ICETETI-2024 | View PDF
Paper Id:ICETETI-MSM140
doi: 10.71141/30485037/ICETETI-MSM140
Securing Backup Systems in Distributed Cloud Environments: Data Integrity, Encryption, and Access Control
Sophia Anderson, Karthikeyan Muthusamy
Citation:
Sophia Anderson, Karthikeyan Muthusamy, "Securing Backup Systems in Distributed Cloud Environments: Data Integrity, Encryption, and Access Control", International Journal of Multidisciplinary on Science and Management, pp. 288-293, 2024.
Abstract:
The rapid proliferation of Internet of Things (IoT) devices has led to an increasing demand for efficient and secure backup systems. Traditional backup solutions are inadequate due to the dynamic nature of IoT ecosystems and their security vulnerabilities. This study explores a robust security framework for IoT-based backup systems incorporating Multi-Factor Authentication (MFA), Role-Based Access Control (RBAC), and encryption mechanisms. The proposed framework ensures data integrity, confidentiality, and availability while mitigating unauthorized access risks. This paper presents a comprehensive analysis of the security challenges in IoT-based backup systems, followed by a detailed discussion of MFA, RBAC, and encryption techniques. A systematic methodology is developed to implement these security measures in IoT-based backup infrastructures. The results validate the effectiveness of the proposed model in enhancing security, reducing latency, and improving reliability. Various performance metrics, including encryption efficiency, access control overhead, and authentication time, are evaluated. The findings demonstrate a significant improvement in security without compromising backup performance.
Keywords:
Cloud Backup Security, Data Integrity, Encryption, Access Control, Rbac, Mfa, Blockchain, Cybersecurity, Distributed Systems, Cloud Computing.
References:
1. Ferreira, J. D., & Soares, L. A. (2019).IoT security: A survey on current challenges and solutions. Journal of Computer Networks and Communications, 2019, 1-12. https://doi.org/10.1155/2019/7103781
2. Khan, R., & Mollah, M. (2021).Role-based access control for IoT: A survey on implementation and techniques. Journal of IoT and Security, 7(3), 45-58. https://doi.org/10.1016/j.iotsec.2021.100395
3. Wang, L., & Li, W. (2020).A survey of encryption techniques for IoT: Challenges and solutions. International Journal of Computer Science and Engineering, 11(4), 121-132. https://doi.org/10.1109/ICASEW.2020.9125489
4. Suvvari, S. K. (2022). Project portfolio management: Best practices for strategic alignment. Innovative Research Thoughts, 8(4), 372-384. https://doi.org/10.36676/irt.v8.i4.1476
5. Zhao, Y., & Zhang, X. (2018).Multi-factor authentication in IoT environments: An overview. Security and Privacy in Communication Networks, 2018, 1-14. https://doi.org/10.1155/2018/1073512
6. Sunil Kumar Suvvari, “The Role of Leadership in Agile Transformation: A Case Study”. Journal of Advanced Management Studies, vol.1, no2, pp. 31-41, 2024.
7. Taresh Mehra, 2024. “Fortifying Data and Infrastructure: A Strategic Approach to Modern Security”, International Journal of Management, IT & Engineering (IJMRA), Vol. 14 Issue 8, August 2024.
8. Zhang, Q., & Hu, J. (2022).Backup security for IoT devices: Combining encryption and access control models. Journal of Cloud Computing and Security, 10(1), 13-25. https://doi.org/10.1007/s12069-022-01123-6
9. Dixit, A., Wazarkar, K. and Sabnis, A.S., 2021. Antimicrobial uv curable wood coatings based on citric acid. Pigment & Resin Technology, 50(6), pp.533-544.
10. Cheng, Y., & Zhang, Y. (2020).Securing cloud-based backup systems with role-based access control and encryption. International Journal of Cloud Computing and Services Science, 9(2), 91-101. https://doi.org/10.1016/j.jcse.2020.06.004
11. Sharma, S., & Kumar, D. (2021).IoT security challenges and multi-factor authentication approaches for backup systems. IoT Security Journal, 4(2), 33-46. https://doi.org/10.1007/s43162-021-00023-w
12. Taresh Mehra . “The Critical Role of Role-Based Access Control (RBAC) in Securing Backup, Recovery, and Storage Systems”, International Journal of Science and Research Archive, 2024, 13(01), 1192–1194.
