A SECURE, ROBUST AND EFFECTIVE CRYPTOSCHEME USING DATA OBFUSCATION OF ENTITY DETECTION AND REPLACEMENT & ENCRYPTION FOR ENSURING DATA PRIVACY IN PRIVATE CLOUD

Published 30 Nov 2019 •  vol 132  • 


Authors:

 

D. Yakobu, Department of Computer Science & Engineering, Vignan's Foundation for Science Technology and Research, India
Kalluri Hemantha Kumar, Department of Computer Science & Engineering, Vignan's Foundation for Science Technology and Research, India
Venkatesulu Dondeti, Department of Computer Science & Engineering, Vignan's Foundation for Science Technology and Research, India

Abstract:

 

Cloud has been emerging, popular and very demanding technology now a day. Cloud has got wide popularity with its sophisticated features such as internet access, more storage, easy setup, automatic updates, low cost and resource provisioning based on “pay as you go” policy. In spite of advantages, security is considered to be more important and drew the attention of many researchers. The data storage is becoming an indispensable measurement in cloud and most of the times cloud does not guarantee that information/data that has been stored is secured from illegitimate access. Many researchers are working to ensure information security in cloud but unfortunately they do not provide adequate security. This paper is aiming to propose an efficient algorithm with obfuscation and cryptography for unstructured data. The algorithm works to preserve confidentiality of data stored in cloud at two levels. At the fist level the algorithm obfuscate the document by replacing the key words (obfuscation), and at the second level obfuscated document is encrypted using traditional RSA algorithm for better security. Experimental results shows that the proposed algorithm yields good results.

Keywords:

 

Cloud Computing, Confidentiality, Obfuscation, Cryptography

References:

 

