Open Access   Article

Comparative Analysis of Different Cryptographic Mechanisms of Data Security and Privacy in Cloud Environment

Manreet Sohal1 , Sandeep Sharma2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-12 , Page no. 12-24, Dec-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i12.1224

Online published on Dec 31, 2018

Copyright © Manreet Sohal, Sandeep Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

Citation

IEEE Style Citation: Manreet Sohal, Sandeep Sharma, “Comparative Analysis of Different Cryptographic Mechanisms of Data Security and Privacy in Cloud Environment”, International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.12-24, 2018.

MLA Style Citation: Manreet Sohal, Sandeep Sharma "Comparative Analysis of Different Cryptographic Mechanisms of Data Security and Privacy in Cloud Environment." International Journal of Computer Sciences and Engineering 6.12 (2018): 12-24.

APA Style Citation: Manreet Sohal, Sandeep Sharma, (2018). Comparative Analysis of Different Cryptographic Mechanisms of Data Security and Privacy in Cloud Environment. International Journal of Computer Sciences and Engineering, 6(12), 12-24.

VIEWS PDF XML
85 194 downloads 45 downloads
  
  
           

Abstract

Cloud computing is an internet-based service which provides a platform based upon the internet for performing computations. In other words, it is the hiring of services from the service providers. But, since data has to be stored at the third party location, the data owners are always concerned about the security of their data. There are a number of security issues related to cloud computing. In this paper, a comprehensive review of various security challenges faced by the cloud has been presented. The major focus of this paper is the security of the data stored on the cloud. We have provided a detailed discussion on various cryptographic algorithms that have been proposed in recent years to ensure data security. These algorithms have been compared and analyzed based upon various security parameters and their pros and cons have been highlighted. This analysis opens up a new space that can be used to develop a new algorithm which can overcome the shortcomings of the existing algorithms and can enhance the security of the existing systems.

