Title :
Safe haven in the cloud: Secure access controlled file encryption (SAFE) system
Author :
Shahzad, Farrukh
Author_Institution :
Inf. & Comput. Sci, King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia
Abstract :
The evolution of cloud computing has revolutionized how the computing is abstracted and utilized on remote third party infrastructure. It is now feasible to try out novel ideas over the cloud with no or very low initial cost. There are challenges in adopting cloud computing; but with obstacles, we have opportunities for research in several aspects of cloud computing. One of the main issue is the data security and privacy of information stored and processed at cloud provider´s systems. In this work, a practical system (called SAFE) is designed and implemented to securely store/retrieve user´s files on the third party cloud storage systems using well established cryptographic techniques. It utilizes the client-side, multilevel, symmetric/asymmetric encryption and decryption operations to provide policy-based access control and assured deletion of remotely hosted client´s files. The SAFE is a generic application which can be extended to support any cloud storage provider as long as there is an API which support basic file upload and download operations.
Keywords :
application program interfaces; authorisation; client-server systems; cloud computing; computer network security; cryptography; data privacy; outsourcing; API; SAFE system; client-side-multilevel asymmetric encryption operation; client-side-multilevel symmetric encryption operation; client-side-multilevel-asymmetric decryption operation; client-side-multilevel-symmetric decryption operation; cloud computing; cloud provider systems; cloud storage provider; cryptographic techniques; data security; file download operation; file upload operation; information privacy; policy-based access control; remote third-party infrastructure; remotely hosted client file deletion; secure access controlled file encryption system; third-party cloud storage systems; user file retrieval; user file storage; Access control; Cloud computing; Encryption; Java; Servers; Access control; Assured deletion; Cloud computing; Cryptography; Data privacy; Encryption; Secure storage;
Conference_Titel :
Science and Information Conference (SAI), 2015
Conference_Location :
London
DOI :
10.1109/SAI.2015.7237315