13. Nouri, K., & Hassan, A. (2019).Securing backup systems with advanced encryption techniques in IoT-based networks. International Journal of Information Security, 18(3), 271-283. https://doi.org/10.1007/s10207-019-0466-9
14. Yang, M., & Wang, F. (2021).Implementing multi-layered security in backup systems for IoT networks. Journal of Computer Security, 29(6), 1175-1189. https://doi.org/10.3233/JCS-200761
15. Taresh Mehra, “A Systematic Approach to Implementing Two-Factor Authentication for Backup and Recovery Systems”, International Research Journal of Modernization in Engineering Technology and Science, Volume:06/Issue:09/September-2024.
16. Geetesh Sanodia, “Framework for Efficient Data Management in Salesforce Using APIS”, International Journal of Computer Applications (IJCA), 2(2), 2021. pp. 29-38.
17. Amrish Solanki, Kshitiz Jain, Shrikaa Jadiga, "Building a Data-Driven Culture: Empowering Organizations with Business Intelligence," International Journal of Computer Trends and Technology, 2024; 72, 2: 46-55.
18. Kanagarla, Krishna Prasanth Brahmaji, Edge Computing and Analytics for IoT Devices: Enhancing Real-Time Decision Making in Smart Environments. Available at SSRN: https://ssrn.com/abstract=5012466 or http://dx.doi.org/10.2139/ssrn.5012466
19. Sunil Kumar Suvvari, 2024. "Ensuring Security and Compliance in Agile Cloud Infrastructure Projects," International Journal of Computing and Engineering, CARI Journals Limited, vol. 6(4), pages 54-73.
20. Suman, Chintala (2024) Evolving BI Architectures: Integrating Big Data for Smarter Decision-Making. American Journal of Engineering, Mechanics and Architecture, 2 (8). pp. 72-79. ISSN 2993-2637
21. Giridhar Kankanala, Sudheer Amgothu, "SAP Migration Strategies", International Journal of Science and Research (IJSR), Volume 12 Issue 12, December 2023, pp. 2168-2171, https://www.ijsr.net/getabstract.php?paperid=SR23128151813, DOI: https://www.doi.org/10.21275/SR23128151813
22. N. R. Palakurti, “Machine Learning Mastery: Practical Insights for Data Processing”, Practical Applications of Data Processing, Algorithms, and Modeling, p. 16-29, 2024.
23. Sarangkumar Radadia Kumar Mahendrabhai Shukla ,Nimeshkumar Patel ,Hirenkumar Mistry,Keyur Dodiya 2024.” CYBER SECURITY DETECTING AND ALERTING DEVICE”, 412409-001.
24. Naga Lalitha Sree Thatavarthi, “Design and Development of a Furniture Application using Dot Net and Angular”, Journal of Technological Innovations, vol. 4, no. 4, Oct. 2023, doi: 10.93153/gmcag042.
25. Rajarao Tadimety Akbar Doctor, 2015.” A Method and System for Analysing Electronic Circuit Schematic” Patent office IN, Patent number 6529/CHE/2014, Application number 201641001890.
26. Apurva Kumar, "Building Autonomous AI Agents based AI Infrastructure," International Journal of Computer Trends and Technology, vol. 72, no. 11, pp. 116-125, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I11P112
27. Chandrakanth Lekkala (2023) Deploying and Managing Containerized Data Workloads on Amazon EKS. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-342. DOI: doi.org/10.47363/JAICC/2023 (2)324.
28. Sainath Muvva, Blockchain Technology in Data Engineering: Enhancing Data Integrity and Traceability in Modern Data Pipeline, International Journal of Leading Research Publication (IJLRP), Volume 4, Issue 7, July 2023. DOI 10.5281/zenodo.14646547.
