A reliable data protection model based on re-encryption concepts in cloud environments

The rapid growth of using cloud-based services in recent years is an undeniable fact as it has increased the efficiency in accessing shared pools of configurable computing resources. However, there are serious concerns about the reliability of this emerging technology and it is anticipated that clou...

Full description

Saved in:
Bibliographic Details
Main Authors: Moghaddam, F. F., Vala, M., Ahmadi, M., Khodadadi, T., Madadipouya, K.
Format: Conference or Workshop Item
Published: Institute of Electrical and Electronics Engineers Inc. 2016
Subjects:
Online Access:http://eprints.utm.my/id/eprint/73389/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964459830&doi=10.1109%2fICSGRC.2015.7412456&partnerID=40&md5=8a13ba413f856474d8b143be30be99b6
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The rapid growth of using cloud-based services in recent years is an undeniable fact as it has increased the efficiency in accessing shared pools of configurable computing resources. However, there are serious concerns about the reliability of this emerging technology and it is anticipated that cloud computing security concerns will be the most important and challenging issue in IT industry. Accordingly, a hybrid re-encryption model has been presented in this paper to ensure data security in cloud computing environments based on the concepts of index classification, time-based procedures, and attributes. Accordingly, data are classified to four main rings based on their attributes. Furthermore, a hybrid ring was established to provide a secure connection between rings by dual encryption process. This is regarding the characteristics of source and destination rings. Protected rings perform the re-encryption process according to four main parameters: time-based, un-authorized authentication, user revocation, and data owner request. In addition, the functionality, security, and scalability of the suggested model were examined by a simulation analysis to find out the strengths of this re-encryption model in comparison with current models. The analysis results show that this model has met defined demands of this research to enhance the reliability and efficiency of data protection in cloud computing environments.