Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password

Published: 01 April 2017 Publication History

Abstract

Objective: The main aim is to de-duplicate the redundant files in the cloud and also to improve the security of files in public cloud service by assigning privileges to the documents when it is uploaded by confidential user. Methods: To achieve the objective the authors have used the AES algorithm to encrypt the file stored after de-duplication in the cloud. De-duplication is done based on comparison of contents, file type and size. For an authorized user to access the file from the cloud, generation of OTP using SSL protocol is adopted. Findings: Files uploaded in the cloud are encrypted using traditional encryption algorithms which don't provide high levels of security. Files can be accessed by anyone who is authorized. Privileges are not considered. During de-duplication, only the name and size of the files are considered. Application: Files within the public cloud can't be viewed by everyone who has registered with the cloud. Those who have the respective privileges can only view the file. Proof of Ownership is assured. Since de-duplication is done based on the content redundancy within the cloud storage is avoided. Usage of OTP ensures that the content is viewed by the individuals who have the respective privileges related to the file. These concepts provide additional security to the files stored in the public environment.

References

[1]
Annamalai, R., Srikanth, J., & Prakash, M. 2015. Accessing the Data Efficiently using Prediction of Dynamic Data Algorithm. International Journal of Computers and Applications, 11622.
[2]
Annamalai, R., Srikanth, J., & Prakash, M. 2015. Integrity and Privacy Sustenance of Shared Large Scale Images in the Cloud by Ring Signature. International Journal of Computers and Applications, 11412, 13-18.
[3]
Bu, X., Rao, J., & Xu, C. Z. 2013. Coordinated self-configuration of virtual machines and appliances using a model-free learning approach. IEEE Transactions on Parallel and Distributed Systems, 244, 681-690.
[4]
Corena, J. C., & Ohtsuki, T. 2012. Secure and fast aggregation of financial data in cloud-based expense tracking applications. Journal of Network and Systems Management, 204, 534-560.
[5]
Itani, W., Kayssi, A., & Chehab, A. 2009, December. Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. Proceedings of the Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing DASC'09 pp. 711-716. IEEE.
[6]
Khan, N., & Al-Yasiri, A. 2016. Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework. International Journal of Information Technology and Web Engineering, 113, 50-64.
[7]
Kumaresan, G., & Maria Michael Visuwasam, L. 2015. Enhanced In-Line Data Duplication and Secure Authorization in Hybrid Cloud. International Journal of Innovative Research in Science . Engineering and Technology, 42, 2319-8753.
[8]
Li, J., Li, Y. K., Chen, X., Lee, P. P., & Lou, W. 2015. A hybrid cloud approach for secure authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 265, 1206-1216.
[9]
Li, N., Zhang, L. J., Xu, P., Wang, L., Zheng, J., & Guo, Y. 2013, June. Research on pricing model of cloud storage. Proceedings of the2013 IEEE Ninth World Congress on Services pp. 412-419. IEEE. 10.1109/SERVICES.2013.70
[10]
Liu, Q., Weng, C., Li, M., & Luo, Y. 2010. An In-VM measuring framework for increasing virtual machine security in clouds. IEEE Security and Privacy, 86, 56-62.
[11]
Mell, P., & Grance, T. 2009. Effectively and securely using the cloud computing paradigm {PowerPoint}. NIST, Information Technology Laboratory.
[12]
Mohan, P., & Thangavel, R. 2013. Resource Selection in Grid Environment Based on Trust Evaluation Using Feedback and Performance. American Journal of Applied Sciences, 108, 924-930.
[13]
Pearson, S. 2013. Privacy, security and trust in cloud computing. In Privacy and Security for Cloud Computing pp. 3-42. Springer London.
[14]
PopovićK.Hocenski¿. 2010, May. Cloud computing security issues and challenges.Proceedings of the 33rd International Convention, Opatija pp. 344-349. IEEE.
[15]
Prakash, M., Farah Sayeed, R., Princey, S., & Priyanka, S. 2015. Deployment of Multicloud Environment with Avoidance of DDOS Attack and Secured Data Privacy. International Journal of Applied Engineering Research, 109, 8121-8124.
[16]
Prakash, M., & Ravichandran, T. 2012. An Efficient Resource Selection and Binding Model for Job Scheduling in Grid. European Journal of Scientific Research, 814, 450-458.
[17]
Ryan, M.D. 2011. Cloud computing privacy concerns on our doorstep. Communications of the ACM, 541, 36-38.
[18]
Samadhu, A.A., Rambabu, J., Pradeep Kumar, R., & Santhya, R. 2015. Detailed Investigation on a Hybrid Cloud Approach for Secure Authorized Deduplication. International Journal for Research in Applied Science & Engineering Technology, 32, 226-269.
[19]
Saravanakumar, C., & Arun, C. 2012. Traffic analysis and shaping of the cloud services over common deployment model using cloud analyst. International Journal of Computers and Applications, 434, 33-37.
[20]
Subashini, S., & Kavitha, V. 2011. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 341, 1-11.
[21]
Tanahashi, Y., Chen, C. K., Marchesin, S., & Ma, K. L. 2010, November. An interface design for future cloud-based visualization services. Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science CloudCom pp. 609-613. IEEE. 10.1109/CloudCom.2010.46
[22]
Tian, W., Zhao, Y., Xu, M., Zhong, Y., & Sun, X. 2015. A toolkit for modeling and simulation of real-time virtual machine allocation in a cloud data center. IEEE Transactions on Automation Science and Engineering, 121, 153-161.
[23]
Venkatesh, B., Sharma, A., Desai, G., & Jadhav, D. 2014. Secure Authorised Deduplication by Using Hybrid Cloud Approach. International Journal of Innovative Research in Advanced Engineering, 110, 221-227.
[24]
Walunj, R. S., Lande, D. A., & Pansare, N. S. 2014. Secured Authorized Deduplication Based Hybrid Cloud. International Journal of Engineering Science, 311, 34-39.
[25]
Wei, Y., & Blake, M. B. 2010. Service-oriented computing and cloud computing: Challenges and opportunities. IEEE Internet Computing, 146, 72-75.

