CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Proposed New Framework for Securing Cloud Data on Multiple Infrastructures using Erasure Coding, Dispersal Technique and Encryption

by Frimpong Twum, J. B. Hayfron-Acquah, J. K. Panford
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 50
Year of Publication: 2019
Authors: Frimpong Twum, J. B. Hayfron-Acquah, J. K. Panford
10.5120/ijca2019918681

Frimpong Twum, J. B. Hayfron-Acquah, J. K. Panford . A Proposed New Framework for Securing Cloud Data on Multiple Infrastructures using Erasure Coding, Dispersal Technique and Encryption. International Journal of Computer Applications. 181, 50 ( Apr 2019), 38-49. DOI=10.5120/ijca2019918681

@article{ 10.5120/ijca2019918681,
author = { Frimpong Twum, J. B. Hayfron-Acquah, J. K. Panford },
title = { A Proposed New Framework for Securing Cloud Data on Multiple Infrastructures using Erasure Coding, Dispersal Technique and Encryption },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2019 },
volume = { 181 },
number = { 50 },
month = { Apr },
year = { 2019 },
issn = { 0975-8887 },
pages = { 38-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number50/30502-2019918681/ },
doi = { 10.5120/ijca2019918681 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:09:47.120773+05:30
%A Frimpong Twum
%A J. B. Hayfron-Acquah
%A J. K. Panford
%T A Proposed New Framework for Securing Cloud Data on Multiple Infrastructures using Erasure Coding, Dispersal Technique and Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 50
%P 38-49
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is a technology that has come to save organizations from investing in and owning high cost IT infrastructure including its management and maintenance. The technology enables an organization to outsource its IT needs to the care of a remote third party Cloud Service Provider (CSP) while focusing on its core business processes. It enables the usage of IT resources remotely as a service on subscription basis at a per usage fee on demand. The service models available are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). These service models are deployed in one of four cloud deployment models as Public, Private, Community or Hybrid cloud. Despite the technology’s numerous benefits, it also poses serious security threats to vital business data assets as the subscriber has to surrender control over its management and maintenance to a remote CSP. The threats include: the CSP using the data for their own gains, the location of the data not known to the subscriber, the ownership of the data (for example, on contract termination or in the event of conflict or dispute), and also the subscriber not knowing who has unauthorized access to their data resource. The challenge therefore, is how to create a secure and vigorous data security solution that can mitigate these threats and alleviate the cloud subscriber fear to freely enjoy using cloud computing services. Hence, this study proposes a Six-level Cloud Data Distribution Intermediary (CDDI) Framework that enables the cloud subscriber to effectively secure its data against these threats. The framework employs Erasure Coding (based on the Galois Field Theory and Reed Solomon Coding), and a Data Dispersion technique with a Transposition Encryption technique based on Rubik’s cube transformation. In addition, it also uses this study’s proposed Erasure Coding technique based on checksum dubbed “Checksum Data Recovery” (CDR). The CDDI framework when implemented on the cloud subscriber’s gateway system will encrypt and split the subscriber’s data into chunks of data fragments which are distributed randomly to the subscribers selected multiple CSP storage infrastructures. This alleviates threats of data usage, location, ownership, and access, identified.

References
  1. Youssef, A. E., Alageel, M., (2012), "A Framework for Securing Cloud Computing", International Journal of Computer Science Issues, Vol. 9, No. 4, pp. 487-500.
  2. Khatri, S. K., Singhal, H., Bahri, K. (2013), “Multi-Tenancy Engineering Architecture in SaaS”, International Journal of Computer Applications. [Online]. Available From: http://research.ijcaonline.org/icrito/number1/icrito1309.pdf
  3. Khan, N., Yasiri, A. (2016), "Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework ", Procedia Computer Science, ScienceDirect, Vol. 94, pp. 485-490.
