Log in

An improved security and privacy management system for data in multi-cloud environments using a hybrid approach

  • Special Issue
  • Published:
Evolutionary Intelligence Aims and scope Submit manuscript

Abstract

Storing and accessing the information in the multi-cloud hosting environment becomes popular these days. It offers benefits like the assurance of data protection, preventing information corruption, unethical issues from vendors. In this paper, a hybrid approach with the multi-cloud hosting environment is designed and implemented for improved security and privacy of cloud data. The hybrid method consists of three modules (a) Byzantine protocol to tolerant security breaches to server failures cloud, which is independent. (b) DepSky architecture enhances the reliability and secrecy of data preserved in the cloud using encoding and decoding techniques (c) Shamir secret sharing procedure to improve trustiness & privacy of data storage without affecting the performance. The privacy and security issues of the hybrid approach are implemented and compared with the protocols like SAML with proxy re-encryption and Kerberos for different user service requests. The performance of the hybrid approach in terms of memory utilization, encryption/decryption time, total authentication time is improved compared to that of protocol environments SAML, SAML with proxy re-encryption and Kerberos. The results were encouraging in the Hybrid Approach in terms of encryption time/decryption time, Memory utilization and average precision values.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Canada)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Haqiq A, Talbi J (2020) A cloud broker architecture for cloud service selection based on multi-criteria decision making and rough set theory. Int J Comput Aided Eng Technol 13(4):448

    Article  Google Scholar 

  2. Software Development Company USA [Internet]. Simform. 2020 (cited 27 May 2020). http://www.simform.com/

  3. Nandhini M, Madhavi S (2019) Provisioning of data security for file transformation on multi-cloud storage. Bonfring Int J Softw Eng Soft Comput 9(1):15–16

    Article  Google Scholar 

  4. Miyachi C (2018) What is “Cloud”? It is time to update the NIST definition? IEEE Cloud Comput 5(3):6–11

    Article  Google Scholar 

  5. ResearchGate | Find and share research [Internet]. ResearchGate. 2020 (cited 27 May 2020). https://www.researchgate.net/

  6. AlZain M, Soh B, Pardede E (2012) A new model to ensure security in cloud computing services. J Serv Sci Res 4(1):49–70

    Article  Google Scholar 

  7. Viswanath G, Krishna P (2020) Hybrid encryption framework for securing big data storage in a multi-cloud environment. Evol Intell 2020:1–8

    Google Scholar 

  8. Kritikos K, Zeginis C, Iranzo J, Gonzalez R, Seybold D, Griesinger F et al (2019) Multi-cloud provisioning of business processes. J Cloud Comput 8(1):1–29

    Article  Google Scholar 

  9. Journal of Cloud Computing [Internet]. Journal of Cloud Computing. 2020 (cited 28 May 2020). https://journalofcloudcomputing.springeropen.com/

  10. Colombo M, Asal R, Hieu Q, Ali El-Moussa F, Sajjad A, Dimitrakos T (2009) Data protection as a service in the multi-cloud environment. In: 2019 IEEE 12th international conference on cloud computing [CLOUD]

  11. Megouache L, Zitouni A, Djoudi M (2020) Ensuring user authentication and data integrity in multi-cloud environment. Hum Centric Comput Inf Sci 10(1):1–20

    Article  Google Scholar 

  12. Agudo I, Nuñez D, Giammatteo G, Rizomiliotis P, Lambrinoudakis C (2011) Cryptography goes to the cloud. Commun Comput Inf Sci 201:190–197

    Google Scholar 

  13. Cheng H, Qian M, Yu S (2017) Securing cloud data using a pirate scheme. Chin J Electron 26(6):1289–1296

    Article  Google Scholar 

  14. Kanna GP, Vasudevan V (2017) A new approach in multi cloud environment to improve data security. In: 2017 international conference on next generation computing and information systems [ICNGCIS], Jammu, 2017, pp 7–12, https://doi.org/10.1109/icngcis.2017.23

  15. AlZain M, Li A, Soh B, Pardede E (2016) Multi-cloud data management using Shamir’s secret sharing and quantum byzantine agreement schemes. In: Web-based services, pp 1205–1222

  16. Witti H, Ghedira-Guegan C, Disson E, Boukadi K (2016) Security governance in multi-cloud environment: a systematic map** study. In: 2016 IEEE world congress on services [SERVICES], San Francisco, CA, 2016, pp. 81–86, doi:10.1109/SERVICES.2016.17

  17. Pawar P, Sajjad A, Dimitrakos T, Chadwick D (2015) Security-as-a-service in multi-cloud and federated cloud environments. In: Trust management IX, pp 251–261

  18. Bedi R, Singh J, Gupta S (2018) MWC: an efficient and secure multi-cloud storage approach to leverage augmentation of multi-cloud storage services on mobile devices using fog computing. J Supercomput 75(6):3264–3287

    Article  Google Scholar 

  19. Chai H, Zhao W (2012) Byzantine fault tolerance as a service. communications in computer and information. Science 173–179

  20. Tabrizchi H, Kuchaki Rafsanjani M (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput. 76:9493–9532

    Article  Google Scholar 

  21. Petcu D (2014) Consuming resources and services from multiple clouds. J Grid Comput 12(2):321–345

    Article  Google Scholar 

  22. Vaidya N (2014) Iterative byzantine vector consensus in incomplete graphs. In: Distributed computing and networking, pp 14–28

