DocumentCode :
3585969
Title :
A 3-level re-encryption model to ensure data protection in cloud computing environments
Author :
Ahmadi, Mohammad ; Fatemi Moghaddam, Faraz ; Jam, Amid Jamshidi ; Gholizadeh, Somayyeh ; Eslami, Mohammad
Author_Institution :
Fac. of Comput., Asia Pacific Univ., Kuala Lumpur, Malaysia
fYear :
2014
Firstpage :
36
Lastpage :
40
Abstract :
Ensuring about the security and privacy of stored data in cloud servers is one of the most challenging issues that decrease the rate of reliability in cloud computing environments. Applying cryptography algorithms is the most common solution to enhance the reliability of cloud servers and to protect resources from possible attacks and un-predictable events. However, the security of this type of protection is affected when some users are revoked by data owner from accessing to data. Hence, an efficient and reliable re-encryption model based on multi-level cryptography has been introduced in this paper to prevent un-authorized accesses from revoked users to cloud-based resources. The main aim of the proposed model is to classify data to several levels for managing the process of re-encryption more efficient and reliable. Therefore, 3 levels of security have been defined to carry out this classification according to the security characteristics of stored data: Time-Based Level, High Risk Level, and Custom Level. The presented model has been evaluated according to three parameters: performance, security, and scalability. The evaluation process was done by establishing a simulated environment to investigate functionality of re-encryption procedure in each level of security. Functionality and security analysis of this model shows that, the reliability and efficiency of data protection process in cloud computing environments is improved considerably by using 3-level re-encryption model.
Keywords :
authorisation; cloud computing; cryptography; data privacy; 3-level reencryption model; cloud computing; cloud server; cloud-based resources; cryptography algorithm; custom level; data privacy; data protection; data security; high risk level; multilevel cryptography; security characteristic; time-based level; Cloud computing; Computational modeling; Data models; Encryption; Reliability; Servers; Cloud Computing; Cryptography; Data Classification; Re-Encryption; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Systems, Process and Control (ICSPC), 2014 IEEE Conference on
Print_ISBN :
978-1-4799-6105-4
Type :
conf
DOI :
10.1109/SPC.2014.7086226
Filename :
7086226
Link To Document :
بازگشت