effective multi cloud and multi level secured data storage and retrieval system

Pavan Kumar D,Harish babu R.L,Katari Lakshmipathi,Priya V

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 25 April,2023         Pages:1784-1791

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

In accordance with more data storage needs turning over to the cloud, finding a secure and efficient data access structure has become a major research issue. In the proposed system, data is encrypted and storing it in cloud. As per our proposed system we implement the multi security levels High security, Medium Security, Low Security. In High Security it measures involve data encryption and splitting the information into two parts, which are then stored in separate cloud for added protection. In Medium Security the data is encrypted and stored in a single cloud. In Low Security For standard security, data is encrypted and stored as usual in single cloud. When the User needs to Retrieval the data, that data is rearrange and to decrypt the data.

Kewords

Encryption, Secure, Cloud.

Reference

[1] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457–473, Springer, 2005. [2] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98, Acm, 2006. [3] L. Cheung and C. Newport, “Provably secure ciphertext policy ABE,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 456–465, ACM, 2007. [4] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext - policy attributebased encryption,” in 2007 IEEE Symposium on Security and Privacy (SP’07), pp. 321–334, IEEE, 2007. [5] D. F. Ferraiolo and D. R. Kuhn, “Role-based access controls,” arXiv preprint arXiv:0903.2171, 2009. [6] A. C. OConnor and R. J. Loomis, “2010 economic analysis of role-based access control,” NIST, Gaithersburg, MD, vol. 20899, 2010. [7] A. Elliott and S. Knight, “Role explosion: Acknowledging the problem.,” in Software Engineering Research and Practice, pp. 349–355, 2010. [8] G. Wang, Q. Liu, J. Wu, and M. Guo, “Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers,” Computers & Security, vol. 30, no. 5, pp. 320–331, 2011. [9] P. Mell and T. Grance, “The NIST definition of cloud computing,” 2011. [10] D. Boneh, A. Sahai, and B. Waters, “Functional encryption: Definitions and challenges,” in Theory of Cryptography Conference, pp. 253–273, Springer, 2011. [11] M. Lichman, “UCI machine learning repository,” 2013. [12] S. Wang, J. Zhou, J. K. Liu, J. Yu, J. Chen, and W. Xie, “An efficient file hierarchy attribute-based encryption scheme in cloud computing,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 6 pp. 1265–1277, 2016. [13] P. Institute, “Sixth annual benchmark study on privacy and security of healthcare data,” tech. rep., Ponemon Institute LLC, 2016. [14] R. Cohen, “The cloud hits the mainstream: More than half of U.S. businesses now use cloud computing.” http://www.forbes.com, April 2013. Online; posted 10-January-2017. [15] E. Zaghloul, T. Li, and J. Ren, “An attribute-based distributed data sharing scheme,” in IEEE Globeocm 2019, (Abu Dhabi, UAE.), 9-13 December 2018.