User-Centric Cloud Framework for Enhanced Data Security by Applying UK Algorithm

Main Article Content

B. Umapathy, G. Kalpana

Abstract

Cloud storage is the technical boon which has become the realm of many companies like Amazon, Google, Microsoft, Drop box and many more. Remarkably all these companies are US based and thus eventually the personal data of every other nation is stacked on the Western companies. This leads the dependant country to a state of vulnerable. However if the dependant countries need to get autonomy they had to be provided with their own cloud storage which is impossible with the current mechanisms. With the facility of high computational devices and wide infrastructure and with the aid of secured encryption the cloud storage providers strongly protect the data of the users and enable their best service to the users. Also the cloud storage providers use the encryption algorithm in the provider infrastructure and data from user to provider infrastructure is done using the secured transmission. Finally the powerful infrastructure does the work to secure the data. This mechanism is certainly possible in the developed countries. But it is relatively impossible in the developing countries like India as it cannot afford the huge infrastructure to protect the public data. Even done, it might not result in generating profit because the subscription rate is comparatively lower in India than in developed countries. So to pursue the less profitable module is not suggestive and hence the reliability on western country cloud storage is over whelming. However to overcome this set back and to implement indigenous cloud storage this paper has attempted to implement the UK algorithm in user device environment through which mini and micro level cloud storage shall be developed resulting in the minimal cost of maintaining the cloud storage. In this case, cloud Storage provider do not need to have either the huge infrastructure nor the computational devices to process the data and no need of separate data transmission to secure the data as well. Employing the encryption algorithm in user environment helps to give full authority to the user on their data. The CS provider holds only encrypted data of the user and with low cost consumption this method is feasible even for the developing country like India.

Article Details

Section
Articles
Author Biography

B. Umapathy, G. Kalpana

[1] B. Umapathy

1*G. Kalpana

 

1,1*Department of Computer Science, Faculty of Science and Humanities, SRM Institute of Science and Technology, Kattankulathur, 603203

Email: 1ub225@srmist.edu.in, 1*kalpanag@srmist.edu.in.

Copyright © JES 2024 on-line : journal.esrgroups.org

 

References

M. Y. Pandith, “Data Security and Privacy Concerns in Cloud Computing,” Internet Things Cloud Comput., vol. 2, no. 2, p. 6, 2014, doi: 10.11648/j.iotcc.20140202.11.

M. E. Smid, “Standard,” vol. 126, no. 126024, pp. 1–18, 2022.

M. Amoon and A. A. Nasr, “A Management System for Servicing Multi-Organizations on Community Cloud Model in Secure Cloud Environment,” 2019.

M. Kamal et al., “Microprocessors and Microsystems Privacy-aware genetic algorithm based data security framework for distributed cloud storage,” Microprocess. Microsyst., vol. 94, no. October 2021, p. 104673, 2022, doi: 10.1016/j.micpro.2022.104673.

Y. Gupta, “Novel distributed load balancing algorithms in cloud storage,” Expert Syst. Appl., vol. 186, no. March, p. 115713, 2021, doi: 10.1016/j.eswa.2021.115713.

P. Sharma, R. Jindal, and M. Dutta, “Journal of Information Security and Applications Blockchain-based decentralized architecture for cloud storage system,” J. Inf. Secur. Appl., vol. 62, no. September, p. 102970, 2021, doi: 10.1016/j.jisa.2021.102970.

D. P. Timothy, “A Hybrid Cryptography Algorithm for Cloud Computing Security,” vol. 5.

“6.Hadoop-based secure storage solution for big data in cloud computing environment _ Elsevier Enhanced Reader.pdf.” .C. Xu, K. U. N. Wang, M. Guo, C. Xu, and T. K. Wang, “INTELLIGENCE IN THE CLOUD Intelligent Resource Management in Blockchain-Based Cloud Datacenters,” pp. 50–59.

S. Atiewi et al., “Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography,” vol. 8, 2020, doi: 10.1109/ACCESS.2020.3002815.

S. Barman, S. Chattopadhyay, D. Samanta, and G. Panchal, “A novel secure key-exchange protocol using biometrics of the sender and receiver,” Comput. Electr. Eng., vol. 64, pp. 65–82, Nov. 2017, doi: 10.1016/J.COMPELECENG.2016.11.017.

S. Krishnaveni, S. Prabhakaran, S. Sivamohan, and S. Sridhar, “Network intrusion detection based on ensemble classification and feature selection method for cloud computing,” no. November 2021, pp. 1–29, 2022, doi: 10.1002/cpe.6838.

S. Mudepalli, V. Srinivasa Rao, and R. Kiran Kumar, “An efficient data retrieval approach using blowfish encryption on cloud ciphertext retrieval in cloud computing,” Proc. 2017 Int. Conf. Intell. Comput. Control Syst. ICICCS 2017, vol. 2018-Janua, pp. 267–271, 2017, doi: 10.1109/ICCONS.2017.8250724.

T. U. Haq, T. Shah, G. F. Siddiqui, M. Z. Iqbal, I. A. Hameed, and H. Jamil, “Improved Twofish Algorithm: A Digital Image Enciphering Application,” IEEE Access, vol. 9, pp. 76518–76530, 2021, doi: 10.1109/ACCESS.2021.3081792.

P. Suhasini, “Enhanced Fractional Order Lorenz System for Medical Image Encryption in Cloud-Based Healthcare Administration,” vol. 9, no. 4, pp. 424–437, 2022, doi: 10.22247/ijcna/2022/214504.

M. Gracy, “A SYSTEMATIC REVIEW OF BLOCKCHAIN- BASED SYSTEM : TRANSACTION THROUGHPUT LATENCY AND CHALLENGES Department of Computer Science,” 2021.

B. Umapathy and G. Kalpana, “A novel symmetric cryptographic method to design block complexity for data security,” Comput. Electr. Eng., vol. 104, no. PB, p. 108467, 2022, doi: 10.1016/j.compeleceng.2022.108467.

B. Umapathy and G. Kalpana, "A Key Generation Algorithm for Cryptographic Algorithms to Improve Key Complexity and Efficiency," 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 2023, pp. 647-652, doi: 10.1109/ICSSIT55814.2023.10060906.

B. Rebecca Jeyavadhanam, M. Gracy, V. V. Ramalingam, Christopher Xavier, “Fundamental Concepts and Applications of Blockchain Technology”, Big Data Analysis for Green Computing, Taylor and Francis, 2021,DOI https://doi.org/10.1201/9781003032328]