Design and Implementation of a Secure Multi-cloud Data Storage System
Chapter One
Researchย Objectives
General Objective
The general objective of this study was to investigate a multi-cloud data storage security system that addresses performance, security, and reliability challenges within the cloud computing domain. The study aimed to design a model for securely storing data across multiple cloud environments.
Specific Objectives
The specific objectives of this study were:
- To explore various approaches to secure and robust data storage in multi-cloud environments.
2. To propose a controlled approach to mitigate security issues faced by end users of cloud services.
3. To design a multi-cloud data storage model that enables organizations to securely encrypt and distribute their data across multiple cloud providers.
- To evaluate the effectiveness of the multi-cloud storage model in enhancing data security, reliability, and performance in cloud computing.
CHAPTER TWO
LITERATUREย REVIEW
ย Introduction.
In this chapter, the research focuses on theoretical framework, existing theories relating to the impact of employing various data storage systems towards robust data storage in wireless sensor networks. The research will mainly focus on Cloud data storage.
Wirelessย Sensorย Network
A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions. A WSN system incorporates a gateway that provides wireless connectivity back to the wired world and distributed nodes.
Most of the research done in the field of wireless sensor networks focused in-network support and disregard the backend that has to deal with the immense storing and processingย requirements.
This section shows that although there are studies involving the integration of WSN with the Cloud, transparent integration with heterogeneous Cloud computing systems is still a recent topic.
Advertisements
Wireless sensor networks are becoming increasingly common and we believe they are an important part of the future of machine-to-machine communication and the Internet of Things.(Wan & Zou, 2013)
Nowadays, acquiring the required infrastructure and programming the backend to deal with all the requisites of a WSN is a cumbersome task at best. (Conzon &Brizzi, 2015)
The best way of implementing the backend is to take advantage of the emerging Cloud Computing paradigm. The future state described as the Internet of Things will become a reality providedย byย theย proliferationย ofย WSN.ย Forย thatย end,ย perhapsย theย most importantย partย ofย WSN,ย the backend, needs to be seriously addressed. In the next section, we detail the architecture for our proposed cloud middleware solution that will tackle this issue. . (Wan &Zou, 2013)
Experience on building applications is showing several common properties of wireless sensor networks.
First, with a range of only a few hundred feet at most, sensors often use multi-hop communication; i.e., they relay data through neighboring nodes to the base station.
Second, battery is generally the only source of energy, and it is not feasible to re- place batteries in most sensor deployments. Therefore, it is necessary to minimize energy consumption in order to maximize sensorsโ lifetime.
Third, although communication, processing, and sensing, all consume energy, communication is the single most expensive operation. (Younis et al 2006)
A key shortcoming of current research efforts is a lack of consideration of the WSN backend. Since the nodes of a sensor network have very limited storage and processing capabilities, sensor networks rarely, if ever, operate in isolation and are usually connected to a backend modeling infrastructure. (Lee& Murray, 2010).
CHAPTERย THREE
RESEARCHย METHODOLOGY
ย Introduction.
Thisย chapterย presentsย aย detailedย descriptionย ofย theย methodologyย toย beย employedย inย theย study.ย The studyย proposesย toย addressย theย vulnerabilitiesย ofย cloudย dataย byย deployingย aย dataย encryptionย model. This model has encryption/decryption service that can be employed either locally or remotely according to level of severity of the data. This model shall remove the burden of key management and maintained from data owners.
Researchย Design.
According to Donald (2006), a research design is a structure of the research that holds together all the elements of a research project. The studyย will adopt a quasi-experimental nonrandomized controlย pretest-posttestย quantitativeย researchย methodย isย used.ย Itย isย aย quasi-experimentalย processย as the nature of cloud storage means the devices are connected to the Internet to gather data and establish the circumstances for review, which can lead to changes to the devices outside the scope of the experiment. The proposed framework shall ensure that outsourced data can only be accessed (decrypted) byย authorized users, and during the whole process cloud server is unable to learn any useful information that can lead to a potential privacy breach. To achieve the privacyย of these components, our scheme processes the data in three fundamental steps: dataย outsourcing, file access and revocation.
Sampleย population
In quantitative research methodology, a data sample is a setoff data allowed and/ or selected from a statistical population by a defined procedure .Nubisave is freely available space controllerย 22forย RAIDย orย evenย optimalย cloudsย whichย makeย dispersion,ย thisย makesย dataย secure beyond encryption and made inaccessible in its entirely to the individual storage providers.
