CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Enhancing Security of Cloud based File Sharing Systems using AES and Proxy-Transformation

by Abhishek Iche, Abhishek Mhamane, Ayan Shaikh, Mahesh Kadam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 30
Year of Publication: 2022
Authors: Abhishek Iche, Abhishek Mhamane, Ayan Shaikh, Mahesh Kadam
10.5120/ijca2022922281

Abhishek Iche, Abhishek Mhamane, Ayan Shaikh, Mahesh Kadam . Enhancing Security of Cloud based File Sharing Systems using AES and Proxy-Transformation. International Journal of Computer Applications. 184, 30 ( Oct 2022), 9-14. DOI=10.5120/ijca2022922281

@article{ 10.5120/ijca2022922281,
author = { Abhishek Iche, Abhishek Mhamane, Ayan Shaikh, Mahesh Kadam },
title = { Enhancing Security of Cloud based File Sharing Systems using AES and Proxy-Transformation },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2022 },
volume = { 184 },
number = { 30 },
month = { Oct },
year = { 2022 },
issn = { 0975-8887 },
pages = { 9-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number30/32502-2022922281/ },
doi = { 10.5120/ijca2022922281 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:22:46.364299+05:30
%A Abhishek Iche
%A Abhishek Mhamane
%A Ayan Shaikh
%A Mahesh Kadam
%T Enhancing Security of Cloud based File Sharing Systems using AES and Proxy-Transformation
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 30
%P 9-14
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing is one of the newest technologies in the era Cloud computing has become an extensively exploited research area in academic and industry. The security challenges related to cloud computing have been extensively studied. This review is aimed to highlight the existing research studies on cloud computing security, threats, and challenges and also proposed the security essentials for web-based applications. Cloud services are facing problems in providing security regarding data and file storage as well as sharing the files through cloud, securing the cloud from the threat actors causing external threats we are trying to address these issues to make reliable and secure file sharing and storage on cloud. We have developed file sharing system, security powered with AES encryption algorithm along with the Proxy Re-encryption (Proxy Transformation) to enhance the security on the cloud platform as well as while transferring the data.

References
  1. M. Malarvizhi, J. A. J. Sujana and T. Revathi, "Secure file sharing using cryptographic techniques in cloud," 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), 2014, pp. 1-6, doi: 10.1109/ICGCCEE.2014.6921421.
  2. B. Fuhry, L. Hirschoff, S. Koesnadi and F. Kerschbaum, "SeGShare: Secure Group File Sharing in the Cloud using Enclaves," 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2020, pp. 476-488, doi: 10.1109/DSN48063.2020.00061.
  3. S. Zhu, X. Yang and X. Wu, "Secure Cloud File System with Attribute Based Encryption," 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013, pp. 99-102, doi: 10.1109/INCoS.2013.22.
  4. R. Nivedhaa and J. J. Justus, "A Secure Erasure Cloud Storage System Using Advanced Encryption Standard Algorithm and Proxy Re-Encryption," 2018 International Conference on Communication and Signal Processing (ICCSP),2018, pp. 0755-0759, doi: 10.1109/ICCSP.2018.8524257.
  5. Armstrong Nhlabatsi, Jin B. Hong, Dong Seong Kim, Rachael Fernandez, Alaa Hussein, Noora Fetais, and Khaled M. Khan, “Threat-specific Security Risk Evaluation in the Cloud”, Oct 2018 IEEE Transactions on Cloud Computing, DOI 10.1109/TCC.2018.2883063
  6. BADER ALOUFFI, MUHAMMAD HASNAIN, ABDULLAH ALHARBI, WAEL ALOSAIMI, HASHEM ALYAMI AND MUHAMMAD AYAZ, “A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies”, IEEE Access Volume 9 2021 DOI:10.1109/ACCESS.2021.3073203
  7. Jianghong Wei, Wenfen Liu, Xuexian Hu, “Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption”, IEEE JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015
  8. HEQING SONG, JIFEI LI, AND HAOTENG LI,” A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption”, IEEE Access Volume 9 2021 DOI:10.1109/ACCESS.2021.3075340
  9. Kajal Rani, Raj Kumar Sagar, “Enhanced Data Storage Security in Cloud Environment using Encryption, Compression and Splitting technique”, IEEE 2017 2nd International Conference on Telecommunication and Networks (TEL-NET 2017)
  10. Khashan, "Secure Outsourcing and Sharing of Cloud Data Using a User-Side Encrypted File System," in IEEE Access, vol. 8, pp. 210855-210867, 2020.
  11. E. Chen, Y. Zhu, K. Liang and H. Yin, "Secure Remote Cloud File Sharing with Attribute-based Access Control and Performance Optimization," in IEEE Transactions on Cloud Computing.
  12. Bhagat and N. Rathee, "Addressing Techniques for Secure Data Sharing in Cloud," 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 2018.
  13. Jacob and V. R. Rekha, "Secured and reliable file sharing system with de-duplication using erasure correction code," 2017 International Conference on Networks & Advances in Computational Technologies (NetACT), 2017.
  14. X. Zhang, W. Guo, Z. Li, X. Zhao and X. Qin, "MLFS: A multiple layers shared file system for cloud computing," 2014 IEEE Globecom Workshops (GC Wkshps), 2014.
  15. L. Selvam and R. J. Arokia, "Secure Data Sharing of Personal Health Records in Cloud Using Fine-Grained and Enhanced Attribute-Based Encryption," 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT), 2018.
  16. K. M. Akhil, M. P. Kumar and B. R. Pushpa, "Enhanced cloud data security using AES algorithm," 2017 International Conference on Intelligent Computing and Control (I2C2), 2017.
  17. P. Zeng and K. R. Choo, "A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage," in IEEE Access, vol. 6.
  18. J. Wei, W. Liu and X. Hu, "Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption," in IEEE Transactions on Cloud Computing, vol. 6, no. 4, pp. 1136-1148, 1 Oct.-Dec. 2018
  19. M. Ali et al., "SeDaSC: Secure Data Sharing in Clouds," in IEEE Systems Journal, vol. 11, no. 2, pp. 395-404, June 2017.
  20. S. Zhang, S. Han, B. Zheng, K. Han and E. Pang, "Group Key Management Protocol for File Sharing on Cloud Storage," in IEEE Access, vol. 8.
  21. Research Clue. (2020). design and implementation of a cloud based file sharing system.[Accessed: 2022-3-30].
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Cloud Security File Sharing AES Proxy-Transformation