A Framework for Data Security and Sharing in Cloud Computing Environments by Using Cryptographic Algorithms

Authors

  • Dr. Rafath Samrin  Associate Professor, Department of CSE (AI & ML), CMR Technical Campus, Hyderabad, Telangana, India
  • Aluri Gopi  Assistant Professor, Department of Electronic & Communication Engineering, CMR Engineering College, Hyderabad, Telangana, India
  • Mangalampalli Sesha Sai Lakshmi Lavanya  Assistant Professor, Department of CSE (DS), CMR Engineering College, Hyderabad, Telangana, India
  • K Swetha  Assistant Professor, CSE (Cyber Security) Department, Sri Indu College of Engineering and Technology, Hyderabad, Telangana, India

DOI:

https://doi.org/10.32628/CSEIT228641

Keywords:

Cloud Computing, Privacy, Security, Data Protection, Machine Learning, Cryptography, Watermarking, Access Control.

Abstract

Cloud storage is a liberating cloud application group to establish an internal database system. However, cloud storage raises security concerns. Inside the case of data sharing, the data is both cloud-specific and ancient music. Secure data distribution within a group which prevents the examiner from fearing legitimate but cruel agents important research questions. Data sharing and cloud storage play an important role in communication, as they can provide users with efficient and effective security services. To protect shared secret data, cryptographic methods are often applied. A large number of researchers, universities, government departments and commercial companies are adopting the cloud environment due to the initial investment, its high scalability and its many features. Despite many initiatives supporting the cloud environment, it faces many challenges. Data protection is a major concern in the information security and cloud computing industry. Many solutions have been developed to overcome this challenge. However, there is a there is not enough research between the current solutions and the emerging need to analyze, organize and analyze the important work that is done to study these solutions to respond to the field. This article provides an overview of research and process analysis, as well as an in-depth analysis of the topic of distributed security and data storage in cloud environments. Discussions on each dedicated process include: data protection services, rights and changes in the field, basic and comprehensive information including scope of work, achievements, limitations, future directions, etc. in any solution. In addition, a comprehensive and comparative analysis of these current methods is discussed. Then, the speed of the process is measured by the requirements of the search space and the future directions in the field are shown. The authors agree with this report. These plans will be what motivates researchers to do research in the field.

References

  1. E. Zaghloul, K. Zhou, and J. Ren, ``P-MOD: Secure privilege-based multilevel organizational data-sharing in cloud computing,'' IEEE Trans. Big Data, vol. 6, no. 4, pp. 804-815, Dec. 2020.
  2. W. Shen, J. Qin, J. Yu, R. Hao, and J. Hu, ``Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage,'' IEEE Trans. Inf. Forensics Security, vol. 14, no. 2, pp. 331-346, Feb. 2019.
  3. I. Gupta and A. K. Singh, ``An integrated approach for data leaker detection in cloud environment,'' J. Inf. Sci. Eng., vol. 36, no. 5, pp. 993-1005, Sep. 2020.
  4. Ravindra Changala, "Data Mining Techniques for Cloud Technology", in International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE),Volume 4, Issue 8, Pages 2319-5940, ISSN: 2278-1021, August 2015.
  5. R. Li, C. Shen, H. He, X. Gu, Z. Xu, and C.-Z. Xu, ``A lightweight secure data sharing scheme for mobile cloud computing,'' IEEE Trans. Cloud Comput., vol. 6, no. 2, pp. 344357, Apr. 2018.
  6. I. Gupta, N. Singh, and A. K. Singh, ``Layer-based privacy and security architecture for cloud data sharing,'' J. Commun. Softw. Syst., vol. 15, no. 2, pp. 173-185, Apr. 2019.
  7. J. Li, S. Wang, Y. Li, H. Wang, H. Wang, H. Wang, J. Chen, and Z. You, ``An efficient attribute-based encryption scheme with policy update and update in cloud computing,'' IEEE Trans. Ind. Informat., vol. 15, no. 12, pp. 650-6509, Dec. 2019.
  8. Ravindra Changala, “Secured Activity Based Authentication System”, Journal of innovations in computer science and engineering (JICSE), Volume 6, Issue 1,Pages 1-4, September 2016.ISSN: 2455-3506.
  9. Ishu Gupta, “Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions”, VOLUME 10, 2022,IEEE Access.
  10. Mazhar Ali, “SeDaSC: Secure data sharing in clouds”,1932-8184 © 2015 IEEE.
  11. Cloud security Alliance, “Security guidelines for critical areas of focus in cloud computing v3.0,” 2011.
  12. Ravindra Changala, "Retrieval of Valid Information from Clustered and Distributed Databases", Journal of innovations in computer science and engineering (JICSE), Volume 6, Issue 1,Pages 21-25, September 2016.ISSN: 2455-3506.
  13. Haifeng Lu, Chuan Heng Foh, Yong gang Wen, and Jianfei Cai, “Delay-Optimized File Retrieval under LT-Based Cloud Storage”, IEEE transactions on cloud computing, vol. 5, no. 4, october-december 2017
  14. Hui Tian, Yuxiang Chen, Chin-Chen Chang,Hong Jiang, Yongfeng Huang, Yonghong Chen, and Jin Liu,” Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage”, IEEE transactions on services computing, vol. 10, no. 5, september/october 2017
  15. Y. Chen and W. Tzeng, “Efficient and provably-secure group key management scheme using key derivation,” in Proc. IEEE 11th Int. Conf. TrustCom, 2012, pp. 295–302.
  16. Ravindra Changala, “Challenges and Solutions for the Semantic Web and Future of Document Management in Enterprises ", Journal of innovations in computer science and engineering (JICSE), Volume 6, Issue 1,Pages 10-13, September 2016.ISSN: 2455-3506.
  17. Y. Chen, J. D. Tygar, andW. Tzeng, “Secure group key management using uni-directional proxy re-encryption schemes,” in Proc. IEEE INFOCOM, pp. 1952–1960.

Downloads

Published

2022-12-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. Rafath Samrin, Aluri Gopi, Mangalampalli Sesha Sai Lakshmi Lavanya, K Swetha, " A Framework for Data Security and Sharing in Cloud Computing Environments by Using Cryptographic Algorithms" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 6, pp.314-322, November-December-2022. Available at doi : https://doi.org/10.32628/CSEIT228641