Skip to main content

Distributed Multi Cloud Storage System to Improve Data Security with Hybrid Encryption

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1072))

Abstract

Data security of cloud storage is one of the major concerns right now. Usually, cloud storage providers store user data in a single location to achieve better maintainability. Beside some advantages, this approach has drawbacks also. The government of the country can legally order the cloud storage provider to let them access their stored data and in such situation, a user who is from another part of the world can not stop the provider. In a system it is very likely to have system vulnerability and the hacker is going to take its advantages as soon as he discovers it. The storage design approach described in this paper aimed to reduce the unauthorized access to end-user data. Our goal is to design a storage system which is a combination of some major cloud storage service providers. Our experimental results indicate that proposed approach provided the end user better control on his data in cloud storage with minimum cost and performance effect. Our system ensures user data privacy from anyone including government or cloud service provider itself.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Darrell, L.: Unlimited cloud storage at Amazon.com, inc on black Friday. http://www.bidnessetc.com/58232-unlimited-cloud-storage-at-amazoncominc-on-black-friday

  2. Howley, D.: Is Microsoft’s onedrive the best cloud storage service. https://www.yahoo.com/tech/microsoft-killsunlimited-onedrive-accounts-1759 27221

  3. Gai, K., Li, S.: Towards cloud computing: a literature review on cloud computing and its development trends. In: 2012 Fourth International Conference on Multimedia Information Networking and Security (MINES), pp. 142–146. IEEE (2012)

    Google Scholar 

  4. Qiu, M., Li, H., Sha, E.H.-M.: Heterogeneous real-time embedded software optimization considering hardware platform. In: Proceedings of the 2009 ACM Symposium on Applied Computing, pp. 1637–1641. ACM (2009)

    Google Scholar 

  5. Qiu, M., Sha, E.H.-M., Liu, M., Lin, M., Hua, S., Yang, L.T.: Energy minimization with loop fusion and multi-functional-unit scheduling for multidimensional DSP. J. Parallel Distrib. Comput. 68(4), 443–455 (2008)

    Article  Google Scholar 

  6. Gai, K., Steenkamp, A.: A feasibility study of platform-as-a-service using cloud computing for a global service organization. J. Inf. Syst. Appl. Res. 7(3), 28 (2014)

    Google Scholar 

  7. Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W.: Toward secure and dependable storage services in cloud computing. IEEE Trans. Serv. Comput. 5(2), 220–232 (2012)

    Article  Google Scholar 

  8. Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Article  MathSciNet  Google Scholar 

  9. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: European Symposium on Research in Computer Security, pp. 355–370 (2009)

    Chapter  Google Scholar 

  10. Hur, J.: Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 25(10), 2271–2282 (2013)

    Article  Google Scholar 

  11. Mohamed, E.M., Abdelkader, H.S., El-Etriby, S.: Enhanced data security model for cloud computing. In: 2012 8th International Conference on Informatics and Systems (INFOS), p. 12. IEEE (2012)

    Google Scholar 

  12. Dubey, A.K., Dubey, A.K., Namdev, M., Shrivastava, S.S.: Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in Java environment. In: 2012 CSI Sixth International Conference on Software Engineering (CONSEG), pp. 1–8. IEEE (2012)

    Google Scholar 

  13. Tian, H., Chen, Y., Chang, C.-C., Jiang, H., Huang, Y., Chen, Y., Liu, J.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10, 701–714 (2015)

    Article  Google Scholar 

  14. Abed, D.F.S.: A proposed method of information hiding based on hybrid cryptography and steganography. Int. J. Appl. Innov. Eng. Manag. 2(4) (2013)

    Google Scholar 

  15. Gai, K., Qiu, M., Zhao, H.: Security-aware efficient mass distributed storage approach for cloud systems in big data. In: IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), pp. 140–145. IEEE (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Shamsul Arefin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zaman, S.U., Karim, R., Arefin, M.S., Morimoto, Y. (2020). Distributed Multi Cloud Storage System to Improve Data Security with Hybrid Encryption. In: Vasant, P., Zelinka, I., Weber, GW. (eds) Intelligent Computing and Optimization. ICO 2019. Advances in Intelligent Systems and Computing, vol 1072. Springer, Cham. https://doi.org/10.1007/978-3-030-33585-4_6

Download citation

Publish with us

Policies and ethics