I.J. Information Engineering and Electronic Business, 2017, 1, 10-19
Published Online January 2017 in MECS (http://www.mecs-press.org/)
DOI: 10.5815/ijieeb.2017.01.02
Copyright © 2017 MECS I.J. Information Engineering and Electronic Business, 2017, 1, 10-19
Entity Based Distinctive Secure Storage and
Control Enhancement in Cloud
Divesh Kumar
Computer Science and Engineering Department, Eternal University, Himachal Pradesh, 173101 India
Email: diveshkumar16solan@gmail.com
Amit Sharma
Computer Science and Engineering Department, Eternal University, Himachal Pradesh, 173101 India
Email: er.amit016@gmail.com
Surjan Singh
Mathematics Department, Eternal University, Himachal Pradesh, 173101 India
Email: surjan.singhbhu@gmail.com
Abstract—Cloud computing acts as rising evolution in
Information Technology (IT), boosting the delivery of
services and eye-catching returns to its tenants enrolled at
low costs of per usage basis. Cloud computing means
“everywhere” and provides enormous available resources
via internet with ensured quality. With the numerous
profits involved, it clears the viewpoint of various
businesses to invest in cloud services for accomplishment
of their needs in the cloud habitat. Cloud enables
computing resources in a service oriented flair instead of
burden with lags in traditional setup of unified
architecture. With delivery of cloud services occur many
obstacles in the cloud to work securely without downfall
in its performance. Security has always emerged as a long
handed concern with its progression which affects its
virtuous implementation. We commence with aspect of
security based on parameters named Confidentiality (C),
Integrity (I) and Granular Access (GA) and then sent over
a secure channel via Secure File Transfer Protocol (SFTP)
for secure storage with Elliptic Curve Cryptography
(ECC) encryption laid on data. Secure Hash Algorithm
(SHA) is used for hash value generation maintaining
integrity. The authentication mechanism of secure
Graphical One Time Password (GOTPass) provides high
end to end security for retrieval process and boost
security appliance for data. Data is divided into three
security levels as per Secure Quality Index (SQI)
generated and storage is isolated to have different
security aspects. It provides supplemental controlled
security and data protection as associated with the file.
User is responsive to pass all security mechanisms to gain
access.
Index Terms—Encryption, Security, Access Control
I. INTRODUCTION
Cloud term means internet service facilities, deals with
non-local storage for user data on the basis of pay per use.
Cloud evolved with other services like computing with
different operating platforms, software, technology
infrastructure and storage online at the remote locations.
These combine to cater the demands of the users and are
effectively optimized to conserve costs. Therefore, it
provided more scalability and flexibility in terms of
resource availability and cost effectiveness on demand
basis rather than the traditionally used Information
Technology (IT) infrastructure. Cloud computing plays a
major role in the changed face of new technological
advancements. It increases the scope of improvement in
relation to nearly all fields of technology directly or
indirectly.
With the emerging technologies, users can access the
resources anytime, anywhere and anyplace giving high
degree of availability, as these are empowered with the
facilities of virtualization that can be used to store data,
provided with different platforms and run several
applications existing in the network only, i.e. no new
physical hardware or software requirements needed at the
user end and are vastly available [1]. There is an increase
in the number of organizations turning to cloud to
transform their business setup. A huge package of
combined connected networks, which is vastly spread
continuously provides remote access to vastly
decentralized IT resources. The remotely accessed
resources are in reach with much attained flexibility,
scalability and measured with their usage and control.
The user act as the main facilitator in terms of resources,
cloud provider act as secondary facilitator in terms of
profitability and has to manage the backbone of facilities.
Cloud providers might also be a third party which in
integration with the primary facility provider can balance
the load of different resource pooling for widely spread
users. It has a multi-tenant environment support and the
user’s demands are different as per their interest and need
to be catered in isolation from each other. This all
involves the overhead of various security vulnerabilities
which could occur as a distant gap for the entire cloud
environment.