CFP last date
20 January 2025
Reseach Article

A Comparative Study of Existing Cloud Security System Models as against an Implementation of the CDDI Model Dubbed SecureMyFiles System

by Frimpong Twum, J. B. Hayfron-Acquah, J. K. Panford
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 31
Year of Publication: 2020
Authors: Frimpong Twum, J. B. Hayfron-Acquah, J. K. Panford
10.5120/ijca2020919765

Frimpong Twum, J. B. Hayfron-Acquah, J. K. Panford . A Comparative Study of Existing Cloud Security System Models as against an Implementation of the CDDI Model Dubbed SecureMyFiles System. International Journal of Computer Applications. 177, 31 ( Jan 2020), 17-37. DOI=10.5120/ijca2020919765

@article{ 10.5120/ijca2020919765,
author = { Frimpong Twum, J. B. Hayfron-Acquah, J. K. Panford },
title = { A Comparative Study of Existing Cloud Security System Models as against an Implementation of the CDDI Model Dubbed SecureMyFiles System },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2020 },
volume = { 177 },
number = { 31 },
month = { Jan },
year = { 2020 },
issn = { 0975-8887 },
pages = { 17-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number31/31098-2020919765/ },
doi = { 10.5120/ijca2020919765 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:47:24.413478+05:30
%A Frimpong Twum
%A J. B. Hayfron-Acquah
%A J. K. Panford
%T A Comparative Study of Existing Cloud Security System Models as against an Implementation of the CDDI Model Dubbed SecureMyFiles System
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 31
%P 17-37
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Prior studies have established the security of resources outsourced for cloud storage heavily preys on subscribers’ minds. Existing cloud security frameworks classified as direct architectures (such as provided by DropBox, Box, Google, BackBlaze B2) and indirect architectures provided by the Cloud Access Security Brokers (CASB)/Security as a Service (SECaaS) providers have been found to be inadequate in assuring the cloud subscriber of the security of resources in terms data corruption, privacy, and performance in recovering data. This study employed an experimental lab set-up using JAVA, SQL, and PHP to develop the Cloud Data Distribution Intermediary (CDDI) framework into software system dubbed Secure My Files (SMF). The SMF system provides users a choice of selecting one of four data priority levels (Low, Normal, Important, or Critical) at the time of uploading their data resource for cloud storage. The priority level selected determines: the uploading and downloading process the system uses, the amount of data that can be recovered in the event of data corruption, and the performance during data recovery. The security strength of the SMF system in relation to assuring of confidentiality, Integrity, and Availability of cloud data was found to be much stronger than the existing models and systems provided by DropBox, Box, Google Drive, BackBlaze B2, and CASB/SECaaS. This is because with the SMF System the cloud subscriber data is distributed across different Cloud Service Providers (CSP’s) distributed storage infrastructures as against the existing frameworks and systems where the data reside with one single provider.