  23. [Internet]. 2020 [cited 30 May 2020]. http://www.ijcsmr.org/

  24. Bessani A, Correia M, Quaresma B, André F, Sousa P (2013) DepSky. ACM Trans Storage 9(4):1–33

    Article  Google Scholar 

  25. Jogdand R, Goudar R, Sayed G, Dhamanekar P (2013) Enabling public verifiability and availability for secure data storage in cloud computing. Evolving Systems. 6(1):55–65

    Article  Google Scholar 

  26. Peng Y, Zhao W, **e F, Dai Z, Gao Y, Chen D (2012) Secure cloud storage based on cryptographic techniques. J China Univ Posts Telecommun 19:182–189

    Article  Google Scholar 

  27. Chai H, Zhao W (2012) Byzantine fault tolerance as a service. Commun Comput Inf Sci 2012:173–179

    Google Scholar 

  28. Gao W, Wang G, Chen K, Wang X (2017) Efficient identity-based threshold decryption scheme from bilinear pairings. Front Comput Sci 12(1):177–189

    Article  Google Scholar 

  29. Celesti A, Galletta A, Fazio M, Villari M (2019) Towards hybrid multi-cloud storage systems: understanding how to perform data transfer. Big Data Res 16:1–17

    Article  Google Scholar 

  30. Sharma S, Singla K, Rathee G, Saini H (2019) A hybrid cryptographic technique for file storage mechanism over cloud. In: First international conference on sustainable technologies for computational intelligence, pp 241–256

  31. Muhil M, Krishna U, Kumar R, Anita E (2015) Securing multi-cloud using secret sharing algorithm. Procedia Comput Sci 50:421–426

    Article  Google Scholar 

  32. Singh P, Raman B, Misra M (2017) Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system. Multimed Tools Appl 77(10):12581–12605

    Article  Google Scholar 

  33. Althamary I, Alkharobi T (2016) Secure file sharing in multi-clouds using Shamir’s secret sharing scheme. Trans Netw Commun 4(6):43

    Google Scholar 

  34. Pundkar SN, Shekokar N (2016) Cloud computing security in multi-clouds using Shamir’s secret sharing scheme. Int J Comput Appl 155(13):1–2

    Google Scholar 

  35. Ermakova T, Fabian B (2013) Secret sharing for health data in multi-provider clouds. In: 2013 IEEE 15th conference on business informatics

  36. Naik N, Jenkins P (2017) Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect. In: 2017 11th international conference on research challenges in information science [RCIS]

  37. Sutradhar M, Sultana N, Dey H, Arif H (2018) A new version of kerberos authentication protocol using ECC and threshold cryptography for cloud security. In: 2018 Joint 7th international conference on informatics, electronics & vision [ICIEV] and 2018 2nd international conference on imaging, vision & pattern recognition [icIVPR]

  38. Welcome to the home page of the Cyber-Physical Systems Virtual Organization | CPS-VO [Internet]. Cps-vo.org. 2020 [cited 28 May 2020]. https://cps-vo.org/

  39. Dey H, Islam R, Arif H (2019) An integrated model to make cloud authentication and multi-tenancy more secure. In: 2019 International conference on robotics, electrical and signal processing techniques [ICREST]

  40. Villari M, Tusa F, Celesti A, Puliafito A (2012) How to Federate VISION clouds through SAML/Shibboleth authentication. In: Service-oriented and cloud computing, pp 259–274

  41. Linknovate | Your discovery engine [Internet]. Linknovate.com. 2020 (cited 28 May 2020). http://www.linknovate.com/

  42. Bessani A, Correia M, Quaresma B, André F, Sousa P (2020) DepSky

  43. UK Essays | UKEssays [Internet]. UKEssays.com. 2020 (cited 27 May 2020). https://www.ukessays.com/

  44. Feng K, Zhang J (2017) Improving availability and confidentiality of shared data under the multi-cloud environment. In: Proceedings of the 2017 IEEE 2nd international conference on cloud computing and big data analysis (ICCCBDA), Chengdu, China, 28–30 April, pp 6–10. https://doi.org/10.1109/ICCCBDA.2017.7951875

  45. Kazim M, Liu L, Zhu S (2018) A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access 6:58619–58633

    Article  Google Scholar 

  46. Kang H (2017) Security model of secure cloud computing services. J Secur Eng 14(6):419–428

    Article  Google Scholar 

  47. Distributed Systems Group [Internet]. Gsd.inesc-id.pt. 2020 (cited 28 May 2020). https://www.gsd.inesc-id.pt/

  48. Home-Springer [Internet]. Link.springer.com. 2020 (cited 28 May 2020). https://springer.longhoe.net/

  49. Bessani A, Correia M, Quaresma B, André F, Sousa P (2011) DepSky. In: Proceedings of the sixth conference on computer systems-EuroSys’11

  50. University H, Geneva U, Technology S, Linz U (2020) Secure and trust computing, data management, and applications |SpringerLink [Internet]. Link.springer.com. 2020 (cited 9 June 2020). https://springer.longhoe.net/book/10.1007/978-3-642-22365-5

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sunitha Pachala.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pachala, S., Rupa, C. & Sumalatha, L. An improved security and privacy management system for data in multi-cloud environments using a hybrid approach. Evol. Intel. 14, 1117–1133 (2021). https://doi.org/10.1007/s12065-020-00555-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12065-020-00555-w

Keywords

Navigation