Multilevel Cryptography with Metadata and Lock Approach for Storing Data in Cloud

Dinesha Hagare Annappaian, Vinod Kumar Agrawal
2014 Transactions on Networks and Communications  
Cryptography is a technique for secure communication. Cryptography main objectives are confidentiality, integrity, non-repudiation, availability and authentication. Cryptography is a well defined and used technique to secure sensitive data. It has been using in cloud computing technology by various cloud service provider. Customers across the world are looking for storage infrastructure to store huge amount of data securely. Hence they are opting on demand, ready available, internet based and
more » ... intenance free infrastructure known as cloud data storage as a service. Many potential vendors like Microsoft and Amazon providing this service to customer across the globe. But major challenge is customer trust on vendor. Vendor has to prove customer that their data is safe via cryptography, security breach penalty, policies and security agreement so on. However, it is difficult to gain customer confident on vendor security. Hence we are proposing customer end algorithm called multilevel cryptography for secure cloud data storage where customer performs multiple cryptography operations on their data before storing into a cloud. In this paper we present the multilevel cryptography algorithm for secure cloud data storage with design and analysis. Keywords: Cloud service provider, Data storage as a Service, Multilevel Cryptography, Secure Cloud Data, and Secure Communication. Public-Key is known to all, whereas Private-Key is known only to the user who is authenticated. Once the data is encrypted with the Public-Key, it is possible to decrypt with the corresponding Private-Key only. Eman M.Mohamed, Hatem S. Abdelkader [2] explain the data security system implemented into cloud computing using RC4, RC6, MARS, AES, DES, 3DES, Two-Fish and Blowfish algorithm. The security architecture of the system is designed by using DES cipher block chaining, which eliminates the fraud that occurs today with stolen data. Kan Yang, Xiaohua Jia [3] describes the multilevel encryption for Ensuring Public Cloud. This technique applies multiple encryption algorithms for given plaintext. Follow the same level of decryption to convert back from cipher text. Cong wang, Qian wang, and Kui ren, Wenjing Lou describes how to ensure the data storage security in cloud computing [4] . In Cryptography and Network Security Principles and Practices [5],
doi:10.14738/tnc.26.591 fatcat:2xbiprnadvfa7b2ooc3wo3oegq