Skip to main content

2020 | OriginalPaper | Buchkapitel

A Composite Technique to Fortify Security for DaaS Services in Cloud Environment

verfasst von : Samarjeet Yadav, Pratishtha Saxena, Neelam Dayal, Shiv Prakash

Erschienen in: 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing gives an extensive amount of virtual storage to users. The demands, the importance and the usage of cloud computing are increasing day by day. Therefore, security problems and threats are also increasing. An individual and any business organization or a company may have a huge amount of data; they cannot store it physically because the cost of that huge data storage will be more. Cloud computing solves this problem by providing the platform to store huge amount of data. The data storage on the cloud can be blend with the other users’ data. This can lead to data protection issues in cloud storage. As confidentiality is the main parameter of security, if confidentiality is broken then it will result in loss of data for individuals and organizations. This data needs to be protect with confidentiality measures before being store on cloud. To provide security of this data we are using composite technique i.e. obfuscation with encryption to fortify the security level. In this paper, we propose a composite technique to increase the security level while reducing the data size, and the time of execution.

Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Arockiam, L., Monikandan, S.: Arocrypt: a confidentiality technique for securing enterprise’s data in the cloud. Int. J. Eng. Technol. 7, 245–253 (2015) Arockiam, L., Monikandan, S.: Arocrypt: a confidentiality technique for securing enterprise’s data in the cloud. Int. J. Eng. Technol. 7, 245–253 (2015)
2.
Zurück zum Zitat Suthar, K., Patel, J.: Proceedings of International Conference on Communication and Networks, vol. 508 (2017) Suthar, K., Patel, J.: Proceedings of International Conference on Communication and Networks, vol. 508 (2017)
3.
Zurück zum Zitat Velumadhava Rao, R., Selvamani, K.: Data security challenges and its solutions in cloud computing. Procedia Comput. Sci. 48, 204–209 (2015)CrossRef Velumadhava Rao, R., Selvamani, K.: Data security challenges and its solutions in cloud computing. Procedia Comput. Sci. 48, 204–209 (2015)CrossRef
4.
Zurück zum Zitat Basu, S., et al: Cloud computing security challenges & solutions-a survey. In: 2018 IEEE 8th Annual Computing and Communication Workshop and Conference, pp. 347–356 (2018) Basu, S., et al: Cloud computing security challenges & solutions-a survey. In: 2018 IEEE 8th Annual Computing and Communication Workshop and Conference, pp. 347–356 (2018)
5.
Zurück zum Zitat Suthar, K., Patel, J.: ObfuCloud : An Enhanced Framework for Securing DaaS services using Data Obfuscation Mechanism in Cloud Environment, pp. 1–10 (2017) Suthar, K., Patel, J.: ObfuCloud : An Enhanced Framework for Securing DaaS services using Data Obfuscation Mechanism in Cloud Environment, pp. 1–10 (2017)
6.
Zurück zum Zitat Saravana Kumar, N., Rajya Lakshmi, G.V., Balamurugan, B.: Enhanced attribute-based encryption for cloud computing. Procedia Comput. Sci. 46, 689–696 (2015). ICICT 2014CrossRef Saravana Kumar, N., Rajya Lakshmi, G.V., Balamurugan, B.: Enhanced attribute-based encryption for cloud computing. Procedia Comput. Sci. 46, 689–696 (2015). ICICT 2014CrossRef
7.
Zurück zum Zitat Oli, S.A., Arockiam, L., IEEE: Confidentiality Technique to Obfuscate the Numerical Data to Enhance Security in Public Cloud Storage (2017) Oli, S.A., Arockiam, L., IEEE: Confidentiality Technique to Obfuscate the Numerical Data to Enhance Security in Public Cloud Storage (2017)
8.
Zurück zum Zitat Celesti, A., Fazio, M., Villari, M., Puliafito, A.: Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems. J. Netw. Comput. Appl. 59, 208–218 (2016)CrossRef Celesti, A., Fazio, M., Villari, M., Puliafito, A.: Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems. J. Netw. Comput. Appl. 59, 208–218 (2016)CrossRef
9.
Zurück zum Zitat Hosseinzadeh, S., Hyrynsalmi, S., Conti, M., Leppänen, V.: Security and privacy in cloud computing via obfuscation and diversification: a survey. In: Proceedings of the IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015 (2016) Hosseinzadeh, S., Hyrynsalmi, S., Conti, M., Leppänen, V.: Security and privacy in cloud computing via obfuscation and diversification: a survey. In: Proceedings of the IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015 (2016)
10.
Zurück zum Zitat Shankarwar, M.U., Pawar, A.V.: Security and privacy in cloud computing: a survey. In: Advances in Intelligent Systems and Computing (2015) Shankarwar, M.U., Pawar, A.V.: Security and privacy in cloud computing: a survey. In: Advances in Intelligent Systems and Computing (2015)
11.
