Volume 15 No 4 (2017)
 Download PDF
HYBRID CLOUD SECURITY: REVERSE DATA HIDING TECHNIQUES FOR ENCRYPTED STORAGE
N. Subalakshmi, M. Jeyakarthic
Abstract
The increasing adoption of hybrid cloud environments presents new challenges for ensuring the security and privacy of sensitive data. This paper introduces the Encrypted Storage with Dynamic Reverse Hiding (ESDRH) algorithm, a novel approach designed to enhance hybrid cloud security through advanced reverse data hiding techniques for encrypted storage. The ESDRH algorithm encompasses four key components: Dynamic Key Generation (DKG), Adaptive Encryption (AE), Reverse Data Embedding (RDE), and Integrity Verification and Access Control (IVAC).Dynamic Key Generation (DKG) creates unique encryption keys for each data session, reducing the risk of key compromise. Adaptive Encryption (AE) combines symmetric and asymmetric encryption methods to optimize security and performance. Reverse Data Embedding (RDE) embeds unique identifiers and metadata within encrypted data blocks, ensuring data integrity and facilitating efficient management without compromising privacy. This technique allows for the secure distribution of encrypted data blocks across public and private cloud resources, enhancing both security and access efficiency. Integrity Verification and Access Control (IVAC) mechanisms are implemented to ensure that only authorized users can access the stored data, employing multi-factor authentication and continuous monitoring. Upon retrieval, data blocks are verified for integrity and decrypted, ensuring that the original content remains intact and accessible solely by legitimate users. The ESDRH algorithm offers a scalable, user-friendly solution to the complexities of data security in hybrid cloud environments, leveraging innovative reverse data hiding techniques to significantly improve data protection, compliance, and operational efficiency. This approach represents a substantial advancement in the secure management of encrypted storage in modern cloud infrastructures.
Keywords
Hybrid Cloud Security, Reverse Data Hiding, Encrypted Storage, Dynamic Key Generation, Adaptive Encryption, Data Integrity Verification.
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.