29. Aparna Bhat, Rajeshwari Hegde, “Comprehensive Study of Renewable Energy Resources and Present Scenario in India,” 2015 IEEE International Conference on Engineering and Technology (ICETECH), Coimbatore, TN, India, 2015.
30. Dasaratha, D. A., A. Prasad, M. Kumar, P. Kamal, S. V., S. (2024). Strategizing IoT Network Layer Security through Advanced Intrusion Detection Systems and AI-Driven Threat Analysis. Journal of Intelligent Systems and Internet of Things, (), 195-207. DOI: https://doi.org/10.54216/JISIoT.120215
31. Dhameliya, N. (2023). Revolutionizing PLC Systems with AI: A New Era of Industrial Automation. American Digits: Journal of Computing and Digital Technologies, 1(1), 33-48.
32. Karthik Hosavaranchi Puttaraju, "Harnessing Disruptive Technologies: Strategic Approach to Retail Product Innovation", International Journal of Scientific Research in Engineering and Management (IJSREM), VOLUME: 08 ISSUE: 01 | JAN - 2024.
33. Karthik Chowdary Tsaliki, "Leveraging Large Language Models for Fraud Prevention in E-commerce", International Journal of Innovative Research in Science, Engineering and Technology, Volume 13, Issue 8, August 2024.
34. Vinay Panchal, 2025. “Designing for Longer Battery Life: Power Optimization Strategies in Modern Mobile SOCS”, International Journal of Electrical Engineering and Technology (IJEET) Volume 16, Issue 1, January-February 2025, pp. 1-17, Article ID: IJEET_16_01_001 Available online at https://iaeme.com/Home/issue/IJEET?Volume=16&Issue=1
35. Palakurti, N. R. (2024). Bridging the Gap: Frameworks and Methods for Collaborative Business Rules Management Solutions. International Scientific Journal for Research, 6(6), 1–22. Retrieved from https://isjr.co.in/index.php/ISJR/article/view/207
36. Chandrakanth Lekkala, “Utilizing Cloud – Based Data Warehouses for Advanced Analytics: A Comparative Study”, International Journal of Science and Research (IJSR), Volume 11 Issue 1, January 2022, pp. 1639-1643, https://www.ijsr.net/getabstract.php?paperid=SR24628182046
37. Aparna Bhat, “Comparison of Clustering Algorithms and Clustering Protocols in Heterogeneous Wireless Sensor Networks: A Survey,” 2014 INTERNATIONAL JOURNAL OF SCIENTIFIC PROGRESS AND RESEARCH (IJSPR) - ISSN: 2349-4689 Volume 04- NO.1, 2014.
38. Muthukumaran Vaithianathan, "Real-Time Object Detection and Recognition in FPGA-Based Autonomous Driving Systems," International Journal of Computer Trends and Technology, vol. 72, no. 4, pp. 145-152, 2024. Crossref, https://doi.org/10.14445/22312803/IJCTT-V72I4P119
39. Aparna K Bhat, Rajeshwari Hegde, 2014. “Comprehensive Analysis of Acoustic Echo Cancellation Algorithms on DSP Processor”, International Journal of Advance Computational Engineering and Networking (IJACEN), volume 2, Issue 9, pp.6-11.
40. Chanthati, Sasibhushan Rao. (2022). A Centralized Approach To Reducing Burnouts In The It Industry Using Work Pattern Monitoring Using Artificial Intelligenc. International Journal on Soft Computing Artificial Intelligence and Applications. Sasibhushan Rao Chanthati. Volume-10, Issue-1, PP 64-69.
41. Chanthati, S. R. (2024). Website Visitor Analysis & Branding Quality Measurement Using Artificial Intelligence. Sasibhushan Rao Chanthati. https://journals.e-palli.com/home/index.php/ajet. https://doi.org/10.54536/ajet.v3i3.3212
42. Julian, Anitha , Mary, Gerardine Immaculate , Selvi, S. , Rele, Mayur & Vaithianathan, Muthukumaran (2024) Blockchain based solutions for privacy-preserving authentication and authorization in networks, Journal of Discrete Mathematical Sciences and Cryptography, 27:2-B, 797–808, DOI: 10.47974/JDMSC-1956
43. Sateesh Reddy Adavelli. (2023). Future Proofing Insurance Operations: A Guidewire-Centric Approach to Cloud, Cybersecurity, and Generative AI. International Journal of Computer Science and Information Technology Research, 4(2), 29-52. https://ijcsitr.com/index.php/home/article/view/IJCSITR_2023_04_02_005
44. Shashikant Tank Kumar Mahendrabhai Shukla, Nimeshkumar Patel, Veeral Patel, 2024. ”AI Based Cyber Security Data Analytic Device”, 414425-001.
