Advanced Cryptographic Standards-Based Secure Data Protocol for Distributed Data Storage and Communication in the Cloud

Advanced Cryptographic Standards-Based Secure Data Protocol for Distributed Data Storage and Communication in the Cloud

Ankush Balaram Pawar, Shashikant U. Ghumbre, Rashmi M. Jogdand
Copyright: © 2022 |Pages: 16
DOI: 10.4018/IJCAC.297097
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In this research, an ACS-based secure data protocol (ACS-based secure data protocol) is introduced for distributed data storage and communication in cloud. The component is constructed using the Owner’s Machine (OM), Data Processing Section (DPS), Cloud Monitoring Server (CMS), Metadata table, Key Management Server (KMS) and Receiver’s Machine (RM). The session key is generated by exchanging the data between the client and server using the mathematical operations, such as interpolation, hashing, Walsh transform and Elliptic curve cryptography. The Triple Data Encryption Algorithm (3DES) is used for performing the activities, like assigning index, uploading and slicing file and encrypting the sliced files. The fuzzy cluster-based mechanism and the angular distance are performed for indexing and retrieval. The metrics, such as E2E delay, time and detection rate are used for evaluating the developed ACS based secure data protocol in the presence of inside attack, password spoofing attack and Denial-of-Service (DoS) attack.
Article Preview
Top

1. Introduction

Cloud computing is an internet technology that provided users with services and interactions. Cloud computing is the payment-based model that provided available, convenient, and on-demand network access (Wang & Zhang, 2020). The benefits of cloud computing include the management overhead, financial cost, administrative overhead, seamless office access, adaptability, and utilization of less memory. Various assets in the cloud computing platform are assessed by the user based on their request. The backup facility is provided by cloud computing services, like Amazon, Dropbox, and Google Drive. The applications are tested without the construction of physical domain in cloud computing for cutting down the expenses of the clients. The administrative facilities, such as Platform as a Service (PaaS), Software as a Service (SaaS), and Infrastructure as a Service (IaaS) are provided in cloud computing (Kumar, et al., 2018; Botta, et al., 2016). The administrations, programming language, apparatuses, and libraries are provided by the PaaS, whereas the services, like webmail, virtual work area, and program interface are offered to the clients by the SaaS. The online administrations that include the load balancers, servers, and computing assets are provided to the clients by the IaaS. These advantages of cloud computing have made the organization, businesses and the user move the data towards the cloud (Devagnanam and Elango, 2020). Also, the services, such as software, infrastructure, and others are provided by cloud computing with the help of the public cloud, private cloud, community cloud, and hybrid cloud (Shahid, et al., 2020).

Cloud storage is one of the services provided by cloud computing. The cloud storage services allowed the users to share and store the data on the cloud computing platform due to the flexibility and high efficiency(Wang & Zhang, 2020). The availability of a huge volume of data has made cloud storage an important service (Bhowmik and Malathi, 2019). To overcome the cloud storage optimization issues, different optimization methods are used in practice (Jadhav and Gomathi, 2019). Due to the cost-effectiveness and cloud users, numerous institutions and industries have shifted their data to the cloud. The data storage in the cloud is maintained by the cloud service providers (CSPs) (Sermakani & Paulraj, 2020). The data stored in the cloud platform faces serious data privacy and data security issues (Mandala and Rao, 2019; Bisandu, 2018) as the control of the data stored in the cloud computing platform can be lost by the Data Owner (DO) (Wang & Zhang, 2020). Another major concern in cloud computing is the satisfaction of the cloud user in terms of data integrity by the CSP (Sermakani & Paulraj, 2020). Distributed data storage systems have gained attention due to the rapid development of cloud computing and big data technology (Bera, et al., 2015; Yu, et al., 2017; Chervyakov, N et al., 2019). When compared with the traditional data storage systems (Agnoletti, et al., 2015), the distributed data storage systems have become attractive due to the storage ability for the large-scale data (Liao, et al., 2015; You, et al., 2015). Moreover, the distributed data storage systems also enhanced the availability of data. The data is available by allocating the same data on different computers for reducing redundancy (Awami and Hassanein, 2016; Kaseb, et al., 2019). An artificial neural network (Vinolin and Vinusha, 2018) is a precise data processing system Characterized by a limited number of interrelated Ingredients with others to form a network. The distributed data storage systems are used in the fields, such as military affairs, financial transactions, and medical areas (Erguzen and Unver, 2018; Peng, et al., 2020

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing