• Jun 13, 2017 News!The submission for 2018 7th International Conference on Information and Electronics Engineering (ICIEE 2018) is officially open now !   [Click]
  • Jul 28, 2017 News!IJIEE Vol. 7, No. 4 issue has been published online!   [Click]
  • Jun 28, 2017 News!Papers published in Vol.7, No.1 have all received dois from Crossref.
General Information
Editor-in-chief

 
Faculty of Science, University of Brunei Darussalam, Brunei Darussalam   
" It is a great honor to serve as the editor-in-chief of IJIEE. I'll work together with the editorial team. Hopefully, IJIEE will be recognized among the readers in the related field."
IJIEE 2013 Vol.3(6): 581-583 ISSN: 2010-3719
DOI: 10.7763/IJIEE.2013.V3.383

A Mutual Approach to Reduce Cost and Enhance the Security from Client Side to Cloud Storage Side

Dheeraj Kumar, Parikshit Prasad, Preetish Ranjan, and Abhishek Vaish
Abstract— This paper focuses on data leakage problem and its security in cloud storage technology. It has been seen that there are still some vulnerabilities in cloud storage which may results to compromise of C.I.A. This paper brings out, works on two phase of work to avoid data leakage problem, first phase is from client side and second phase is done by cloud provider side. The data which is stored by client in cloud storage application have different C.I.A. Some of them are Sensitive Having high confidentiality rating, some of them are least confidential but some of them have no confidentiality issue, which can have public access but require more integrity. In such situation, the data stored in cloud database with equal priority is not feasible. This paper has given a concept to store the data in database after prioritizing and then encrypting from client side itself. Before Uploading on cloud side, the client is required to mention criticality of that data. After Information declaration a matrix is prepared on basis of CIA analysis of data as desired by user which elaborates the criticality of data. Criticality is estimated on the basis of C.I.A. Confidentiality, Integrity and Availability. Based on sensitivity, data will be encrypted and access control list will be defined.. The second phase removes the problem of file access by another user who wants to access, as it is encrypted by client (owner). The proposed model addresses for reliability in storage systems (where the key component under investigation is to maintain the C.I.A.). Our observations and techniques are instrumental for a wide spectrum of systems, ranging from distributed storage systems for the enterprise to cloud data services.

Index Terms— Cloud security, data protection, cost reduction, data storage, C.I.A.

Dheeraj Kumar, Parikshit Prasad, Preetish Ranjan, and Abhishek Vaish are with the Dept. of Cyber Law Information Security Indian Institute of Information Technology, Allahabad, India (e-mail: {dheerajsrivastava12, chaurasiast, mail.preetishranjan}@gmail.com, abhishek@iiita.ac.in).

[PDF]

Cite: Dheeraj Kumar, Parikshit Prasad, Preetish Ranjan, and Abhishek Vaish, " A Mutual Approach to Reduce Cost and Enhance the Security from Client Side to Cloud Storage Side," International Journal of Information and Electronics Engineering vol. 3, no. 6, pp. 581-583, 2013.

Copyright © 2008-2017. International Journal of Information and Electronics Engineering. All rights reserved.
E-mail: ijiee@ejournal.net