Key-Words / Index Term

Cloud Computing, Security, Privacy, Encryption, Decryption

References

[1] Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing”, The Journal of Supercomputing, Vol. 63, Issue. 2, pp. 561-592, 2013.
[2] National Institute of Standards and Technology, Information Technology Laboratory, “The NIST Definition of Cloud Computing,” https://www.nist.gov/sites/default/files/documents/itl/cloud/cloud-def-v15.pdf.
[3] T.V. Sathyanarayana, L.M.I. Sheela, “Data security in cloud computing”, in Proceedings of IEEE International Conference on Green Computing, Communication and Conservation of Energy (ICGCE), India, pp. 822-827, 2013.
[4] A.M. Khan, S. Ahmad, M. Haroon, “A Comparative Study of Trends in Security in Cloud Computing ”, in Proceedings of the 5th IEEE International Conference on Communication Systems and Network Technologies (CSNT), India,pp. 586-590, 2015.
[5] P. Sirohi, A. Agarwal, “Cloud computing data storage security framework relating to data integrity, privacy and trust”, in Proceedings of the Ist IEEE International Conference on Next Generation Computing Technologies (NGCT), India, pp. 115-118, 2015.
[6] Ennajjar, Y. Tabii, A. Benkaddour, “Security in cloud computing approaches and solutions” in Proceedings of the 3rd IEEE International Colloquium Information Science and Technology (CIST), Morocco, pp. 57-61, 2014.
[7] Cloud Security Alliance, “Cloud Adoption Practices & Priorities Survey Report”https://downloads.cloudsecurityalliance.org/initiatives/surveys/capp/Cloud_Adoption_Practices_Priorities_Survey_Final.pdf.
[8] J. Somorovsky,M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, L.Iacono, “All your clouds are belong to us: security analysis of cloud management interfaces,” in Proceedings of the 3rd ACM workshop CCW,pp.3–14, 2011.
[9] G. Zhaolong, S. Yamaguchi, B.B. Gupta, “Analysis of various security issues and challenges in cloud computing environment: a survey” in Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global Publisher., pp. 393-419, 2016.
[10] Cloud Security Alliance, “The Notorious Nine Cloud Computing Top Threats in 2013” https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf.
[11] Cloud Security Alliance, “The Treacherous Twelve,”https://downloads.cloudsecurityalliance.org/assets/research/top-threats/treacherous-12-top-threats.pdf.
[12] D.A.B. Fernandes, L.F.B Soares, J.V. Gomes, M.M Freire, P.R. Inacio, “Security issues in cloud environments: a survey”, International Journal of Information Security, Vol. 13, Issue 2, pp. 113-170, 2014.
[13] P. Ora, P.R. Pal, “Data security and integrity in cloud computing based on RSA partial homomorphic and MD5 cryptography”, in Proceedings of IEEE International Conference on Computer, Communication and Control (CC4), India, pp. 1-6, 2015.
[14] N. Shimbre, P. Deshpande, “Enhancing Distributed Data Storage Security for Cloud Computing Using TPA and AES Algorithm”, in Proceedings of IEEE International Conference on Computing Communication Control and Automation (ICCUBEA), India, pp. 35-39, 2015.
[15] N.S. Kumar, G.R. Lakshmi, B. Balamurugan, “Enhanced Attribute Based Encryption for Cloud Computing”, Procedia Computer Science, Vol. 46, pp. 689-696, 2015.
[16] S.Y. Huang, C.I. Fan, Y.F. Tseng, “Enabled/disabled predicate encryption in clouds”, Future Generation Computer Systems, Vol. 62, pp. 148-160, 2016.
[17] S.H. Seo, M. Nabeel, X. Ding, “An efficient certificateless encryption for secure data sharing in public clouds”, IEEE Tansactions on Knowledge and Data Engineering, Vol. 26, Issue. 9, pp. 2107-2119, 2014.
[18] S. Ma, “Identity-based encryption with outsourced equality test in cloud computing”, Information Sciences, Vol. 328,pp. 389-402, 2016.
[19] Y. Lu, J. Li, “A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds”, Future Generation Computer Systems, Vol. 62, pp. 140-147, 2016.
[20] J. Li, J. Li, X. Chen, Z. Liu, C. Jia, “Privacy-preserving data utilization in hybrid clouds”, Future Generation Computer Systems, Vol. 30, pp. 98-106, 2014.
[21] J. Li, Y.K. Li, X. Chen, P.P.C Lee, W. Lou, “A hybrid cloud approach for secure authorized deduplication”, IEEE Transactions on Parallel and Distributed Systems, Vol. 26, Issue. 5, pp. 1206-1216, 2015.
[22] Z.P. Jia, X. Tian, “A novel security private cloud solution based on eCryptfs”, in Proceedings of the 6th IEEE International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), China, pp. 38-41, 2013.
[23] Q. Huang,Y. Yang, M. Shen, “Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing”, Future Generation Computer Systems,Vol.72, pp. 239-249, 2017.
[24] L. Wu, Y. Zhang, K.K.r. Choo, D. He, “Efficient and secure identity-based encryption scheme with equality test in cloud computing", Future Generation Computer Systems, Vol. 73, pp. 22-31, 2017.
[25] M. Usman, M.A. Jan, X. He, “Cryptography-based secure data storage and sharing using HEVC and public clouds”, Information Sciences, Vol. 387, pp. 90-102, 2017.
[26] L. Yibin, K. Gai, L. Qiu, M. Qiu, H. Zhao, “Intelligent cryptography approach for secure distributed big data storage in cloud computing”, Information Sciences, Vol. 387, pp. 103-115,2017.
[27] C.A. Dhote, “Homomorphic encryption for security of cloud data”, Procedia Computer Science, Vol. 79, pp. 175-181, 2016.
[28] Odelu, A.K. Das, Y.S. Rao, S. Kumari, M.K. Khan, K.K. Choo, “Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment”, Computer Standards & Interfaces, Vol. 54, pp. 3-9, 2017.
[29] S.K. Pasupuleti, S. Ramalingam, R. Buyya, “An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing”, Journal of Network and Computer Application, Vol. 64, pp. 12-22, 2016.
[30] J. Zhang, Y. Yang, Y. Chen, J.Chen, Q. Zhang, “A general framework to design secure cloud storage protocol using homomorphic encryption scheme”, Computer Networks, Vol.129, pp.37-50, 2017.
[31] J. Li, X. Li, L. Wang, D. He, H.Ahmad, X. Niu, “Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption”, Soft Computing, Vol. 22, Issue 3, pp. 707-714, 2018.
[32] A. Sanghi, S. Chaudhary, M. Dave, “Enhance the Data Security in Cloud Computing by Text Steganography,”, Smart Trends in Systems, Security and Sustainability, ser. Lecture Notes in Networks and Systems, Singapore: Springer, Vol. 18, 2018.