Data protection in cloud educational system in Saudi Arabia

https://doi.org/10.53730/ijhs.v6nS1.7031

Authors

  • Sanaa Alkhaldi
  • Mohammed A. AlZain
  • Mehedi Masud

Keywords:

Cloud computing, Access control, Attribute-based encryption, Data protection, Time performance

Abstract

Education is the basis for the development of peoples and the progress of countries, so the Saudi government has made great efforts to develop education, and made this development one of the most important goals of the 2030 vision, and among the most prominent of these efforts and most in keeping with the current local and global conditions is what it provided during the Corona pandemic from the transformation to e-learning and the adoption of education platforms that enable its users to access and benefit from its services. Since the data of this systems users must be kept confidential and secure, this paper was made. This paper focuses on the security aspects of data protection in educational system in the Kingdom of Saudi Arabia in cloud computing environment. This paper involves data protection aspects by protecting data of Saudi educational systems and maintaining their integrity and confidentiality. It also proposes a secure model based on Attribute-based encryption as an access control technique to avoid tampering with data when unauthorized people try to access it, and to protect data the proposed model applies combined encryption system using AES and RSA encryption algorithms.

Downloads

Download data is not yet available.

References

Jouini, M., & Rabai, L. B. A. (2019). A security framework for secure cloud computing environments. In Cloud security: Concepts, methodologies, tools, and applications (pp. 249-263). IGI Global.‏

Wang, L., Von Laszewski, G., Younge, A., He, X., Kunze, M., Tao, J., & Fu, C. (2010). Cloud computing: a perspective study. New generation computing, 28(2), 137-146.‏

Rashid, A., & Chaturvedi, A. (2019). Cloud computing characteristics and services: a brief review. International Journal of Computer Sciences and Engineering, 7(2), 421-426.‏

Mell P.M. and Grance.T. 2011. “The NIST Definition of Cloud Computing.” In Computer Security Publications from the National Institute of Standards and Technology (NIST) SP 800145.Gaithersburg: National Institute of Standards & Technology.

Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., Bose, M., ... & Sarkar, P. (2018, January). Cloud computing security challenges & solutions-A survey. In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 347-356). IEEE.‏

Tabrizchi, H., & Rafsanjani, M. K. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing, 76(12), 9493-9532.‏

Alam, T. (2021). Cloud Computing and its role in the Information Technology. IAIC Transactions on Sustainable Digital Innovation (ITSDI), 1, 108-115.‏

Sriram, I., & Khajeh-Hosseini, A. (2010). Research agenda in cloud technologies. arXiv preprint arXiv:1001.3259.‏

Taghipour, M., Soofi, M. E., Mahboobi, M., & Abdi, J. (2020). Application of cloud computing in system management in order to control the process. Management, 3(3), 34-55.‏

Singh, Jaswinder & Dhiman, Gaurav. (2021). A survey on cloud computing approaches. Materials Today: Proceedings. 10.1016/j.matpr.2021.05.334.

Ramachandra, G., Iftikhar, M., & Khan, F. A. (2017). A comprehensive survey on security in cloud computing. Procedia Computer Science, 110, 465-472.‏

Csrc.nist.gov (2018) SP 500-299 (DRAFT), NIST Cloud Computing Security Reference Architecture | CSRC (online). https://csrc.nist.gov/publications/detail/sp/500-299/draft. Accessed 11 Sept 2018

Goyal, S. (2014). Public vs private vs hybrid vs community-cloud computing: a critical review. International Journal of Computer Network and Information Security, 6(3), 20.‏

Bhad, P., Hande, J. Y., & Tiwari, S. J. INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY APPROACH TO THE OVERVIEW OF CLOUD COMPUTING, APPLICATION AND FUTURE SCOPE.‏

Aljabri, M., Chrouf, S. M., Alzahrani, N. A., Alghamdi, L., Alfehaid, R., Alqarawi, R., ... & Alduhailan, N. (2021). Sentiment Analysis of Arabic Tweets Regarding Distance Learning in Saudi Arabia during the COVID-19 Pandemic. Sensors, 21(16), 5431.‏

Rajeswari, S., & Kalaiselvi, R. (2017, December). Survey of data and storage security in cloud computing. In 2017 IEEE International Conference on Circuits and Systems (ICCS) (pp. 76-81). IEEE.‏

Roman, R., Lopez, J., & Mambo, M. (2018). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680-698.‏

Karatas, G., & Akbulut, A. (2018). Survey on access control mechanisms in cloud computing. Journal of Cyber Security and Mobility, 1-36.‏

Shen, H. B., & Hong, F. (2005). Review of access control model. Appl. Res. Comput, 22(6), 9-11.‏