[1] M. T. Khorshed, A. B. M. S. Ali, and S. A. Wasimi, “A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing,” Futur. Gener. Comput. Syst., vol. 28, no. 6, pp. 833–851, 2012.
[2] M. Pathan, C. Vecchiola, and R. Buyya, “Load and proximity aware request-redirection for dynamic load distribution in peering CDNs,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 5331 LNCS, no. PART 1, pp. 62–81, 2008.
[3] T. Halabi and M. Bellaiche, “A broker-based framework for standardization and management of Cloud Security-SLAs,” Comput. Secur., vol. 75, pp. 59–71, 2018.
[4] E. Deepak Chowdary and D. Yakobu, “Cloud of Things (CoT) integration challenges,” 2016 IEEE Int. Conf. Comput. Intell. Comput. Res. ICCIC 2016, 2017.
[5] S. S. Chauhan, E. S. Pilli, R. C. Joshi, G. Singh, and M. C. Govil, “Brokering in interconnected cloud computing environments: A survey,” J. Parallel Distrib. Comput., 2018.
[6] A. J. Ferrer, “Inter-cloud Research: Vision for 2020,” Procedia Comput. Sci., vol. 97, pp. 140–143, 2016.
[7] S. Asad, M. Fatima, A. Saeed, and I. Raza, “Multilevel classification of security concerns in cloud computing,” Appl. Comput. Informatics, vol. 13, no. 1, pp. 57–65, 2017.
[8] Y. Sun, J. Zhang, Y. Xiong, and G. Zhu, “Data Security and Privacy in Cloud Computing,” vol. 2014, 2014.
[9] B. T. Rao, “A Study on Data Storage Security Issues in Cloud Computing,” Procedia - Procedia Comput. Sci., vol. 92, pp. 128–135, 2016.
[10] R. Wang, “Research on data security technology based on cloud storage,” Procedia Eng., vol. 174, pp. 1340–1355, 2017.
[11] N. Hidayah, A. Rahman, and K. R. Choo, “ScienceDirect A survey of information security incident handling in the cloud,” Comput. Secur., vol. 49, pp. 45–69, 2014.
[12] S. Singh, Y. Jeong, and J. Hyuk, “Author ’ s Accepted Manuscript A Survey on Cloud Computing Security : Issues , Threats , and Solutions,” J. Netw. Comput. Appl., 2016.
[13] R. Bhadauria, “Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques.”
[14] M. Usman, M. Ahmad, and X. He, “Cryptography-based secure data storage and sharing using HEVC and public clouds,” Inf. Sci. (Ny)., vol. 387, no. 2017, pp. 90–102, 2019.
[15] M. Vijayalakshmi, D. Yakobu, D. Veeraiah, and N. G. Rao, “Automatic healing of services in cloud computing environment,” Proc. 2016 Int. Conf. Adv. Commun. Control Comput. Technol. ICACCCT 2016, no. 978, pp. 740–745, 2017.
[16] Gowthami Garikapati, Yakobu D, "An Analysis of Cloud Data Security Issues Mechanisms" “ijpam.eu,” vol. 116, no. 6, pp. 141–147, 2017.
[17] C. Systems, “A Hybrid Secure Mechanism for Effective Storage Confidentiality to Ensure Data Integrity and Privacy in Public Cloud,” vol. 11, pp. 330–339, 2019.
[18] B. Hashemzade and A. Maroosi, “Hybrid Obfuscation Using Signals and Encryption,” J. Comput. Networks Commun., vol. 2018, pp. 1–6, 2018.
[19] N. Jorstad and T. Landgrave, “Cryptographic algorithm metrics,” … 20th Natl. Inf. Syst. …, 1997.
[20] A. Ghosh and A. Saha, “A N UMERICAL M ETHOD B ASED E NCRYPTION,” pp. 149–157, 2013.
[21] M. Horvath and L. Butty, “The Birth of Cryptographic Obfuscation – A Survey –,” vol. 116675, no. 116675, pp. 1–59, 2018.
[22] T. S. Murthy, N. P. Gopalan, and D. Yakobu, “An Efficient un-realization algorithm for privacy preserving decision tree learning using McDiarmid ’ s bound,” no. 4, pp. 499–502.
[23] P. Examiner and A. W. Johns, “(12) United States Patent,” vol. 2, no. 12, 2010.
[24] L. H. I. B, F. Giunchiglia, L. A. Martucci, and R. Chenu-abente, “Privacy and Identity Management. Time for a Revolution?,” vol. 476, no. 600854, pp. 343–358, 2016.
[25] S. Arul Oli and Dr. L. Arockiam, “Confidentiality Technique for Data Stored in Public Cloud Storage,” Int. J. Eng. Res., vol. V5, no. 02, pp. 169–174, 2016.
[26] K. Bock and S. M. Garnsey, “Language Processing,” A Companion to Cogn. Sci., pp. 226–234, 2008.
[27] N. A. Lewinski and B. T. McInnes, “Using natural language processing techniques to inform research on nanotechnology,” Beilstein J. Nanotechnol., vol. 6, no. 1, pp. 1439–1449, 2015.
[28] S. Hohenberger, G. N. Rothblum, A. Shelat, and V. Vaikuntanathan, “Securely obfuscating re-encryption,” J. Cryptol., vol. 24, no. 4, pp. 694–719, 2011.
[29] G. Ravikumar, “Design of data masking architecture and analysis of data masking techniques for testing,” Int. J. Eng. Sci. Technol., vol. 3, no. 6, pp. 5150–5159, 2011.
[30] S. Sun, C. Luo, and J. Chen, “A review of natural language processing techniques for opinion mining systems,” Inf. Fusion, vol. 36, pp. 10–25, 2017.
[31] M. Sevenster, J. Buurman, P. Liu, J. F. Peters, and P. J. Chang, “Natural language processing techniques for extracting and categorizing finding measurements in narrative radiology reports,” Appl. Clin. Inform., vol. 6, no. 3, pp. 600–610, 2015.
[32] Vijaya Lakshmi Paruchuri. Data Confidentiality in Cloud using Encryption Algorithms. International Journal of Cloud-Computing and Super-Computing. Vol. 3. No. 2. Dec. 2016.GVPress. pp:7-18.http://dx.doi.org/10.21742/IJCS.2016.3.2.02.
[33] S. Suresh Babu and Chimili Ankapanaidu. New Proof Methods for Improving Privacy and Security by using Abe. International Journal of Cloud-Computing and Super-Computing. Vol. 3. No. 1. Jun. 2016.GVPress. pp:1-6.http://dx.doi.org/10.21742/IJCS.2016.3.1.01.
[34] Durga Bhavani Dasari.Cloud-Based Venue Recommendation Framework. International Journal of Cloud-Computing and Super-Computing. Vol. 4. No. 1. Jun. 2017.GVPress. pp:21-26.http://dx.doi.org/10.21742/IJCS.2017.4.1.04.
[35] P. Harika, N.T hirupathi Rao.A Survey on Cloud Computing – Investigative Points, Confronts, Design and Applications. International Journal of Cloud-Computing and Super-Computing. Vol. 5. No. 1. Jun. 2018.GVPress. pp:9-16.http://dx.doi.org/10.21742/IJCS.2018.5.1.02.
[36] Anil Bamwal and Asit Dwivedi. Effective Management of Security of Risk in Cloud Computing Environment. International Journal of Private Cloud Computing Environment and Management. Vol. 3. No. 1. Apr. 2016.GVPress. pp:1-10.http://dx.doi.org/10.21742/IJPCCEM.2016.3.1.01.
[37] S Rithika. Issues on Developing Interoperable Cloud Applications. International Journal of Private Cloud Computing Environment and Management. Vol. 4. No. 1. Apr. 2017.GVPress. pp:9-14.http://dx.doi.org/10.21742/IJPCCEM.2017.4.1.02.
[38] K Praveen Kumar. Performing Initiative Data Prefetching in File Systems for Cloud Computing. International Journal of Private Cloud Computing Environment and Management. Vol. 4. No. 1. Apr. 2017.GVPress. pp:15-20.http://dx.doi.org/10.21742/IJPCCEM.2017.4.1.03.
[39] T. Ravi Kumar. Advanced Approach and Management in Cloud Trust. International Journal of Urban Design for Ubiquitous Computing. Vol. 4. No. 2. Sep. 2016.GVPress. pp:7-12.http://dx.doi.org/10.21742/IJUDUC.2016.4.2.02.
[40] Deduplicating Data in Cloud. International Journal of Advanced Research in Big Data Management System. Vol. 1. No. 1. Jun. 2017.GVPress. pp:31-38.http://dx.doi.org/10.21742/IJARBMS.2017.1.1.04.
[41] N.S.P. Bhargavi. Service Scheme for Data Cloud Services. International Journal of Advanced Research in Big Data Management System. Vol. 1. No. 1. Jun. 2017.GVPress. pp:45-50.http://dx.doi.org/10.21742/IJARBMS.2017.1.1.06.
[42] D. Yakobu, Hemanth Kumar Kalluri, Venkatesulu Dondeti, "An Enhanced Secure, Robust and Efficient CryptoScheme for Ensuring Data Privacy in Public Cloud using Obfuscation & Encryption ", Nov. 2019, https://doi.org/10.18280/isi.