Cited By

View all
  • (2022)Chaotic Salp Swarm Optimization-Based Energy-Aware VMP Technique for Cloud Data CentersComputational Intelligence and Neuroscience10.1155/2022/43434762022Online publication date: 1-Jan-2022
  • (2022)Data organization design of file system based on NAS secure Private Cloud NetworkProceedings of the 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence10.1145/3584376.3584511(757-762)Online publication date: 16-Dec-2022
  • (2021)An efficient technique for cloud storage using secured de-duplication algorithmJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-21003841:2(2969-2980)Online publication date: 1-Jan-2021
  1. An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image International Journal of Information Security and Privacy
    International Journal of Information Security and Privacy  Volume 11, Issue 2
    April 2017
    63 pages
    ISSN:1930-1650
    EISSN:1930-1669
    Issue’s Table of Contents

    Publisher

    IGI Global

    United States

    Publication History

    Published: 01 April 2017

    Author Tags

    1. AES
    2. De-Duplication
    3. Duplicate Copies
    4. OTP
    5. Privileges

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 20 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Chaotic Salp Swarm Optimization-Based Energy-Aware VMP Technique for Cloud Data CentersComputational Intelligence and Neuroscience10.1155/2022/43434762022Online publication date: 1-Jan-2022
    • (2022)Data organization design of file system based on NAS secure Private Cloud NetworkProceedings of the 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence10.1145/3584376.3584511(757-762)Online publication date: 16-Dec-2022
    • (2021)An efficient technique for cloud storage using secured de-duplication algorithmJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-21003841:2(2969-2980)Online publication date: 1-Jan-2021

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media