OB-MECC: An Efficient Confidentiality and Security Enhancement for Cloud Storage System
Cloud computing (CC) is one amongst the developing technologies, which get more attention from academia as well as industries. It offers diverse benefits like sharing computing resources, service flexibility, reducing costs, etc. The Cloud Services Provider (CSP) is accountable for the data that are delivered to the cloud. The threat of seeing the stored data and using sensitive raw data by strangers is the main barrier in the utilization of cloud services. So, Data Security (DS) along with privacy is the chief issue, which is an obstacle while adopting the CC. Countless techniques are existent for ensuring data confidentiality, but they do not completely give protection to the data. To trounce these drawbacks, this paper introduces the Obfuscation (OB) based Modified Elliptical Curve Cryptography (MECC) algorithm for protecting data as of malicious attacks, which is termed as OB-MECC. Primarily, the proposed method obfuscates the data before they are uploaded to the cloud. For the OB of the data, the proposed work employs methods like substitution cipher (SC), position update, Ceaser cipher, binary conversion, 8-bit binary conversion, decimal(), two complex(), and ASCII(). Then, encryption of the obfuscated data is done with the utilization of the MECC algorithm. After encryption, the data on the cloud is retrieved. The retrieved data is then decrypted by reversing the OB and encryption process to get the actual data. The outcomes corroborate that the confidentiality and security level are maximum for the proposed OB-MECC when contrasted to the existing approaches.
George Amalarathinam DI, “Security Enhancement for Public Cloud Storage”, International Journal of Pure and Applied Mathematics, vol. 118, no. 6, pp. 1–9, 2018.
Khalid EL Makkaoui, Abdellah Ezzati, Abderrahim Beni-Hssane, Cina Motamed, “Data confidentiality in the world of cloud”, Journal of Theoretical and Applied Information Technology, vol. 84, no. 3, 2016.
Vithya Vijayalakshmi A, Veeraragavan N and Arockiam L, “A unified model for cloud data confidentiality”, Asian Journal of Science and Applied Technology, vol. 7, no. 1, pp. 23–27, 2018.
Kelsey Rauber, “Cloud cryptography”, International Journal of Pure and Applied Mathematics, Vol. 85, pp. 1–11, 2013
Silki Jain, Abhilasha Vyas, “An Improved Security Framework for Cloud Environment using ECC algorithm”, International Journal for Research in Applied Science & Engineering Technology (IJRASET), vol. 6, 2018.
Sulochana M and Ojaswani Dubey, “Preserving data confidentiality using multi-cloud architecture”, Procedia Computer Science, vol. 50, pp. 357–362, 2015.
Manpreet Kaur and Rajbir Singh, “Implementing encryption algorithms to enhance data security of cloud in cloud computing”, International Journal of Computer Applications, vol. 70, no. 18, 2013.
Yang Geng, “Homomorphic encryption technology for cloud computing”, Procedia Computer Science, vol. 154, pp. 73–83, 2019.
Arockiam D L and Monikandan S, “A security service algorithm to ensure the confidentiality of data in cloud storage”, Int J Eng Res Technol (IJERT), vol. 3, no. 12, pp. 1053–1058, 2014.
Yue Shi, “Data security and privacy protection in public cloud”, In IEEE International Conference on Big Data (Big Data), pp. 4812–4819, IEEE, 2018.
Arul Oli S, Arockiam L, “Confidentiality technique for enhancing data security using encryption and obfuscation in public cloud storage”, International Journal of Advanced Research in Computer and Communication Engineering, vol. 5, no. 2, 2016.
Ghassan Sabeeh Mahmood, Dong Jun Huang, and Baidaa Abdulrahman Jaleel, “Achieving an effective, confidentiality and integrity of data in cloud computing”, IJ Network Security, vol. 21, no. 2, pp. 326–332, 2019.
Arockiam L, Monikandan S, Sheba K Malarchelvi P D, “Obfuscrypt: A novel confidentiality technique for cloud storaWge”, International Journal of Computer Applications, vol. 88, pp. 17–21, 2014.
Nasarul Islam K V, Mohamed Riyas K V, “Analysis of various encryption algorithms in cloud computing”, International Journal of Computer Science and Mobile Computing, IJCSMC, vol. 6, no. 7, pp. 90–97, 2017.
Arul Oli S, and Arockiam L, “Confidentiality technique to obfuscate the numerical data to enhance security in public cloud storage”, In International Conference on Algorithms, Methodology, Models and Applications in Emerging Technologies (ICAMMAET), pp. 1–6, IEEE, 2017.
Fathima Mary B, and DI George Amalarethinam, “Data security enhancement in public cloud storage using data obfuscation and steganography”, In World Congress on Computing and Communication Technologies (WCCCT), pp. 181–184, IEEE, 2017.
Miranda Mowbray, Siani Pearson, and Yun Shen, “Enhancing privacy in cloud computing via policy-based obfuscation”, The Journal of Supercomputing, vol. 61, no. 2, pp. 267–291, 2012.
Nabeil Eltayieb, Rashad Elhabob, Alzubair Hassan, and Fagen Li, “An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid”, Journal of Systems Architecture, vol. 98, pp. 165–172, 2019.
Neela K L, and Kavitha V, “Enhancement of data confidentiality and secure data transaction in cloud storage environment”, Cluster Computing, vol. 21, no. 1, pp. 115–124, 2018.
Arul Oli S, and Arockiam L, “Enhanced obfuscation technique for data confidentiality in public cloud storage”, In MATEC Web of Conferences, vol. 40, 2016.
Dmitry Zegzhda P, Usov E S, Nikol’skii A V, and Yu Pavlenko E, “Use of intel SGX to ensure the confidentiality of data of cloud users”, Automatic Control and Computer Sciences, vol. 51, no. 8, pp. 848–854, 2017.
Sajay K R, Suvanam Sasidhar Babu, and Yellepeddi Vijayalakshmi, “Enhancing the security of cloud data using hybrid encryption algorithm”, Journal of Ambient Intelligence and Humanized Computing, pp. 1–10, 2019.
Prabu Kanna G, and Vasudevan V, “A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data”, Cluster Computing, pp. 1–9, 2018.
Nagaraju P, Naga Malleswara Rao N, “Obfuscation Techniques in Cloud Computing: A Systematic Survey”, International Journal of Scientific & Technology Research, pp. 1097–1102, 2019.
Copyright (c) 2020 Journal of Cyber Security and Mobility
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.