DATA SECURITY AND INTEGRITY IN CLOUD COMPUTINGENVIRONMENT: AN APPROACH FOR E-BUSINESS
Keywords:
Data, Cloud, Cryptography, Encryption, OTP, Security, Query, PrivacyAbstract
Today’s technical and business landscape presents formidable and evolving challenges to personal data privacy. Cloud Computing is a style of computing that provides convenient on-demand network access to a shared pool of configurable computing resources that can be rapidly deployed with great efficiency and minimal management overhead. Personal data stored in the Cloud could be used or misused by a miscreants, competitors, or persons desirous of fraudulent motives. These data are cached, copied, and archived by Cloud Service Providers (CSPs), often without users’ authorization and control. In practical, self-destructing data systems secure sensitive data from disclosure in our highly mobile, social-networked, cloud-computing world. This study validates a self-destructive data security system using files of different formats and a secure metadata server to make an improvement on the existing models. All data and their copies become unreadable when an attempt to copy the file from the secure server is made and it creates a fault log to notify the administrator on an attack. This research adopted the object-oriented analysis and design methodology (OOADM) and was implemented using Php programming language and MYSQL for relational database (RDB). The model has been developed, tested and was able to deny unauthorized users access to the files stored on the cloud storage and was able to notify the admin through electronic mailing system of any threat in the system. The efficiency of the proposed model was evaluated using performance metrics and showed that the proposed model is robust and more efficient than other existing related models