A novel approach to providing secure data storage using multi cloud computing
AuthorsAlqahtani, Hassan Saad
secure cloud storage
Subject Categories::G400 Computer Science
MetadataShow full item record
AbstractThe cloud computing is a new technology that has been presented in the market un recent years. However, it suffered several security breaches, and has some open issues, in terms of security. Due to that, the literature was investigated to highlight the cloud computing security issues, it was found that about 50% of cloud computing security issues are associated with data storage, applied cryptography, and applied authentication. On the other hand, multiple-cloud paradigms have been developed as efficient solutions in order to overcome some single cloud paradigm obstacles and limitations, and enhance the efficiency of ICT cloud-based solutions. Developing an approach that is stable and capable of delivering a very high level security and availability cannot be achieved by relying on a high layer of the delivered system (the software), the lower layer (the infrastructure) must be involved in order to achieve that level of service. This study aims to improve the security of the delivered cloud storage service via multiple-cloud computing and to develop an approach for providing a secure data storage system that could be installed, configured, and easily consumed through the appropriate multiple-cloud model. The developed approached is supposed to maintain the confidentiality, integrity, and authenticity of the protected data; besides that, it will support disaster recovery and auditing for the system. This study aims to reduce the complexity and required knowledge levels associated with consuming a multiple-cloud computing paradigm and enhance the flexibility. In order to validate and verify the developed approach, a prototype was developed and tested, the testing phase consists of three core experiments, the outcomes of these three experiments were analysed, presented, and discussed. From the collected feedback, we could conclude that the developed prototype performance is as expected and developed prototype has been validated and verified.
CitationAlqahtani, H.S. (2019) 'A novel approach to providing secure data storage using multi cloud computing'. PhD thesis. University of Bedfordshire.
PublisherUniversity of Bedfordshire
TypeThesis or dissertation
DescriptionA thesis submitted to the University of Bedfordshire, in partial fulfilment of the requirements for the degree of Doctor of Philosophy
The following license files are associated with this item:
- Creative Commons
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 International
Showing items related by title, author, creator and subject.
Multiple-clouds computing security approaches: a comparative studyAlqahtani, Hassan; Sant, Paul; University of Bedfordshire (Association for Computing Machinery, 2016-03-31)Relying on a single cloud as a storage service is not a proper solution for a number of reasons; for instance, the data could be captured while being uploaded to the cloud, and the data could be stolen from the cloud using a stolen ID. There are a number of approaches that have been developed in order to provide a secure data storage relying on the multiple-cloud paradigms. Through this paper we will study, and evaluate the existing approaches that have been proposed as a solution for multiple cloud storage systems in terms of security, privacy, and integrity. In addition, we will provide a brief overview of the concept of information dispersal strategies and provide an overview of state-of-the-art multiple cloud storage approaches. After that, all these approaches will be analysed with respect to pre-defined criteria/properties. Finally, we identify and highlight the obstacles/limitation in terms of usability, operational cost, and the lack of security, privacy, integrity, and access features for these approaches, which are very critical direction for future research on multiple cloud storage.
Personally identifiable information security in cloud computingFeng, Xiaohua; Zhang, Xiangrui (2020-12-18)A cyber security application in Personally identifiable information) PII is attracting more and more attention and related to majority people’s everyday activities. The paper is introduced the trends of cyber security in cloud computing and in particular, focus on the responsibility of data privacy, especially in European Union countries. As the impact is on data protection which includes organisation based in the union, or has branches in the union or provides services to the union residents. The paper is also introduced the updated recent development content in our society which caused the impact that we have to deliver ISO standards; for instance, ISO/IEC 27018 and so on. A consequence of the standard is that regular practices of risk assessment need to be carried out in a regular base; such as an annually assessment. Keywords- Data protection, personal privacy, cryptography, cloud computing, cyber security, security policy, Trustworthiness, data service, personally identifiable information (PII), and ISO 27018
A multi-cloud approach for secure data storage on smart deviceAlqahtani, Hassan; Sant, Paul; University of Bedfordshire (Institute of Electrical and Electronics Engineers Inc., 2016-08-18)Using a mobile device to store sensitive data is not recommended, because of the high possibility of losing or thieving these data; although, neither using single cloud as a storage service is not proper solution for number of reasons; for instance, the data could be captured while uploaded to the cloud, and the data could be stolen from the cloud via using stolen ID. In this paper, we propose a solution that aims to offer a secure data storage for mobile cloud computing users based on multi-clouds scheme. The proposed solution will take the advantages of multi-clouds, data cryptography, and data compression to secure the distributed data; by splitting the data into segments, encrypting the segments, compressing the segments, distributing the segments via multi-clouds while keeping one segment on the mobile device memory; which will prevent extracting the data if the distributed segments have been phished.