| In today's society,cloud computing has significantly impacted nearly every section of our lives and business structures.Cloud computing is,without any doubt,one of the strategic directions for many companies and the most dominating infrastructure for enterprises as long as end users.Instead of buying IT equipment(hardware and/or software)and managing it themselves,many organizations today prefer to buy services from IT service providers;the number of service providers increase dramatically.As more cloud based services available to end users,their oceans of data are outsourced in the cloud as well;be that into social media site,Dropbox,Google Drive,Ali Cloud,Tencent Cloud and so on.Cloud becomes then the tools of choice for more cloud storage services.Many businesses are moving to the cloud because cloud computing increases efficiency,helps improve cash flow and offers many more benefits.However,despite the benefits that cloud services provides,many companies still have considerable concerns to entrust their business data to cloud storage service.This is understandable because every other week seems to bring a new story about data breach.Moreover,the responsibility to maintain the security of sensitive data like medical records,business structure or governmental data that are stored in the cloud remains a paramount problem.Security and Privacy are actually the most significant barriers to cloud adoption.Daily,academia and industry seek to find an efficient way to secure data migration in the cloud.Various solution approaches ranged from non-cryptographic to cryptographic techniques have been implemented.In this work,we will discuss some of these approaches and evaluates the popular ones in order to find the elements that affect system performance.Finally,we will develop a new scalable approach that enhances data security and privacy by combining Advanced Encryption Standard-256,Information Dispersal Algorithm that adopts a systematic erasure code and a Secure Hash Algorithm-512.To validate our design,we develop a prototype cloud data migration application using four Chinese's major CSPs.Our protocol achieves provable security assessments and fast execution times especially for medium thresholds.In addition,enhances user manipulation data from different cloud providers since some of those providers do not provide a direct link to download the data from their server unless you interact with their specific Software Development Kit. |