References
  1. O’Reilly, J. (2017). 7 Ways to Secure Cloud Storage. [Online]Availablefrom:https://www.networkcomputing.com/data-centers/7-ways-secure-cloud-storage/866645128 [Accessed: 15th Oct., 2017]
  2. The Treacherous 12, (2017). The Treacherous 12: Cloud Computing Top Threats in 2016 [Online]. Avalable from: http://www.storm-clouds.eu/services/2017/04/the-treacherous-12-cloud-computing-top-threats-in-2016/ [Accessed: 25th October, 2017]
  3. Shapland, R. (2017). Multi-Tenancy Cloud Security Requires Enterprise Awareness. Available from: http://searchcloudsecurity.techtarget.com/tip/Avoid-the-risks-of-multi-tenant-cloud-environments-through-awareness [Accessed: 10th October, 2017]
  4. CSA (2011). Security guidance for critical areas of focus in cloud computing V3.0. [Online] Available from: https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf [Accessed: 10th May, 2015]
  5. OpenCirrus (2017). Cloud Computing Challenges In 2017. [Online] Available from: http://www.opencirrus.org/cloud-computing-challenges-2017/ [Accessed: 4th Sept., 2015]
  6. Fahmida Y. R. (2016). The dirty dozen: 12 cloud security threats. [Online]. Available from: https://www.infoworld.com/article/3041078/security/the-dirty-dozen-12-cloud-security-threats.html [Accessed: 15th March, 2017]
  7. Twum F., Hayfron-Acquah J. B, Panford J.K. A Proposed New Framework for Securing Cloud Data on Multiple Infrastructures using Erasure Coding, Dispersal Technique and Encryption, International Journal of Computer Applications, Vol. 181, No. 50, pp. 38-49, April 2019.
  8. SkyHigh (2017). What is CASB? Available from: https://www.skyhighnetworks.com/cloud-security-university/what-is-cloud-access-security-broker/ [Accessed: 10th October, 2017]
  9. DoubleHorn,(2017). Cloud Services Brokers: The future of SaaS and IaaS Consumption [Online]. Available from: https://doublehorn.com/cloud-services-brokers-the-future/ [Accessed: 15th October, 2017]
  10. Rubens, P. (2017). Six Top CASB Vendos. [Online]. Available from: https://www.esecurityplanet.com/products/top-casb-vendors.html [Accessed: 5th Nov., 2017]
  11. Forcepoint, (2017). How Forcepoint Web Security Cloud Works. [Online]. Available from: https://www.websense.com/content/support/library/web/hosted/getting_started/cws_explain.aspx [Accessed: 15th Oct., 2017]
  12. Kessler, G. C. (2017). An overview of Cryptography. [Online]. Available from: http://www.garykessler.net/library/crypto.html [Accessed: 1st May, 2017]
  13. Twum F., Hayfron-Acquah J. B, Morgan-Darko W., (2019a). A Proposed Enhanced Transposition Cipher Algorithm Based on Rubik’s Cube Transformations, International Journal of Computer Applications, Vol. 182, No. 35, pp 18-26, January 2019.
  14. Twum F, Hayfron-Acquah, J. B., Oblitey, W. W., Morgan-Darko, W., (2016a). Reed Solomon Encoding: Simplified explanation for Programmers. International Journal of Computer Science and Information Security (IJCSIS), Vol. 14, No. 12
  15. Twum F, Hayfron-Acquah, J. B., Oblitey, W. W., Boadi, R. K., (2016b). A proposed algorithm for generating the Reed-Solomon Encoding Polynomial Coefficients over GF(256) for RS[255,223]8,32. International Journal of Computer Applications (IJCA), Vol. 156, No. 1, pgs. 24-39
  16. Twum F, Hayfron-Acquah, J. B., Oblitey, W. W., Morgan-Darko, W., (2017). Reed Solomon Decoding Simplified for Programmers. International Journal of Computer Science and Information Security (IJCSIS), Vol. 15, No. 1
  17. Twum F., Hayfron-Acquah J. B, Panford J.K., (2019b). A Proposed New Framework for Securing Cloud Data on Multiple Infrastructures using Erasure Coding, Dispersal Technique and Encryption, International Journal of Computer Applications, Vol. 181, No. 50, pp. 38-49, April 2019.
  18. TipTopSecurity,(2016).Is Google Drive Safe to Use? How Google Secures Your Files Online [Online]. Available from: https://tiptopsecurity.com/is-google-drive-safe-to-use/ [Accessed: 1st Nov., 2017]
  19. Chima, R. (2016). Cloud Security – Who owns the data? [Online]. Available from: https://www.bbconsult.co.uk/blog/cloud-security-who-owns-the-data [Accessed: 20th February, 2016]
  20. FileCloud, (2016). Data Ownership in the Cloud – How does it affect you? [Online]. Available from: https://www.getfilecloud.com/blog/2016/11/data-ownership-in-the-cloud-how-does-it-affect-you/#.WgG7_I-0Pct [Accessed: 15th March, 2017]
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Cloud Security Framework Cloud Subscriber Cloud Service Providers Security Privacy Cloud Computing Framework