Secure Data Storage System and Data Leakage Detection
DOI:
https://doi.org/10.32628/IJSRST52310399Keywords:
Energy efficient algorithm, Manets, total transmission energy, maximum number of hop, network lifetimeAbstract
Data transmitted across these networks must be secure and private given how large and rapidly expanding they are. Cloud servers are a key resource for data storage. Therefore, cloud servers must be protected and cannot be left open to the prospect of being utilized by hackers for theft or exposure. They require strategic plans for this to guarantee the data's security and privacy. The solution being proposed makes use of three approaches to guarantee data security. The plans involve data encryption, data distribution across several clouds, and granting data sharing authenticity by using a secret key alone. The system is first set up to allow data sharing across a secure channel of encryption using the Lightweight method. After that, data is dispersed among several clusters using the DROP technique, and data is replicated between clouds to prevent any loss. Only a third private key can explicitly grant those with a need for the information access to various data segments. Any unethical request to share data is detected by a trapdoor, which blocks the request and identifies the individual responsible for any data leakage.
References
- Y. Kao, K. Huang, H. Gu and S. Yuan, "UCloud: A usercentric key management scheme for cloud data protection", IET Inf. Secur., vol. 7, no. 2, pp. 144-154, Jun. 2013.
- A. Al-Haj, G. Abandah and N. Hussein, "Crypto-based algorithms for secured medical image transmission", IET Inf. Secur., vol. 9, no. 6, pp. 365-373,Nov.2015.
- K. Liang, M. H. Au, J. K. Liu, W. Susilo, D. S. Wong, G. Yang, et al., "A secure and efficient ciphertext-policy attributebased proxy re-encryption for cloud data sharing", Future Generat. Comput. Syst., vol. 52, pp. 95-108, Nov. 2015.
- S. Wang, J. Zhou, J. K. Liu, J. Yu, J. Chen and W. Xie, "An efficient file hierarchy attribute-based encryption scheme in cloud computing", IEEE Trans. Inf. Forensics Security, vol. 11, no. 6, pp. 1265-1277, Jun. 2016.
- H. Liu, X. Li, M. Xu, R. Mo and J. Ma, "A fair data access control towards rational users in cloud storage", Inf. Sci., vol. 418, pp. 258-271, Dec. 2017.
- Z. Liu, Z. L. Jiang, X. Wang and S. M. Yiu, "Practical attribute-based encryption: Outsourcing decryption attribute revocation and policy updating", J. Netw. Comput. Appl., vol. 108, pp. 112-123, Apr. 2018.
- R. Li, C. Shen, H. He, X. Gu, Z. Xu and C.-Z. Xu, "A lightweight secure data sharing scheme for mobile cloud computing", IEEE Trans. Cloud Comput., vol. 6, no. 2, pp. 344- 357, Apr. 2018.
- J. Li, S. Wang, Y. Li, H. Wang, H. Wang, H. Wang, et al., "An efficient attribute-based encryption scheme with policy update and file update in cloud computing", IEEE Trans. Ind. Informat., vol. 15, no. 12, pp. 6500-6509, Dec. 2019.
- E. Zaghloul, K. Zhou and J. Ren, "P-MOD: Secure privilegebased multilevel organizational data-sharing in cloud computing", IEEE Trans. Big Data, vol. 6, no. 4, pp. 804-815, Dec. 2020
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.