A reliable data protection model based on re-encryption concepts in cloud environments

The rapid growth of using cloud-based services in recent years is an undeniable fact as it has increased the efficiency in accessing shared pools of configurable computing resources. However, there are serious concerns about the reliability of this emerging technology and it is anticipated that clou...

Full description

Saved in:
Bibliographic Details
Main Authors: Moghaddam, F. F., Vala, M., Ahmadi, M., Khodadadi, T., Madadipouya, K.
Format: Conference or Workshop Item
Published: Institute of Electrical and Electronics Engineers Inc. 2016
Subjects:
Online Access:http://eprints.utm.my/id/eprint/73389/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964459830&doi=10.1109%2fICSGRC.2015.7412456&partnerID=40&md5=8a13ba413f856474d8b143be30be99b6
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.73389
record_format eprints
spelling my.utm.733892017-11-21T08:17:10Z http://eprints.utm.my/id/eprint/73389/ A reliable data protection model based on re-encryption concepts in cloud environments Moghaddam, F. F. Vala, M. Ahmadi, M. Khodadadi, T. Madadipouya, K. T Technology (General) The rapid growth of using cloud-based services in recent years is an undeniable fact as it has increased the efficiency in accessing shared pools of configurable computing resources. However, there are serious concerns about the reliability of this emerging technology and it is anticipated that cloud computing security concerns will be the most important and challenging issue in IT industry. Accordingly, a hybrid re-encryption model has been presented in this paper to ensure data security in cloud computing environments based on the concepts of index classification, time-based procedures, and attributes. Accordingly, data are classified to four main rings based on their attributes. Furthermore, a hybrid ring was established to provide a secure connection between rings by dual encryption process. This is regarding the characteristics of source and destination rings. Protected rings perform the re-encryption process according to four main parameters: time-based, un-authorized authentication, user revocation, and data owner request. In addition, the functionality, security, and scalability of the suggested model were examined by a simulation analysis to find out the strengths of this re-encryption model in comparison with current models. The analysis results show that this model has met defined demands of this research to enhance the reliability and efficiency of data protection in cloud computing environments. Institute of Electrical and Electronics Engineers Inc. 2016 Conference or Workshop Item PeerReviewed Moghaddam, F. F. and Vala, M. and Ahmadi, M. and Khodadadi, T. and Madadipouya, K. (2016) A reliable data protection model based on re-encryption concepts in cloud environments. In: 6th IEEE Control and System Graduate Research Colloquium, ICSGRC 2015, 10-11 Aug 2015, Selangor, Malaysia. https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964459830&doi=10.1109%2fICSGRC.2015.7412456&partnerID=40&md5=8a13ba413f856474d8b143be30be99b6
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic T Technology (General)
spellingShingle T Technology (General)
Moghaddam, F. F.
Vala, M.
Ahmadi, M.
Khodadadi, T.
Madadipouya, K.
A reliable data protection model based on re-encryption concepts in cloud environments
description The rapid growth of using cloud-based services in recent years is an undeniable fact as it has increased the efficiency in accessing shared pools of configurable computing resources. However, there are serious concerns about the reliability of this emerging technology and it is anticipated that cloud computing security concerns will be the most important and challenging issue in IT industry. Accordingly, a hybrid re-encryption model has been presented in this paper to ensure data security in cloud computing environments based on the concepts of index classification, time-based procedures, and attributes. Accordingly, data are classified to four main rings based on their attributes. Furthermore, a hybrid ring was established to provide a secure connection between rings by dual encryption process. This is regarding the characteristics of source and destination rings. Protected rings perform the re-encryption process according to four main parameters: time-based, un-authorized authentication, user revocation, and data owner request. In addition, the functionality, security, and scalability of the suggested model were examined by a simulation analysis to find out the strengths of this re-encryption model in comparison with current models. The analysis results show that this model has met defined demands of this research to enhance the reliability and efficiency of data protection in cloud computing environments.
format Conference or Workshop Item
author Moghaddam, F. F.
Vala, M.
Ahmadi, M.
Khodadadi, T.
Madadipouya, K.
author_facet Moghaddam, F. F.
Vala, M.
Ahmadi, M.
Khodadadi, T.
Madadipouya, K.
author_sort Moghaddam, F. F.
title A reliable data protection model based on re-encryption concepts in cloud environments
title_short A reliable data protection model based on re-encryption concepts in cloud environments
title_full A reliable data protection model based on re-encryption concepts in cloud environments
title_fullStr A reliable data protection model based on re-encryption concepts in cloud environments
title_full_unstemmed A reliable data protection model based on re-encryption concepts in cloud environments
title_sort reliable data protection model based on re-encryption concepts in cloud environments
publisher Institute of Electrical and Electronics Engineers Inc.
publishDate 2016
url http://eprints.utm.my/id/eprint/73389/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84964459830&doi=10.1109%2fICSGRC.2015.7412456&partnerID=40&md5=8a13ba413f856474d8b143be30be99b6
_version_ 1643656649512058880
score 13.160551