Nubisaveย wasย usedย asย theย sourceย ofย dataย sinceย itย freelyย providesย spaceย thatย securelyย stores data beyond encryption (Ilaghi Hosseini, (2015).
Inย thisย researchย theย populationย consistedย ofย sixtyย dataย storageย providersย thatย wereย extractedย from sixtyย storage systems. The population was then clustered into five cloud storages containingย ten cryptographic techniques representing five of the several cloud storages. the five cloud storages used are; Dropbox, SugarSync, Amazon S3, Google storage and T-online media center.
CHAPTERย FOUR
EXPERIMENT,ย RESULTSย ANDย DISCUSSION
ย Introduction
This chapter discusses the conducted experiment that was involved in designing an effective model that ensures security of data in the cloud. This effective way involved combining AES and Blowfish which increases the run time for both encryption and decryption. This means that the total time required for hybrid algorithms will be the addition of both algorithmsโ run time (processing time).Blowfish requires less time as compared to other algorithms. It also adds the additional processing time thus enhancing the security. This section gives the collected filtered data from the experiment which was then analyzed using graphs and discussed in order to understand the observed outcome.
CHAPTERย FIVE:ย
CONCLUSIONSย ANDย FUTUREย WORK
ย Conclusion
When the clients store data in the cloud, thereโs always an issue whether or not cloud service provider stores the data securely. Security as earlier discussed is the main challenge faced while storing data in the cloud, the proposed system provides security for the data stored in the cloud computing model through the help of AES and Blowfish algorithms.
Results show that AES is the best symmetric encryption algorithm, itโs more secure than Blowfish though compared to other algorithms Blowfish is by far the best. Blowfish gives the highestย throughputย asย comparedย toย AES.ย Theย hybridย ofย AESย andย Blowfishย givesย theย propertiesย of both algorithms thus making the formed hybrid algorithm much stronger to threats. This makes the formed hybrid system secure by increasingly adding the complexity functionalities.
Recommendationsย forย Futureย Work
Theย futureย scopeย ofย thisย work canย beย extended by:
Performing the same experiments using audio and video as well. Compressionย algorithmย canย beย performedย forย fasterย encryption.
Performingย the sameย experiments usingย someย lockingย techniques forย securityย mechanism
REFERENCES
- Gubbi,ย J.,ย Buyya,ย R.,ย Marusic,ย S.,ย &Palaniswami,ย M.ย (2013).Internetย ofย Thingsย (IoT):ย Aย vision, architectural elements, and future directions. Future Generation ComputerSystems, 29(7), 1645-1660.
- Friess,ย P.ย (2013).ย Internetย ofย things:ย convergingย technologiesย forย smartย environments andintegrated ecosystems. River Publishers.
- Suciu,ย G.,ย Vulpe,ย A.,ย Halunga,ย S.,ย Fratu,ย O.,ย Todoran,ย G.,ย &Suciu,ย V.ย (2013,ย May).ย Smartย cities built on resilient cloud computing and secure internet of things. In 2013 19thInternational Conference on Control Systems and Computer Science (pp. 513-518).IEEE.
- Buyya,ย R.,ย Ranjan,ย R.,ย &Calheiros,ย R.ย N.ย (2010,ย May).Intercloud:ย Utility-orientedย federation of cloud computing environments for scaling of application services. In International Conference on Algorithms and Architectures for Parallel Processing (pp.13-31).Springer Berlin Heidelberg.
- Birk, D., & Wegener, C. (2011, May).Technical issues of forensic investigations in cloud computingย environments.ย Inย Systematicย Approachesย toย Digitalย Forensicย Engineering(SADFE), 2011 IEEE Sixth International Workshop on (pp. 1-10). IEEE.
- Wu,ย J.,ย Ping,ย L.,ย Ge,ย X.,ย Wang,ย Y.,ย &ย Fu,ย J.ย (2010,ย June).ย Cloudย storageย asย theย infrastructure of cloud computing. In Intelligent Computing and Cognitive Informatics(ICICCI), 2010 International Conference on (pp. 380-383). IEEE.
- Damgard, I., Jakobsen, T. P., Nielsen, J. B., & Pagter, J. I. (2013, December). Secure key management in the cloud. In IMA International Conference on Cryptography and Coding (pp. 270-289).Springer Berlin Heidelberg.
