Abstract
Storing and accessing the information in the multi-cloud hosting environment becomes popular these days. It offers benefits like the assurance of data protection, preventing information corruption, unethical issues from vendors. In this paper, a hybrid approach with the multi-cloud hosting environment is designed and implemented for improved security and privacy of cloud data. The hybrid method consists of three modules (a) Byzantine protocol to tolerant security breaches to server failures cloud, which is independent. (b) DepSky architecture enhances the reliability and secrecy of data preserved in the cloud using encoding and decoding techniques (c) Shamir secret sharing procedure to improve trustiness & privacy of data storage without affecting the performance. The privacy and security issues of the hybrid approach are implemented and compared with the protocols like SAML with proxy re-encryption and Kerberos for different user service requests. The performance of the hybrid approach in terms of memory utilization, encryption/decryption time, total authentication time is improved compared to that of protocol environments SAML, SAML with proxy re-encryption and Kerberos. The results were encouraging in the Hybrid Approach in terms of encryption time/decryption time, Memory utilization and average precision values.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12065-020-00555-w/MediaObjects/12065_2020_555_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12065-020-00555-w/MediaObjects/12065_2020_555_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12065-020-00555-w/MediaObjects/12065_2020_555_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12065-020-00555-w/MediaObjects/12065_2020_555_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12065-020-00555-w/MediaObjects/12065_2020_555_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12065-020-00555-w/MediaObjects/12065_2020_555_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12065-020-00555-w/MediaObjects/12065_2020_555_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12065-020-00555-w/MediaObjects/12065_2020_555_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12065-020-00555-w/MediaObjects/12065_2020_555_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12065-020-00555-w/MediaObjects/12065_2020_555_Fig10_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12065-020-00555-w/MediaObjects/12065_2020_555_Fig11_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12065-020-00555-w/MediaObjects/12065_2020_555_Fig12_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12065-020-00555-w/MediaObjects/12065_2020_555_Fig13_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12065-020-00555-w/MediaObjects/12065_2020_555_Fig14_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12065-020-00555-w/MediaObjects/12065_2020_555_Fig15_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs12065-020-00555-w/MediaObjects/12065_2020_555_Fig16_HTML.png)
Similar content being viewed by others
References
Haqiq A, Talbi J (2020) A cloud broker architecture for cloud service selection based on multi-criteria decision making and rough set theory. Int J Comput Aided Eng Technol 13(4):448
Software Development Company USA [Internet]. Simform. 2020 (cited 27 May 2020). http://www.simform.com/
Nandhini M, Madhavi S (2019) Provisioning of data security for file transformation on multi-cloud storage. Bonfring Int J Softw Eng Soft Comput 9(1):15–16
Miyachi C (2018) What is “Cloud”? It is time to update the NIST definition? IEEE Cloud Comput 5(3):6–11
ResearchGate | Find and share research [Internet]. ResearchGate. 2020 (cited 27 May 2020). https://www.researchgate.net/
AlZain M, Soh B, Pardede E (2012) A new model to ensure security in cloud computing services. J Serv Sci Res 4(1):49–70
Viswanath G, Krishna P (2020) Hybrid encryption framework for securing big data storage in a multi-cloud environment. Evol Intell 2020:1–8
Kritikos K, Zeginis C, Iranzo J, Gonzalez R, Seybold D, Griesinger F et al (2019) Multi-cloud provisioning of business processes. J Cloud Comput 8(1):1–29
Journal of Cloud Computing [Internet]. Journal of Cloud Computing. 2020 (cited 28 May 2020). https://journalofcloudcomputing.springeropen.com/
Colombo M, Asal R, Hieu Q, Ali El-Moussa F, Sajjad A, Dimitrakos T (2009) Data protection as a service in the multi-cloud environment. In: 2019 IEEE 12th international conference on cloud computing [CLOUD]
Megouache L, Zitouni A, Djoudi M (2020) Ensuring user authentication and data integrity in multi-cloud environment. Hum Centric Comput Inf Sci 10(1):1–20
Agudo I, Nuñez D, Giammatteo G, Rizomiliotis P, Lambrinoudakis C (2011) Cryptography goes to the cloud. Commun Comput Inf Sci 201:190–197
Cheng H, Qian M, Yu S (2017) Securing cloud data using a pirate scheme. Chin J Electron 26(6):1289–1296
Kanna GP, Vasudevan V (2017) A new approach in multi cloud environment to improve data security. In: 2017 international conference on next generation computing and information systems [ICNGCIS], Jammu, 2017, pp 7–12, https://doi.org/10.1109/icngcis.2017.23
AlZain M, Li A, Soh B, Pardede E (2016) Multi-cloud data management using Shamir’s secret sharing and quantum byzantine agreement schemes. In: Web-based services, pp 1205–1222
Witti H, Ghedira-Guegan C, Disson E, Boukadi K (2016) Security governance in multi-cloud environment: a systematic map** study. In: 2016 IEEE world congress on services [SERVICES], San Francisco, CA, 2016, pp. 81–86, doi:10.1109/SERVICES.2016.17
