A Cloud Computing Platform On File Storage And Sharing Using Rijndeal Algorithms
Abstract
In today’s business world, every organization, companies and private individuals store their files online which is being monitored by untrusted individuals (Third Party) which are the manager and owner of cloud. Optimized security mechanism for file storage and sharing in a cloud computing platform using Rijndeal encryption algorithms is a platform to optimize the security of file and document against fraudsters. The goal of this paper is to implement file storage and sharing in a cloud computing platform using Rijndeal encryption algorithm. The proposed system aid encryption and sharing of encrypted files, it also lock the files in cloud before sharing it and ensure that users have full control of their files by using two factor authentications mechanism and encrypting the files before storing it which will prevent it from being hacked. Object-Oriented Analysis and Design methodology (OOAD) was used to analyze and design the system, whereas the implementation was carried out using PhP and My-SQL database management system. The accomplishment of this project enables firms, individuals and companies to store files and document in cloud environment without fear of any kind.
Keywords
Full Text:
PDFReferences
B. Wellman “Physical place and cyberplace: The rise of personalized networking,” International journal of urban and regional research, 2012, PP. 227-52.[PDF]. Available https://onlinelibrary.wiley.com/doi/abs/10.1111/1468-2427.00309
S. Marston, S. Bandyopadhyay, J. Zhang and A. Ghalsasi." Cloud computing—The business perspective. Decision support systems" 2011, PP.176-89.[PDF]. Availablehttps://www.sciencedirect.com/science/article/pii/S0167923610002393
T. Hoang, L. Chonho , D. Niyato and P. Wang. "A survey of mobile cloud computing: architecture, applications, and approaches." Wireless communications and mobile computing . 2013. PP. 1587- 1611.Available: https://onlinelibrary.wiley.com/doi/abs/10.1111/1468- 2427.00309
J. Q. Anderson &H. Rainie "The future of cloud computing "(pp. 1-26). Washington, DC: Pew Internet & American Life Project.2010. PP. 1-26.[PDF].Available: https://s3.amazonaws.com/academia.edu.documents/7135848/the-future-of-cloud- computing.pdf?response-content
BBC News. (2019, Sept.)." Letter from Africa: Why Nigeria's internet scammers are 'role models"[Online]. Available: https://www.bbc.com/news/world-africa-49759392
S. Gupta, & B. B. Gupta" Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art" International Journal of System Assurance Engineering and Management. 2017. PP. 512-530.[PDF].Available: https://link.springer.com/article/10.1007/s13198-015-0376-0
B. Chetan, K. Bhargavan, A. Delignat-Lavaud, and S. Maffeis. "Keys to the cloud: formal analysis and concrete attacks on encrypted web storage." In International Conference on Principles of Security and Trust,. Springer, Berlin, Heidelberg, 2013. pp. 126-146.[PDF]. Availble: https://link.springer.com/chapter/10.1007/978-3- 642-36830-1_7
E. Bocchi, D. Idilio, and M. Marco "Personal cloud storage benchmarks and comparison." IEEE Transactions on Cloud Computing .2015. PP 751-764. Available: https://ieeexplore.ieee.org/abstract/document/7096995/
S. K., Rao, D. Mahto, & D. Khan."A survey on advanced encryption standard." International Journal of Science and Research, 2017,pp. 711-724.
S. Singla, & J. Singh. “Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm” Global Journal of Computer Science and Technology.2013.Retrieved: https://computerresearch.org/index.php/computer/article/view/348
G. Singh. A study of encryption algorithms (RSA, DES, 3DES and AES) for information security”. International Journal of Computer Applications.2013.PP.67(19).
Available: https://pdfs.semanticscholar.org/187d/26258dc57d794ce4badb094e64cf8d3f7d88.pdf.
R. Saikeerthana, and A. Umamakeswari. "Secure data storage and data retrieval in cloud storage using cipher policy attribute based encryption." Indian Journal of Science and Technology. 2015.P. 318-325.
J. Daemen, & V. Rijmen, (2002). The design of Rijndael (Vol. 2). New York: Springer-verlag. Available: https://link.springer.com/book/10.1007%2F978-3-662- 60769-5
B.T Rao.”A study on data storage security issues in cloud computing” Procedia ComputerScience.2018.P.128-135.Available: https://derby.openrepository.com/handle/10545/620916
M.Hogan,F. Liu, A. Sokol, & J. Tong (2011). Nist cloud computing standards roadmap. NIST Special Publication, 35, 6-11. Available: http://www.mofa-easj.dk/docs/cods/docs/NIST_Cloud_Computing_Reference_Architecture.pdf
T. Ercan. (2010). Effective use of cloud computing in educational institutions. Procedia-Social and Behavioral Sciences, 2(2), 938-942.
D. Lin, & A. Squicciarini, (2010). Data protection models for service provisioning in the cloud. In Proceedings of the 15th ACM symposium on Access control models and technologies (pp. 183-192).
I.A.T. Hashem, I. Yaqoob, N.B. Anuar, S. Mokhtar, A. Gani and S.U. Khan. “The rise of “big data” on cloud computing: Review and open research issues”. Information systems.2015.47, PP.98-115.
Y. Kadam, “Security Issues in Cloud Computing A Transparent View”, International Journal of Computer Science & Emerging Technologies, Vol-2 No 5 October, 2011.
M. KapilSachdeva, "Cloud Computing: Security Risk Analysis and Recommendations", Master Thesis, University of Texas, Austin, 2011.
F. Soleimanian, S. Hashemi, “Security Challenges in Cloud Computing with More Emphasis on Trust and Privacy”, International Journal Of Scientific & Technology Research, Vol. 1, ISSUE 6, pp. 49-54, 2012.
S. Pearson, “Privacy, Security and Trust in Cloud Computing”, HP Laboratories, appeared as book chapter by Springer, UK, 2012.
J. Hurwitz, R. Bloor, M. Kaufman, F. Halper," Cloud computing for dummies", Wiley, 2009.
B. Trao.”A study on data storage security issues in cloud computing” Procedia Computer Science.2018.P.128-135.Available: https://derby.openrepository.com/handle/10545/620916.
S. Subashini & V. Kavitha. “A survey on security issues in service delivery models of cloud computing”. Journal of network and computer applications. 2011. PP:1-11. Available:https://www.sciencedirect.com/science/article/pii/S1084804510001281.
N. Penchalaiah and R. Seshadri. "Effective Comparison and evaluation of DES and Rijndael Algorithm (AES)." International journal of computer science and engineering .2010.PP. 1641-1645.
O.P. Akomolafe and M.O Abodunrin. 2017. “A hybrid cryptographic model for data storage in mobile cloud computing.” International Journal of Computer Network and Information Security.2017.P.53.
M. Waseem, A. Lakhan .”Data Security of Mobile Cloud Computing on Cloud Server.Open Access Library Journal”. 2016 Apr.P30;3(1).
I.A.T. Hashem, I. Yaqoob, N.B. Anuar, S. Mokhtar, A. Gani and S.U. Khan. “The rise of “big data” on cloud computing: Review and open research issues”. Information systems.2015.47, PP.98-115.
M. Aneke, and M. Wang" Energy storage technologies and real life applications–A state of the art review". Applied Energy, 179, pp.350-377.2016.
DOI: http://dx.doi.org/10.52155/ijpsat.v27.2.3229
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 Okafor Loveth Ijeoma, Anozie Ekenechukwu Lilian, Olayiwola Abisola Ayomide, Royransom Nzeh, Ikedilo Obiora Emeka, Udenze Loveth Ifunanya
This work is licensed under a Creative Commons Attribution 4.0 International License.