Secure Data Storage and Retrieval over the Encrypted Cloud Computing

Q1 Mathematics
Jaydip Kumar, Hemant Kumar, K. Singh, Vipin Saxena
{"title":"Secure Data Storage and Retrieval over the Encrypted Cloud Computing","authors":"Jaydip Kumar, Hemant Kumar, K. Singh, Vipin Saxena","doi":"10.5815/ijcnis.2024.04.04","DOIUrl":null,"url":null,"abstract":"Information security in cloud computing refers to the protection of data items such as text, images, audios and video files. In the modern era, data size is increasing rapidly from gigabytes to terabytes or even petabytes, due to development of a significant amount of real-time data. The majority of data is stored in cloud computing environments and is sent or received over the internet. Due to the fact that cloud computing offers internet-based services, there are various attackers and illegal users over the internet who are consistently trying to gain access to user’s private data without the appropriate permission. Hackers frequently replace any fake data with actual data. As a result, data security has recently generated a lot of attention. To provide access rights of files, the cloud computing is only option for authorized user. To overcome from security threats, a security model is proposed for cloud computing to enhance the security of cloud data through the fingerprint authentication for access control and genetic algorithm is also used for encryption/decryption of cloud data. To search desired data from cloud, fuzzy encrypted keyword search technique is used. The encrypted keyword is stored in cloud storage using SHA256 hashing techniques. The proposed model minimizes the computation time and maximizes the security threats over the cloud. The computed results are presented in the form of figures and tables.","PeriodicalId":36488,"journal":{"name":"International Journal of Computer Network and Information Security","volume":"20 4","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Network and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5815/ijcnis.2024.04.04","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 1

Abstract

Information security in cloud computing refers to the protection of data items such as text, images, audios and video files. In the modern era, data size is increasing rapidly from gigabytes to terabytes or even petabytes, due to development of a significant amount of real-time data. The majority of data is stored in cloud computing environments and is sent or received over the internet. Due to the fact that cloud computing offers internet-based services, there are various attackers and illegal users over the internet who are consistently trying to gain access to user’s private data without the appropriate permission. Hackers frequently replace any fake data with actual data. As a result, data security has recently generated a lot of attention. To provide access rights of files, the cloud computing is only option for authorized user. To overcome from security threats, a security model is proposed for cloud computing to enhance the security of cloud data through the fingerprint authentication for access control and genetic algorithm is also used for encryption/decryption of cloud data. To search desired data from cloud, fuzzy encrypted keyword search technique is used. The encrypted keyword is stored in cloud storage using SHA256 hashing techniques. The proposed model minimizes the computation time and maximizes the security threats over the cloud. The computed results are presented in the form of figures and tables.
加密云计算上的安全数据存储和检索
云计算中的信息安全是指对文本、图像、音频和视频文件等数据项的保护。在现代社会,由于大量实时数据的发展,数据量从千兆字节迅速增加到 TB 甚至 PB。大部分数据都存储在云计算环境中,并通过互联网发送或接收。由于云计算提供基于互联网的服务,互联网上有各种攻击者和非法用户,他们总是试图在未经适当许可的情况下获取用户的私人数据。黑客经常用真实数据替换任何虚假数据。因此,数据安全问题近来备受关注。为了提供文件访问权限,云计算是授权用户的唯一选择。为了克服安全威胁,我们提出了一种云计算安全模型,通过指纹验证进行访问控制,并使用遗传算法对云数据进行加密/解密,从而提高云数据的安全性。为从云中搜索所需数据,使用了模糊加密关键字搜索技术。加密关键词使用 SHA256 哈希技术存储在云存储中。所提出的模型最大限度地减少了计算时间,并最大限度地降低了云安全威胁。计算结果以图和表的形式呈现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
4.10
自引率
0.00%
发文量
33
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信