International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 177 - Number 31 |
Year of Publication: 2020 |
Authors: Frimpong Twum, J. B. Hayfron-Acquah, J. K. Panford |
10.5120/ijca2020919765 |
Frimpong Twum, J. B. Hayfron-Acquah, J. K. Panford . A Comparative Study of Existing Cloud Security System Models as against an Implementation of the CDDI Model Dubbed SecureMyFiles System. International Journal of Computer Applications. 177, 31 ( Jan 2020), 17-37. DOI=10.5120/ijca2020919765
Prior studies have established the security of resources outsourced for cloud storage heavily preys on subscribers’ minds. Existing cloud security frameworks classified as direct architectures (such as provided by DropBox, Box, Google, BackBlaze B2) and indirect architectures provided by the Cloud Access Security Brokers (CASB)/Security as a Service (SECaaS) providers have been found to be inadequate in assuring the cloud subscriber of the security of resources in terms data corruption, privacy, and performance in recovering data. This study employed an experimental lab set-up using JAVA, SQL, and PHP to develop the Cloud Data Distribution Intermediary (CDDI) framework into software system dubbed Secure My Files (SMF). The SMF system provides users a choice of selecting one of four data priority levels (Low, Normal, Important, or Critical) at the time of uploading their data resource for cloud storage. The priority level selected determines: the uploading and downloading process the system uses, the amount of data that can be recovered in the event of data corruption, and the performance during data recovery. The security strength of the SMF system in relation to assuring of confidentiality, Integrity, and Availability of cloud data was found to be much stronger than the existing models and systems provided by DropBox, Box, Google Drive, BackBlaze B2, and CASB/SECaaS. This is because with the SMF System the cloud subscriber data is distributed across different Cloud Service Providers (CSP’s) distributed storage infrastructures as against the existing frameworks and systems where the data reside with one single provider.