Cai, F., Zhu, N., He, J., Mu, P., Li, W., & Yu, Y. (2019). Survey of access control models and technologies for cloud computing. Cluster Computing, 22(3), 6111-6122.‏

Han, D. J., Gao, J., & Zhai, H. L. (2010). Research progress of access control model. Computer Science, (11), 29-33.‏

Lampson, B. W. (1968). A scheduling philosophy for multiprocessing systems. Communications of the ACM, 11(5), 347-360.‏

Dubey, S., & Rai, P. K. (2021). A Review of Cloud Service Security with Various Access Control Methods.‏

Albulayhi, K., Abuhussein, A., Alsubaei, F., & Sheldon, F. T. (2020, January). Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review. In 2020 10th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0748-0755). IEEE.‏

Zhang, Y., Deng, R. H., Xu, S., Sun, J., Li, Q., & Zheng, D. (2020). Attribute-based encryption for cloud computing access control: A survey. ACM Computing Surveys (CSUR), 53(4), 1-41.‏

Zhang, P., Liu, J. K., Yu, F. R., Sookhak, M., Au, M. H., & Luo, X. (2018). A survey on access control in fog computing. IEEE Communications Magazine, 56(2), 144-149.‏

Zhong, H., Zhu, W., Xu, Y., & Cui, J. (2018). Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Computing, 22(1), 243-251.‏

Sifou, F., Hammouch, A., & Kartit, A. (2017, October). Ensuring security in cloud computing using access control: A survey. In Proceedings of the Mediterranean Symposium on Smart City Applications (pp. 255-264). Springer, Cham.‏

Sahai, A., & Waters, B. (2005, May). Fuzzy identity-based encryption. In Annual international conference on the theory and applications of cryptographic techniques (pp. 457-473). Springer, Berlin, Heidelberg.‏

Asim, M., Petkovic, M., & Ignatenko, T. (2014). Attribute-based encryption with encryption and decryption outsourcing.‏

Sookhak, M., Yu, F. R., Khan, M. K., Xiang, Y., & Buyya, R. (2017). Attribute-based data access control in mobile cloud computing: Taxonomy and open issues. Future Generation Computer Systems, 72, 273-287.‏

Lee, J., Oh, S., & Jang, J. W. (2015). A Work in Progress: Context based encryption scheme for Internet of Things. Procedia Computer Science, 56, 271-275.‏

Goyal, V., & Pandey, O. a. Sahai andB. Waters, IattributeY Based Encryption for fineYgraind access control of encrypted data. In Proceedings of the 13th aCM conference on Computer and communications security.‏

Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., & Jonker, W. (2009, August). Mediated ciphertext-policy attribute-based encryption and its application. In International Workshop on Information Security Applications (pp. 309-323). Springer, Berlin, Heidelberg.‏

Yu, S., Wang, C., Ren, K., & Lou, W. (2010, April). Attribute based data sharing with attribute revocation. In Proceedings of the 5th ACM symposium on information, computer and communications security (pp. 261-270).‏

Takabi, H., Joshi, J. B., & Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security & Privacy, 8(6), 24-31.‏

Khan, S. S., & Tuteja, R. R. (2015). Security in cloud computing using cryptographic algorithms. International Journal of Innovative Research in Computer and Communication Engineering, 3(1), 148-155.‏

Gampala, V., Inuganti, S., & Muppidi, S. (2012). Data security in cloud computing with elliptic curve cryptography. International Journal of Soft Computing and Engineering (IJSCE), 2(3), 138-141.‏

Semwal, P., & Sharma, M. K. (2017, September). Comparative study of different cryptographic algorithms for data security in cloud computing. In 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA)(Fall) (pp. 1-7). IEEE.‏

Ebrahim, M., Khan, S., & Khalid, U. B. (2014). Symmetric algorithm survey: a comparative analysis. arXiv preprint arXiv:1405.0398.‏

Bala, T., & Kumar, Y. (2015). Asymmetric Algorithms and Symmetric Algorithms: A Review. International Journal of Computer Applications (ICAET), 1-4.‏

Hardjono, T., & Dondeti, L. R. (2005). Security in Wireless LANS and MANS (Artech House Computer Security). Artech House, Inc..‏

Mahalle, V. S., & Shahade, A. K. (2014, October). Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm. In 2014 International Conference on Power, Automation and Communication (INPAC) (pp. 146-149). IEEE.‏

Published

07-05-2022

How to Cite

Alkhaldi, S., AlZain, M. A., & Masud, M. (2022). Data protection in cloud educational system in Saudi Arabia. International Journal of Health Sciences, 6(S1), 8879–8902. https://doi.org/10.53730/ijhs.v6nS1.7031

Issue

Section

Peer Review Articles