Text File Privacy on the Cloud Based on Diagonal Fragmentation and Encryption

T. Barhoom, Mahmoud Y. Abu Shawish
{"title":"Text File Privacy on the Cloud Based on Diagonal Fragmentation and Encryption","authors":"T. Barhoom, Mahmoud Y. Abu Shawish","doi":"10.33976/JERT.8.1/2021/3","DOIUrl":null,"url":null,"abstract":"Despite the growing reliance on cloud services and software, privacy is somewhat difficult. We store our data on remote servers in cloud environments that are untrusted. If we do not handle the stored data well, data privacy can be violated with no awareness on our part. Although it requires expensive computation, encrypting the data before sending it appears to be a solution to this problem. So far, all known solutions to protect textual files using encryption algorithms fell short of privacy expectations. Thus is because encrypting cannot stand by itself. The encrypted data on the cloud server becomes full file in the hand causing the privacy of this data to be intrusion-prone, thus allowing intruders to access the file data once they can decrypt it.\nThis study aimed to develop an effective cloud confidentiality model based on combining fragmentation and encryption of text files to compensate for reported deficiency in encryption methods. The fragmentation method used the strategy of dividing text files into two triangles through the axis. Whereas the encryption method used the Blowfish algorithm.\nThe research concluded that high confidentiality is achieved by building a multi-layer model: encryption, chunk, and fragmentation of every chunk to prevent intruders from reaching the data even if they were able to decrypt the file. Using the privacy accuracy equation (developed for the purpose in this research), the model achieved accuracy levels of 96% and 90% when using 100 and 200 words in each chunk on small, medium, and large files respectively.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of engineering research and technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33976/JERT.8.1/2021/3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Despite the growing reliance on cloud services and software, privacy is somewhat difficult. We store our data on remote servers in cloud environments that are untrusted. If we do not handle the stored data well, data privacy can be violated with no awareness on our part. Although it requires expensive computation, encrypting the data before sending it appears to be a solution to this problem. So far, all known solutions to protect textual files using encryption algorithms fell short of privacy expectations. Thus is because encrypting cannot stand by itself. The encrypted data on the cloud server becomes full file in the hand causing the privacy of this data to be intrusion-prone, thus allowing intruders to access the file data once they can decrypt it. This study aimed to develop an effective cloud confidentiality model based on combining fragmentation and encryption of text files to compensate for reported deficiency in encryption methods. The fragmentation method used the strategy of dividing text files into two triangles through the axis. Whereas the encryption method used the Blowfish algorithm. The research concluded that high confidentiality is achieved by building a multi-layer model: encryption, chunk, and fragmentation of every chunk to prevent intruders from reaching the data even if they were able to decrypt the file. Using the privacy accuracy equation (developed for the purpose in this research), the model achieved accuracy levels of 96% and 90% when using 100 and 200 words in each chunk on small, medium, and large files respectively.
基于对角碎片和加密的云上文本文件隐私
尽管人们越来越依赖云服务和软件,但保护隐私还是有些困难。我们将数据存储在不受信任的云环境中的远程服务器上。如果我们不妥善处理存储的数据,数据隐私可能会在我们不知情的情况下受到侵犯。虽然它需要昂贵的计算,但在发送数据之前对数据进行加密似乎是解决这个问题的一种方法。到目前为止,所有已知的使用加密算法保护文本文件的解决方案都没有达到隐私预期。这是因为加密不能单独存在。云服务器上的加密数据成为手中的完整文件,导致这些数据的隐私容易受到入侵,从而允许入侵者在解密后访问文件数据。本研究旨在开发一种有效的基于文本文件碎片化和加密相结合的云保密模型,以弥补加密方法的不足。碎片化方法使用的策略是通过轴将文本文件分成两个三角形。而加密方法使用的是河豚算法。该研究得出结论,通过构建多层模型来实现高机密性:加密、块和每个块的碎片,以防止入侵者访问数据,即使他们能够解密文件。使用隐私准确性方程(为此研究目的而开发),当在小、中、大文件中每个块分别使用100和200个单词时,该模型的准确率水平分别为96%和90%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信