Pawar P, Sajjad A, Dimitrakos T, Chadwick D (2015) Security-as-a-service in multi-cloud and federated cloud environments. In: Trust management IX, pp 251–261
Bedi R, Singh J, Gupta S (2018) MWC: an efficient and secure multi-cloud storage approach to leverage augmentation of multi-cloud storage services on mobile devices using fog computing. J Supercomput 75(6):3264–3287
Chai H, Zhao W (2012) Byzantine fault tolerance as a service. communications in computer and information. Science 173–179
Tabrizchi H, Kuchaki Rafsanjani M (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput. 76:9493–9532
Petcu D (2014) Consuming resources and services from multiple clouds. J Grid Comput 12(2):321–345
Vaidya N (2014) Iterative byzantine vector consensus in incomplete graphs. In: Distributed computing and networking, pp 14–28
[Internet]. 2020 [cited 30 May 2020]. http://www.ijcsmr.org/
Bessani A, Correia M, Quaresma B, André F, Sousa P (2013) DepSky. ACM Trans Storage 9(4):1–33
Jogdand R, Goudar R, Sayed G, Dhamanekar P (2013) Enabling public verifiability and availability for secure data storage in cloud computing. Evolving Systems. 6(1):55–65
Peng Y, Zhao W, **e F, Dai Z, Gao Y, Chen D (2012) Secure cloud storage based on cryptographic techniques. J China Univ Posts Telecommun 19:182–189
Chai H, Zhao W (2012) Byzantine fault tolerance as a service. Commun Comput Inf Sci 2012:173–179
Gao W, Wang G, Chen K, Wang X (2017) Efficient identity-based threshold decryption scheme from bilinear pairings. Front Comput Sci 12(1):177–189
Celesti A, Galletta A, Fazio M, Villari M (2019) Towards hybrid multi-cloud storage systems: understanding how to perform data transfer. Big Data Res 16:1–17
Sharma S, Singla K, Rathee G, Saini H (2019) A hybrid cryptographic technique for file storage mechanism over cloud. In: First international conference on sustainable technologies for computational intelligence, pp 241–256
Muhil M, Krishna U, Kumar R, Anita E (2015) Securing multi-cloud using secret sharing algorithm. Procedia Comput Sci 50:421–426
Singh P, Raman B, Misra M (2017) Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system. Multimed Tools Appl 77(10):12581–12605
Althamary I, Alkharobi T (2016) Secure file sharing in multi-clouds using Shamir’s secret sharing scheme. Trans Netw Commun 4(6):43
Pundkar SN, Shekokar N (2016) Cloud computing security in multi-clouds using Shamir’s secret sharing scheme. Int J Comput Appl 155(13):1–2
Ermakova T, Fabian B (2013) Secret sharing for health data in multi-provider clouds. In: 2013 IEEE 15th conference on business informatics
Naik N, Jenkins P (2017) Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect. In: 2017 11th international conference on research challenges in information science [RCIS]
Sutradhar M, Sultana N, Dey H, Arif H (2018) A new version of kerberos authentication protocol using ECC and threshold cryptography for cloud security. In: 2018 Joint 7th international conference on informatics, electronics & vision [ICIEV] and 2018 2nd international conference on imaging, vision & pattern recognition [icIVPR]
Welcome to the home page of the Cyber-Physical Systems Virtual Organization | CPS-VO [Internet]. Cps-vo.org. 2020 [cited 28 May 2020]. https://cps-vo.org/
Dey H, Islam R, Arif H (2019) An integrated model to make cloud authentication and multi-tenancy more secure. In: 2019 International conference on robotics, electrical and signal processing techniques [ICREST]
Villari M, Tusa F, Celesti A, Puliafito A (2012) How to Federate VISION clouds through SAML/Shibboleth authentication. In: Service-oriented and cloud computing, pp 259–274
Linknovate | Your discovery engine [Internet]. Linknovate.com. 2020 (cited 28 May 2020). http://www.linknovate.com/
Bessani A, Correia M, Quaresma B, André F, Sousa P (2020) DepSky
UK Essays | UKEssays [Internet]. UKEssays.com. 2020 (cited 27 May 2020). https://www.ukessays.com/
Feng K, Zhang J (2017) Improving availability and confidentiality of shared data under the multi-cloud environment. In: Proceedings of the 2017 IEEE 2nd international conference on cloud computing and big data analysis (ICCCBDA), Chengdu, China, 28–30 April, pp 6–10. https://doi.org/10.1109/ICCCBDA.2017.7951875
Kazim M, Liu L, Zhu S (2018) A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access 6:58619–58633
Kang H (2017) Security model of secure cloud computing services. J Secur Eng 14(6):419–428
Distributed Systems Group [Internet]. Gsd.inesc-id.pt. 2020 (cited 28 May 2020). https://www.gsd.inesc-id.pt/
Home-Springer [Internet]. Link.springer.com. 2020 (cited 28 May 2020). https://springer.longhoe.net/
Bessani A, Correia M, Quaresma B, André F, Sousa P (2011) DepSky. In: Proceedings of the sixth conference on computer systems-EuroSys’11
University H, Geneva U, Technology S, Linz U (2020) Secure and trust computing, data management, and applications |SpringerLink [Internet]. Link.springer.com. 2020 (cited 9 June 2020). https://springer.longhoe.net/book/10.1007/978-3-642-22365-5
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Pachala, S., Rupa, C. & Sumalatha, L. An improved security and privacy management system for data in multi-cloud environments using a hybrid approach. Evol. Intel. 14, 1117–1133 (2021). https://doi.org/10.1007/s12065-020-00555-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12065-020-00555-w