcare data in multi-clouds. Inf Syst 48:132–150

    Article  Google Scholar 

  • Grobauer B, Walloschek T, Stocker E (2010) Understanding cloud computing vulnerabilities. IEEE Secur Priv 9(2):50–57

    Article  Google Scholar 

  • Gupta K, Silakari S (2011) Ecc over rsa for asymmetric encryption: a review. Int J Comput Sci Issues (IJCSI) 8(3):370

    Google Scholar 

  • Hur J (2011) Improving security and efficiency in attribute-based data sharing. IEEE Trans Knowl Data Eng 25(10):2271–2282

    Article  Google Scholar 

  • Levitin G, Xing L, Dai Y (2017) Optimal data partitioning in cloud computing system with random server assignment. Future Gener Comput Syst 70:17–25

    Article  Google Scholar 

  • Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12

    Article  Google Scholar 

  • Meyrath TP, Schreck F, Hanssen JL, Chuu CS, Raizen MG (2005) Bose–Einstein condensate in a box. Phys Rev A 71(4):041604

    Article  Google Scholar 

  • Naseri A, Navimipour NJ (2019) A new agent-based method for QoS-aware cloud service composition using particle swarm optimization algorithm. J Ambient Intell Humaniz Comput 10(5):1851–1864

    Article  Google Scholar 

  • Oestreicher K (2014) A forensically robust method for acquisition of iCloud data. Digit Investig 11:S106–S113

    Article  Google Scholar 

  • Razaque A, Nadimpalli SSV, Vommina S, Atukuri DK, Reddy DN, Anne P et al (2016) Secure data sharing in multi-clouds. In: 2016 International conference on electrical, electronics, and optimization techniques (ICEEOT), IEEE, pp 1909–1913

  • Sheng Z, Yang S, Yu Y, Vasilakos AV, McCann JA, Leung KK (2013) A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities. IEEE Wirel Commun 20(6):91–98

    Article  Google Scholar 

  • Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11

    Article  Google Scholar 

  • Subramanian K, Leo John F (2018) Dynamic and secure unstructured data sharing in multi cloud storage using hybrid cryptosystem. Int J Adv Appl Sci 5(1):15–23

    Article  Google Scholar 

  • Thilakanathan D, Chen S, Nepal S, Calvo RA (2014) Secure data sharing in the cloud. Security, privacy and trust in cloud systems. Springer, Berlin, Heidelberg, pp 45–72

    Chapter  Google Scholar 

  • Vaidya MB, Nehe S (2015) Data security using data slicing over storage clouds. In: 2015 International conference on information processing (ICIP), IEEE, pp 322–325

  • Wang S, Liang K, Liu JK, Chen J, Yu J, Xie W (2016) Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans Inf Forensics Secur 11(8):1661–1673

    Article  Google Scholar 

  • Wei L, Zhu H, Cao Z, Dong X, Jia W, Chen Y, Vasilakos AV (2014) Security and privacy for storage and computation in cloud computing. Inf Sci 258:371–386

    Article  Google Scholar 

  • Xu P, Liu X, Sheng Z, Shan X, Shuang K (2015) SSDS-MC: slice-based secure data storage in multi-cloud environment. In: 2015 11th International conference on heterogeneous networking for quality, reliability, security and robustness (QSHINE), IEEE, pp 304–309

  • Yao C, Xu L, Huang X, Liu JK (2014) A secure remote data integrity checking cloud storage system from threshold encryption. J Ambient Intell Humaniz Comput 5(6):857–865

    Article  Google Scholar 

  • Zhang C, Yang Y, Du Z, Ma C (2016) Particle swarm optimization algorithm based on ontology model to support cloud computing applications. J Ambient Intell Humaniz Comput 7(5):633–638

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Pravin.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pravin, A., Prem Jacob, T. & Nagarajan, G. Robust technique for data security in multicloud storage using dynamic slicing with hybrid cryptographic technique. J Ambient Intell Human Comput (2019). https://doi.org/10.1007/s12652-019-01563-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12652-019-01563-0

Keywords

Navigation