Zurück zum Zitat Partheeban, P., Kavitha, V.: A study with security concerns in service delivery models of cloud computing. Int. J. Appl. Eng. Res. 10, 42219–42230 (2015) Partheeban, P., Kavitha, V.: A study with security concerns in service delivery models of cloud computing. Int. J. Appl. Eng. Res. 10, 42219–42230 (2015)
12.
Zurück zum Zitat Deshpande, P., Sharma, S.C., Kumar, P.S.: Security threats in cloud computing. In: International Conference on Computing, Communication, and Automation, ICCCA 2015 (2015) Deshpande, P., Sharma, S.C., Kumar, P.S.: Security threats in cloud computing. In: International Conference on Computing, Communication, and Automation, ICCCA 2015 (2015)
13.
Zurück zum Zitat Chauhan, K.K., Sanger, A.K.S., Verma, A.: Homomorphic encryption for data security in cloud computing. In: Proceedings of the 2015 14th International Conference on Information Technology, ICIT 2015 (2016) Chauhan, K.K., Sanger, A.K.S., Verma, A.: Homomorphic encryption for data security in cloud computing. In: Proceedings of the 2015 14th International Conference on Information Technology, ICIT 2015 (2016)
14.
Zurück zum Zitat Mell, P., Grance, T.: The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology, NIST Special Publication (2011) Mell, P., Grance, T.: The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology, NIST Special Publication (2011)
15.
Zurück zum Zitat Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical report (1997) Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical report (1997)
16.
Zurück zum Zitat George Amalarethinam, D.I., Fathima Mary, B.: Confidentiality technique for enhancing data security in public cloud storage using data obfuscation. Int. J. Control Theory Appl. 9, 107–113 (2016) George Amalarethinam, D.I., Fathima Mary, B.: Confidentiality technique for enhancing data security in public cloud storage using data obfuscation. Int. J. Control Theory Appl. 9, 107–113 (2016)
17.
Zurück zum Zitat Maheshwari, V., Nourian, A., Maheswaran, M.: Character-based search with data confidentiality in the clouds. In: CloudCom 2012 - Proceedings of the 2012 4th IEEE International Conference on Cloud Computing Technology and Science, pp. 895–899 (2012) Maheshwari, V., Nourian, A., Maheswaran, M.: Character-based search with data confidentiality in the clouds. In: CloudCom 2012 - Proceedings of the 2012 4th IEEE International Conference on Cloud Computing Technology and Science, pp. 895–899 (2012)
18.
19.
Zurück zum Zitat Kaur, M., Singh, R.: Implementing encryption algorithms to enhance data security of cloud in cloud computing. Int. J. Comput. Appl. 70, 16–21 (2013) Kaur, M., Singh, R.: Implementing encryption algorithms to enhance data security of cloud in cloud computing. Int. J. Comput. Appl. 70, 16–21 (2013)
20.
Zurück zum Zitat Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. I(9), 2–5 (2014) Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. I(9), 2–5 (2014)
21.
Zurück zum Zitat Younis, Y.A., Kifayat, K., Merabti, M.: An access control model for cloud computing. J. Inf. Secure Appl. 19(1), 45–60 (2014) Younis, Y.A., Kifayat, K., Merabti, M.: An access control model for cloud computing. J. Inf. Secure Appl. 19(1), 45–60 (2014)
22.
Zurück zum Zitat Velumadhava Rao, R., Selvamani, K.: Data security challenges and its solutions in cloud computing. Procedia Comput. Sci. 48(C), 204–209 (2015) Velumadhava Rao, R., Selvamani, K.: Data security challenges and its solutions in cloud computing. Procedia Comput. Sci. 48(C), 204–209 (2015)
23.
Zurück zum Zitat Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef
24.
Zurück zum Zitat Khan, K.M., Shaheen, M.: Data obfuscation for privacy and confidentiality in cloud computing. In: Proceedings of the 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015 (2015) Khan, K.M., Shaheen, M.: Data obfuscation for privacy and confidentiality in cloud computing. In: Proceedings of the 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015 (2015)
25.
Zurück zum Zitat Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges. IEEE Commun. Mag. 55, 26–33 (2017)CrossRef Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges. IEEE Commun. Mag. 55, 26–33 (2017)CrossRef
26.
Zurück zum Zitat Fang, J., He, J., Pathan, M.S., Gao, M.: A novel storage and search scheme in cloud computing. In: Proceedings of the 12th International Conference on Computational Intelligence and Security, CIS 2016 (2017) Fang, J., He, J., Pathan, M.S., Gao, M.: A novel storage and search scheme in cloud computing. In: Proceedings of the 12th International Conference on Computational Intelligence and Security, CIS 2016 (2017)
Metadaten
Titel
A Composite Technique to Fortify Security for DaaS Services in Cloud Environment
verfasst von
Samarjeet Yadav
Pratishtha Saxena
Neelam Dayal
Shiv Prakash
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-39875-0_17