Citations:

 

APA:
Yakobu, D., Kumar, K. H., & Dondeti, V. (2019). A Secure, Robust and Effective Cryptoscheme using Data Obfuscation of Entity Detection and Replacement & Encryption for Ensuring Data Privacy in Private Cloud. International Journal of Advanced Science and Technology (IJAST), ISSN: 2005-4238(Print); 2207-6360 (Online), NADIA, 132, 1-10. doi: 10.33832/ijast.2019.132.01.

MLA:
Yakobu, D., et al. “A Secure, Robust and Effective Cryptoscheme using Data Obfuscation of Entity Detection and Replacement & Encryption for Ensuring Data Privacy in Private Cloud.” International Journal of Advanced Science and Technology, ISSN: 2005-4238(Print); 2207-6360 (Online), NADIA, vol. 132, 2019, pp. 1-10. IJAST, http://article.nadiapub.com/IJAST/Vol132/1.html.

IEEE:
[1] D. Yakobu, K. H. Kumar, and V. Dondeti, “A Secure, Robust and Effective Cryptoscheme using Data Obfuscation of Entity Detection and Replacement & Encryption for Ensuring Data Privacy in Private Cloud.” International Journal of Advanced Science and Technology (IJAST), ISSN: 2005-4238(Print); 2207-6360 (Online), NADIA, vol. 132, pp. 1-10, Nov 2019.