Multi-Layered Dynamic Encryption Security Scheme for Cloud Data Storage
DOI:
https://doi.org/10.24297/ijct.v16i3.6150Keywords:
Dynamic Encryption Key Security Scheme (DEKSS), Cloud Service Providers (CSP), mobile devicesAbstract
This journal article discusses our Dynamic Encryption Key Security Scheme (DEKSS) and the purpose it serves in providing a new security architecture for protecting databases used in technology stacks involving Mobile and Cloud based devices. Our security scheme is a novel architectural strategy that implements a full-stack architecture for the dispatching and management of data between several Cloud Service Providers (CSP) and any number of mobile devices. This strategy can promise data security needs for both mobile devices and cloud service providers without impacting the security requirements of the other party. While there are limitations in being truly secure, such as those recognized by WhiteHat security in their annual report[1], we believe that our security scheme can effectively circumvent potential threats and secure data through folding data using any number of encryption layers for every table and column of data to be stored. Through this approach, we have found our work to be applicable to a variety of different audiences within the cloud security space.
Downloads
References
[2] J. K. Jung Hee Cheon. A hybrid scheme of public-key encryption and somewhat homomorphic encryption. IEEE transactions on information forensics and security: 1052-1063, 2015.
[3] M. P. S. J. Long Nguyen-Vu J.P. Privacy enhancement using selective encryption scheme in data outsourcing. International journal of distributed sensor networks: 1-7, 2016.
[4] S. M.S. B. Kamlesh Kumar Hingwe. Two layered protection for sensitive data in cloud. IEEE:1265–1272, 2014.
[5] H.S.A.Eman M.Mohammad. Enhanced data security model for cloud computing. Infos 2012, 2012.
[6] K.L.M.R. Seny Kamara. Cryptographic cloud storage. Financial cryptography and data security:136–149, 2010.
[7] G. C. Deka. A survey of cloud database systems. IEEE computer society:50–57, 2014
[8] Y. Y. Mahmoud Barhamgi A. K. B. Protecting privacy in the cloud: current practices, future directions. IEEE computer society: 68-72, 2016.
[9] V. S. Amitabh Saxena V. K. Application layer encryption in cloud. IEEE, APSEC:377-384, 2015. DOI: https://www.computer.org/csdl/proceedings/apsec/2015/9644/00/9644a377.pdf.
[10] M. C. Luca Ferretti F. P. and M. Marchetti. Performance and cost evaluation of an adaptive encryption architecture for cloud database. IEEE Transactions on Cloud Computing, 2, 2014
[11] T. T. Youwen Zhu Z. H. Secure and controllable K-NN query over encrypted cloud data with key confidentiality. Parallel and Distributed Computing: 50-57, 2014.