CFP last date
20 January 2025
Reseach Article

Data Leakage Optimization in Multi-cloud Storage Services

by Krishna Vitthal Nil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 16
Year of Publication: 2020
Authors: Krishna Vitthal Nil
10.5120/ijca2020920668

Krishna Vitthal Nil . Data Leakage Optimization in Multi-cloud Storage Services. International Journal of Computer Applications. 175, 16 ( Sep 2020), 43-47. DOI=10.5120/ijca2020920668

@article{ 10.5120/ijca2020920668,
author = { Krishna Vitthal Nil },
title = { Data Leakage Optimization in Multi-cloud Storage Services },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2020 },
volume = { 175 },
number = { 16 },
month = { Sep },
year = { 2020 },
issn = { 0975-8887 },
pages = { 43-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number16/31539-2020920668/ },
doi = { 10.5120/ijca2020920668 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:25:14.353150+05:30
%A Krishna Vitthal Nil
%T Data Leakage Optimization in Multi-cloud Storage Services
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 16
%P 43-47
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a days the use of cloud computing has increased speedily in many organizations. Cloud computing provides many advantages in terms of easy accessibly of data and also low cost. Data security is a major factor in cloud computing, as cloud users often store sensitive information in provided cloud storage providers. Recently the use of a single cloud is reduced because, the risks of service availability failure and the possibility of malicious insiders in the single cloud. So, many organizations preferred storing data on multiple clouds. Multi-Cloud Storage suggests to use the different distributed storage services. It is distributing information over different cloud storage providers and also it automatically provides a certain degree of data leakage control. But due to a large amount of data and unstructured distribution of information chunks can lead to high information disclosure even though using multiple clouds. It studies about the important data leakage problem caused by unstructured and less secure data distribution in mutlicloud storage services. To optimize the data leakage, it utilizes StoreSim, which data leakage aware storage system in the mutlicloud. StoreSim achieves this goal by using novel algorithms, SHA-1 algorithm efficiently generated signatures for data chunks and this signature computes the data leakages. Next, AES Algorithm is an effective data encrypted algorithm which reduce the attackability of sensitive data and also minimal data leakages across multiple clouds. The final analysis of proposed system are, reduces the risk of wholesale data leakage and also control data leakages.

References
  1. Benjamin Fabian, Tatiana Ermakova, Philipp Junghanns ”Collaborative and securesharing of healthcare data in multi-clouds “Information Systems, Volume 48 IssuesC, 2015, pp 132-150
  2. Thanasis G. Papaioannou, Nicolas Bonvin and Karl Aberer”Scalia: An AdaptiveScheme for Efficient Multi-Cloud Storage”, IEEE November 10-16, 2012.
  3. Emil Stefanov and Elaine Shi ”Multi-Cloud Oblivious Storage”, IEEE ACM978-1-4503-2477, November 48, 2013.
  4. Rohit Bhadauria, Rituparna Chaki, Nabendu Chaki and Sugata Sanyal,”A Surveyon Security Issues in Cloud Computing”, Journal of Network and Computer ApplicationsVolume 71, August 2016.
  5. Shilpashree Srinivasamurthy and David Q. Liu, ”Survey on Cloud Computing Security”,IEEE International Conference on Computing Sciences on 24 December 2012.
  6. Marina Zapater, Jose L. Ayala, Jose M. Moya, Kalyan Vaidyanathan”Leakageand Temperature Aware Server Control for Improving Energy Efficiency in Data Centers”,IEEE Conference 06 May 2013.
  7. Jens-Matthias Bohli, Nils Gruschka, Meiko Jensen, Luigi Lo Iacono, And NinjaMarnau ”Security And Privacy-Enhancing Multicloud Architectures”, IEEE TransactionsOn Dependable And Secure Computing, Vol. 10, No. 4, July/August 2013.
  8. Shubhashis Sengupta, Vikrant Kaulgud, Vibhu Saujanya Sharma ”Cloud ComputingSecurity - Trends and Research Directions”, IEEE World Congress on Services4-9 July 2011.
  9. Ibrahim Abdullah Althamary, Talal Mousa Alkharobi , ”Secure File Sharingin Multi-Cloud using Shamirs Secret Sharing Scheme”, Transactions on Network andcommunications Vol 4 issue 6, 2016,pp53-67.
  10. Safaa Salam Hatem, Maged H.Wafy,Mahmoud M.EI-Khouly, ”Malware Detectionin cloud Computing”, International Journal of Advanced Science and ComputerScience Applications, Vol 5 No 2014.
  11. Danan Thilakanathan, Shiping Chen, Surya Nepal and Rafael A. Calvo,”SecureData Sharing in the Cloud”In Security, Privacy and Trust in Cloud Systems, SpringerBerlin Heidelberg, 2015, (pp. 45-72).
  12. Hao Zhuang, Member, IEEE, Rameez Rahman,Pan Hui, Member, IEEE, and Karl Aberer, Member, IEEE optimizing information leakage in multicloud storage services
  13. Balasaraswathi, V. R., & Manikandan, S. (2014) ”TEnhanced security for multicloudstorage using cryptographic data splitting with dynamic approach , In AdvancedCommunication, International Conference on Control and Computing Technologies(ICACCCT), 2014 on (pp. 1190-1194) IEEE.
  14. Mazhar Ali, Revathi Dhamotharan, ErajKhan, Samee U. Khan, Athanasios V.Vasilakos, KeqinLi, Albert. Y. Zomaya ”SeDaSC: Secure Data Sharing in Clouds,Systems Journal, IEEE, volume: PP, Issue: 99, 2015, pp 1-10.
  15. Yashaswi Singh, Farah Kandah, Weiyi Zhang ”A Secured Cost-effective Multi-Cloud Storage in Cloud Computing”,IEEE INFOCOM on Cloud Computing in 2011.
  16. Bih-Hwang Lee, Ervin Kusuma Dewi, Muhammad Farid Wajdi Data security in cloud computing using AES under HEROKU cloud.
  17. Mohammed A. AlZain,Eric Pardede , Ben Soh , James A. Thom Cloud Computing Security: From Single to Multi-Clouds.
Index Terms

Computer Science
Information Sciences

Keywords

Data leakage Multi-cloud Storage Cloud Storage Servers Encryption Decryption