45. Nimeshkumar Patel, 2022. “Quantum Cryptography In Healthcare Information Systems: Enhancing Security in Medical Data Storage and Communication”, Journal of Emerging Technologies and Innovative Research, volume 9, issue 8, pp.g193-g202.
46. Arnab Dey (2022). Automation for CI/CD Pipeline for Code Delivery with Multiple Technologies. Journal of Mathematical & Computer Applications. SRC/JMCA-170. DOI: doi.org/10.47363/JMCA/2022(1)138
47. Lekkala, Chandrakanth, AI-Driven Dynamic Resource Allocation in Cloud Computing: Predictive Models and Real-Time Optimization (February 06, 2024). J Artif Intell Mach Learn & Data Sci | Vol: 2 & Iss: 2, Available at SSRN: https://ssrn.com/abstract=4908420 or http://dx.doi.org/10.2139/ssrn.4908420
48. Chandrakanth Lekkala 2023. “Implementing Efficient Data Versioning and Lineage Tracking in Data Lakes”, Journal of Scientific and Engineering Research, Volume 10, Issue 8, pp. 117-123.
49. Muthukumaran Vaithianathan, Mahesh Patil, Shunyee Frank Ng, Shiv Udkar, 2023. "Comparative Study of FPGA and GPU for High-Performance Computing and AI", ESP International Journal of Advancements in Computational Technology (ESP-IJACT), Volume 1, Issue 1: 37-46.
50. Chandrakanth Lekkala, “Utilizing Cloud – Based Data Warehouses for Advanced Analytics: A Comparative Study”, International Journal of Science and Research (IJSR), Volume 11 Issue 1, January 2022, pp. 1639-1643, https://www.ijsr.net/getabstract.php?paperid=SR24628182046
51. Dixit, A., Sabnis, A. and Shetty, A., 2022. Antimicrobial edible films and coatings based on N, O-carboxymethyl chitosan incorporated with ferula asafoetida (Hing) and adhatoda vasica (Adulsa) extract. Advances in Materials and Processing Technologies, 8(3), pp.2699-2715.
52. Sainath Muvva, Ethical AI and Responsible Data Engineering: A Framework for Bias Mitigation and Privacy Preservation in Large-Scale Data Pipelines, International Journal of Scientific Research in Engineering and Management, Volume: 05 Issue: 09 | Sept - 2021.
53. Chandrakanth Lekkala 2022. “Integration of Real-Time Data Streaming Technologies in Hybrid Cloud Environments: Kafka, Spark, and Kubernetes”, European Journal of Advances in Engineering and Technology, 2022, 9(10):38-43.
54. Sainath Muvva, Privacy-Preserving Data Engineering: Techniques, Challenges, and Future Directions, International Journal of Scientific Research in Engineering and Management, Volume: 05 Issue: 07 | July - 2021.
55. M. Rele and D. Patil, "Revolutionizing Liver Disease Diagnosis: AI-Powered Detection and Diagnosis", International Journal of Science and Research (IJSR), 2023.https://doi.org/10.21275/SR231105021910
56. Vinay Panchal, 2024. “Thermal and Power Management Challenges in High-Performance Mobile Processors”, International Journal of Innovative Research of Science, Engineering and Technology (IJIRSET), Volume 13, Issue 11, November 2024 |DOI: 10.15680/IJIRSET.2024.1311014.
57. Sateesh Reddy Adavelli, "AI and Cloud Synergy in Insurance: AWS, Snowflake, and Guidewire’s Role in DataDriven Transformation", International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET), Volume 12, Issue 6, June 2023.