Title: A new technique for data encryption based on third party encryption server to maintain the privacy preserving in the cloud environment

Authors: Ashraf H. Aljammal; Hani Bani-Salameh; Ahmad Qawasmeh; Ayoub Alsarhan; Ahmed Fawzi Otoom

Addresses: Department of Computer Science and its Applications, Faculty of Prince Al-Hussein Bin Abdullah II for Information Technology, The Hashemite University, Zarqa, Jordan ' Department of Software Engineering, Faculty of Prince Al-Hussein Bin Abdullah II for Information Technology, The Hashemite University, Zarqa, Jordan ' Department of Computer Science and its Applications, Faculty of Prince Al-Hussein Bin Abdullah II for Information Technology, The Hashemite University, Zarqa, Jordan ' Department of Computer Information Systems, Faculty of Prince Al-Hussein Bin Abdullah II for Information Technology, The Hashemite University, Zarqa, Jordan ' Department of Software Engineering, Faculty of Prince Al-Hussein Bin Abdullah II for Information Technology, The Hashemite University, Zarqa, Jordan

Abstract: As the cloud datacentres are exposed to various types of attacks, data theft/leakage is considered one of the vital attacks that may affect datacentres credibility. In this paper, a new technique is proposed to store the user's data in an encrypted form in the cloud datacentre via a third party encryption server. Therefore, the attackers and the datacentre authorities will be able to deal only with an encrypted form of the data. Furthermore, to decrypt the data, they need to know the encryption algorithm as well as the encryption key which is in turn placed on a third party encryption server. In addition, using third party encryption server (TPED) will lead to reducing the workload on both the cloud servers and the data owner's machine.

Keywords: data encryption; cloud privacy preserving; network security; information security.

DOI: 10.1504/IJBIS.2018.093654

International Journal of Business Information Systems, 2018 Vol.28 No.4, pp.393 - 403

Received: 02 Oct 2016
Accepted: 09 Dec 2016

Published online: 31 Jul 2018 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article