Multi-Layered Dynamic Encryption Security Scheme for Cloud Data Storage

Authors

  • Stephen Rodriguez Iona College 715 North Ave. New Rochelle, New York 10801
  • Paolina Centonze Iona College 715 North Ave. New Rochelle, New York 10801

DOI:

https://doi.org/10.24297/ijct.v16i3.6150

Keywords:

Dynamic Encryption Key Security Scheme (DEKSS), Cloud Service Providers (CSP), mobile devices

Abstract

This journal article discusses our Dynamic Encryption Key Security Scheme (DEKSS) and the purpose it serves in providing a new security architecture for protecting databases used in technology stacks involving Mobile and Cloud based devices. Our security scheme is a novel architectural strategy that implements a full-stack architecture for the dispatching and management of data between several Cloud Service Providers (CSP) and any number of mobile devices. This strategy can promise data security needs for both mobile devices and cloud service providers without impacting the security requirements of the other party. While there are limitations in being truly secure, such as those recognized by WhiteHat security in their annual report[1], we believe that our security scheme can effectively circumvent potential threats and secure data through folding data using any number of encryption layers for every table and column of data to be stored. Through this approach, we have found our work to be applicable to a variety of different audiences within the cloud security space.

Downloads

Download data is not yet available.

References

[1] W. Security. Web applications security statistics report, 2016.
[2] J. K. Jung Hee Cheon. A hybrid scheme of public-key encryption and somewhat homomorphic encryption. IEEE transactions on information forensics and security: 1052-1063, 2015.
[3] M. P. S. J. Long Nguyen-Vu J.P. Privacy enhancement using selective encryption scheme in data outsourcing. International journal of distributed sensor networks: 1-7, 2016.
[4] S. M.S. B. Kamlesh Kumar Hingwe. Two layered protection for sensitive data in cloud. IEEE:1265–1272, 2014.
[5] H.S.A.Eman M.Mohammad. Enhanced data security model for cloud computing. Infos 2012, 2012.
[6] K.L.M.R. Seny Kamara. Cryptographic cloud storage. Financial cryptography and data security:136–149, 2010.
[7] G. C. Deka. A survey of cloud database systems. IEEE computer society:50–57, 2014
[8] Y. Y. Mahmoud Barhamgi A. K. B. Protecting privacy in the cloud: current practices, future directions. IEEE computer society: 68-72, 2016.
[9] V. S. Amitabh Saxena V. K. Application layer encryption in cloud. IEEE, APSEC:377-384, 2015. DOI: https://www.computer.org/csdl/proceedings/apsec/2015/9644/00/9644a377.pdf.
[10] M. C. Luca Ferretti F. P. and M. Marchetti. Performance and cost evaluation of an adaptive encryption architecture for cloud database. IEEE Transactions on Cloud Computing, 2, 2014
[11] T. T. Youwen Zhu Z. H. Secure and controllable K-NN query over encrypted cloud data with key confidentiality. Parallel and Distributed Computing: 50-57, 2014.

Downloads

Published

2017-06-02

How to Cite

Rodriguez, S., & Centonze, P. (2017). Multi-Layered Dynamic Encryption Security Scheme for Cloud Data Storage. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 16(3), 6233–6239. https://doi.org/10.24297/ijct.v16i3.6150

Issue

Section

Research Articles