  4. Shapland, R. (2017). Multi-Tenancy Cloud Security Requires Enterprise Awareness. Available from: http://searchcloudsecurity.techtarget.com/tip/Avoid-the-risks-of-multi-tenant-cloud-environments-through-awareness
  5. Trigueros-Preciado S., Perez-Gonzalez D., Solana-Gonzalez P., (2013). “Cloud computing in industrial SMEs: identification of the barriers to its adoption and effects of its application” Electronic Mark, Vol. 23, No. 2, pp. 105-114
  6. Ahmed, N. (2017), “Cloud Computing: Technology, Security Issues and Solutions”, IEEE, [Online]. Available from: http://ieeexplore.ieee.org/document/7905258/
  7. The Treacherous 12, (2017). The Treacherous 12: Cloud Computing Top Threats in 2016 [Online]. Avalable from: http://www.storm-clouds.eu/services/2017/04/the-treacherous-12-cloud-computing-top-threats-in-2016/
  8. McMillan, R., Knutson, R. (2017). Yahoo Triples Estimate of Breached Accounts to 3 Billion. [Online]. Available from: https://www.wsj.com/articles/yahoo-triples-estimate-of-breached-accounts-to-3-billion-1507062804
  9. Chauhan, K. (2015). “Ensuing Data Storage Security in Cloud Computing”, International Journal of Computer Science and Information Technology Research, Vol. 3, No. 2, pp. 283-287
  10. Sailaja, K. and Usharani, M. (2017), "Cloud Computing Security Issues, Challenges and its Solutions in Financial Sectors", International Journal of Advanced Scientific Technologies, Engineering and Managemnt, Vol. 3, No.1, pp. 190-196.
  11. Wei, W. (2016). Insider Breach: T-Mobile Czech Employee Steals and Sells 1.5 Million Users Data. Available from: https://thehackernews.com/2016/06/t-mobile-hacked.html
  12. ABS (2016). ABS Update – 2016 Online Census Form. [Online]. Available from: http://www.abs.gov.au/ausstats/abs@.nsf/mediareleasesbyReleaseDate/617D51FA32D27BF9CA25800A0077B7BD?OpenDocument
  13. Rao, R. V. and Selvamani, K. (2015), "Data security challenges and its solutions in cloud computing", Procedia Computer Science, Vol. 48, pp. 204-209.
  14. Khandelwal, S. (2017). It’s 3 Billion! Yes, Every Single Yahoo Account Was Hacked In 2013 Data Breach. Available from: https://thehackernews.com/2017/10/yahoo-email-hacked.html
  15. Wang, J. (2009). Computer Network Security Theory and Practice. Springer
  16. OpenCirrus (2017). Cloud Computing Challenges In 2017. [Online] Available from: http://www.opencirrus.org/cloud-computing-challenges-2017/
  17. CSA (2011). Security guidance for critical areas of focus in cloud computing V3.0. [Online] Available from: https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf
  18. OPC (2011). Fact Sheet: Introduction to Cloud Computing. [Online] Available from: https://www.priv.gc.ca/resource/fs-fi/02_05_d_51_cc_e.pdf
  19. Shah, H., Anandane, S. S., (2013), “Security Issues on Cloud Computing” International Journal of Computer Science and Information Security, Vol. 11, No. 8, pp. 25-33
  20. Hussain, S. A., Fatima, M., Atif, S., Imran, R., Raja, K. S., (2017). “Multilevel classification of security concerns in Cloud Computing”, Applied Computing and Informatics, Vol. 13, pp. 57-65
  21. Mahmood, Z. (2011), “Data Location and Security Issues in Cloud Computing” International Conference on Emerging Intelligent Data and Web Technologies, IEEE. Available from: http://ieeexplore.ieee.org/document/6076420/
  22. Raisian, K. and Yahaya, J. (2015), "Security Issues Model on Cloud Computing: A Case of Malaysia", International Journal of Advanced Computer Science and Applications, Vol. 6, No. 8, pp.216-223.
  23. Gray, D. (2014). Data ownership in the cloud. [Online]. Available from: http://dataconomy.com/2014/03/data-ownership-in-the-cloud/
  24. FileCloud, (2016). Data Ownership in the Cloud – How does it affect you? [Online]. Available from: https://www.getfilecloud.com/blog/2016/11/data-ownership-in-the-cloud-how-does-it-affect-you/#.WgG7_I-0Pct
  25. O’Reilly, J. (2017). 7 Ways to Secure Cloud Storage. [Online] Available from: https://www.networkcomputing.com/data-centers/7-ways-secure-cloud-storage/866645128
  26. Jain, R. (2013). Hadoop and HDFS for Beginners. [Online]. Available from: https://www.slideshare.net/rahuldausa/hadoop-hdfs-for-beginners
  27. Roshan, B. (2014). General Architecture of the Google File System. [Online]. Available from: http://programming-project.blogspot.com/2014/04/general-architecture-of-google-file.html
  28. Carson, C. (2016). How much data does Google store? [Online]. Available from: https://www.cirrusinsight.com/blog/much-data-google-store
  29. Strickland, J. (2017). How the Google File System Works. [Online]. Available from: http://computer.howstuffworks.com/internet/basics/google-file-system5.htm
  30. Techopedia, (2017). Google File System (GFS). [Online]. Available from: https://www.techopedia.com/definition/26906/google-file-system-gfs
  31. Roshan, B. (2014). General Architecture of the Google File System. [Online]. Available from: http://programming-project.blogspot.com/2014/04/general-architecture-of-google-file.html
  32. Natarajan, R. (2012). Apache Hadoop Fundamentals – HDFS and MapReduce Explained with a Diagram. [Online]. Available from: http://www.thegeekstuff.com/2012/01/hadoop-hdfs-mapreduce-intro/comment-page-1/
  33. Hadoop, (2013). HDFS Architecture Guide [Online]. Available from: https://hadoop.apache.org/docs/r1.2.1/hdfs_design.html
  34. DeZyre, (2016). Hadoop Architecture Explained – What it is and why it matters. [Online]. Available from:https://www.dezyre.com/article/hadoop-architecture-explained-what-it-is-and-why-it-matters/317
  35. BackBlaze, (2015a). Backblaze Open Sources Reed-Solomon Erasure Coding Source Code. [Online]. Available from: https://www.backblaze.com/blog/reed-solomon
  36. BackBlaze, (2015b). Backblaze Open Sources Reed-Solomon Erasure Coding Source Code. [Online]. Available from: https://www.backblaze.com/blog/vault-cloud-storage-architecture/
  37. BackBlaze, (2017). Cloud Storage that’s astonishingly easy and low-cost. [Online]. Available from: https://www.backblaze.com/
  38. Chou, Te-Shun (2013), "Security Threats on Cloud Computing Vulnerabilities", International Journal of Computer Science and Information Technology, Vol. 5, No. 3, pp. 79-88.
  39. Lee, P. (2012). Design Research: What is it? Why do it? [Online]. Available from: https://reboot.org/2012/02/19/design-research-what-is-it-and-why-do-it/
  40. Twum F., Hayfron-Acquah J. B, Morgan-Darko W., A Proposed Enhanced Transposition Cipher Algorithm Based on Rubik’s Cube Transformations, International Journal of Computer Applications, Vol. 182, No. 35, pp 18-26, January 2019.
  41. Twum, F., Hayfron-Acquah J. B., Oblitey W. W., Morgan-Darko W., Reed-Solomon Encoding: Simplified for Programmers, International Journal of Computer Science and Information Security, Vol 14, No. 11, November 2016
  42. Twum F., Hayfron-Acquah J. B., Oblitey W. W., Boadi R. K., A proposed algorithm for generating the Reed-Solomon Encoding Polynomial Coefficeints over GF(256) for RS[255,223]8,32, International Journal of Computer Applications, Vol. 156, No. 1, pp 24-39, December 2016.
  43. Twum, F., Hayfron-Acquah J. B., Oblitey W. W., Morgan-Darko W., Reed-Solomon Decoding Simplified for Programmers, International Journal of Computer Science and Information Security, Vol 15, No. 1, January 2017.
  44. Chima, R. (2016). Cloud Security – Who owns the data? [Online]. Available from: https://www.bbconsult.co.uk/blog/cloud-security-who-owns-the-data
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Erasure Coding Reed Solomon Coding Galois Field Theory Checksum Data Dispersal Technique Encryption Decryption Cloud Computing Framework