Skip to main content

2018 | OriginalPaper | Buchkapitel

An Advanced Dynamic Authentic Security Method for Cloud Computing

verfasst von : S. Srinivasan, K. Raja

Erschienen in: Cyber Security

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing delivers a broad range of services and resources like computational power, storage, computational platforms, and applications to cloud consumers through the Internet by on demand, pay-per-usage basics. With a growing number of cloud service providers resorting to using and sharing resources in the cloud environment, there is a necessity for protecting the data of various users from unauthorized access of information between network and cloud. However, the security and privacy of an open-ended, reasonably sharing of accessible resources is still uncertainty and present a major complication for cloud consumers to acclimatize interested in cloud environment. This manuscript initiates and deeply examines the cloud security problem. This paper deals with the protection concern that includes many of the cloud attacks, data integrity, data leakage, privacy, confidentiality, vulnerabilities during sharing of resources, services, and information. This method deals with securing the cloud information without data loss from malicious users, hackers, and attackers of a real-time environment. This method verifies user authentication and authorization management. It assures security on the transmission of data, quality of service, and prevents vital information from various active and passive attacks. This proficient method preserves the cloud environment with better performance evaluation. Furthermore, security and privacy analysis know the ability of the proposed method for cloud computing and extend productive efficiency with safe cloud computing environments.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lin G (2012) Research on electronic data security strategy based on cloud computing. In: 2012 IEEE second international conference on consumer electronics, ISBN: 978-1-4577-1415-3, pp 1228–1231 Lin G (2012) Research on electronic data security strategy based on cloud computing. In: 2012 IEEE second international conference on consumer electronics, ISBN: 978-1-4577-1415-3, pp 1228–1231
2.
Zurück zum Zitat Behl A, Behl K (2012) An analysis of cloud computing security issues. In: 2012 IEEE proceedings world congress on information and communication technologies, ISBN: 978-1-4673-4805-8, pp 109–114 Behl A, Behl K (2012) An analysis of cloud computing security issues. In: 2012 IEEE proceedings world congress on information and communication technologies, ISBN: 978-1-4673-4805-8, pp 109–114
3.
Zurück zum Zitat Uma S, Kanika L, Manish M (2011) Implementing digital signature with RSA encryption algorithm to enhance the data security of cloud in cloud computing. In: 2010 IEEE 1st international conference on parallel, distributed and grid computing (PDGC—2010), ISBN: 978-1-4244-7674-9, pp 211–216 Uma S, Kanika L, Manish M (2011) Implementing digital signature with RSA encryption algorithm to enhance the data security of cloud in cloud computing. In: 2010 IEEE 1st international conference on parallel, distributed and grid computing (PDGC—2010), ISBN: 978-1-4244-7674-9, pp 211–216
4.
Zurück zum Zitat Behl A (2011) Emerging security challenges in cloud computing. In: 2011 IEEE, ISBN: 978-1-4673-0126-8, pp 217–222 Behl A (2011) Emerging security challenges in cloud computing. In: 2011 IEEE, ISBN: 978-1-4673-0126-8, pp 217–222
5.
Zurück zum Zitat Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing. In: 2012 IEEE proceedings of international conference on computer science and electronics engineering, ISBN: 978-0-7695-4647-6, pp 647–651 Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing. In: 2012 IEEE proceedings of international conference on computer science and electronics engineering, ISBN: 978-0-7695-4647-6, pp 647–651
6.
Zurück zum Zitat Garfinkel SL (2007) An evaluation of amazon’s grid computing services: EC2, S3, and SQS. Technical Report TR-08-07, Computer Science Group, Harvard University, Citeseer, pp 1–15 Garfinkel SL (2007) An evaluation of amazon’s grid computing services: EC2, S3, and SQS. Technical Report TR-08-07, Computer Science Group, Harvard University, Citeseer, pp 1–15
7.
Zurück zum Zitat Zhou M, Zhang R, Xie W, Qian W, Zhou A (2010) Security and privacy in cloud computing: a survey. In: 2010 proceedings of sixth international conference on semantics, knowledge and grids, ISBN: 978-0-7695-4189-1, pp 105–112, 2010 IEEE Zhou M, Zhang R, Xie W, Qian W, Zhou A (2010) Security and privacy in cloud computing: a survey. In: 2010 proceedings of sixth international conference on semantics, knowledge and grids, ISBN: 978-0-7695-4189-1, pp 105–112, 2010 IEEE
8.
Zurück zum Zitat Cachin C, Keidar I, Shraer A (2009) Trusting the cloud. ACM SIGACT News 40:81–86CrossRef Cachin C, Keidar I, Shraer A (2009) Trusting the cloud. ACM SIGACT News 40:81–86CrossRef
10.
Zurück zum Zitat Xu J, Chang E-C, Towards Efficient Proofs of Retrievability in Cloud Storage, National University of Singapore Department of Computer Science Xu J, Chang E-C, Towards Efficient Proofs of Retrievability in Cloud Storage, National University of Singapore Department of Computer Science
11.
Zurück zum Zitat Bernd G, Tobias (2011) Understanding cloud computing vulnerabilities. In: Co published by IEEE computer and reliabilities societies, IEEE April 2011, pp 50–57 Bernd G, Tobias (2011) Understanding cloud computing vulnerabilities. In: Co published by IEEE computer and reliabilities societies, IEEE April 2011, pp 50–57
12.
Zurück zum Zitat Carroll M, van der Merwe A, Kotz P (2011) Secure cloud computing benefits, risks and controls. In: 2011 IEEE Carroll M, van der Merwe A, Kotz P (2011) Secure cloud computing benefits, risks and controls. In: 2011 IEEE
13.
Zurück zum Zitat Denz R, Taylor S (2013) A survey on securing the virtual cloud. J Cloud Comput Adv Syst Appl 2:17CrossRef Denz R, Taylor S (2013) A survey on securing the virtual cloud. J Cloud Comput Adv Syst Appl 2:17CrossRef
14.
Zurück zum Zitat Srinivasan S, Raja K (2014) Security challenges in cloud computing. Int J Emerg Technol Adv Eng 4(4):01–06, ISSN 2250–2459 Srinivasan S, Raja K (2014) Security challenges in cloud computing. Int J Emerg Technol Adv Eng 4(4):01–06, ISSN 2250–2459
15.
Zurück zum Zitat Yu J, Lu P, Zhu Y, Xue G, Li M (2013) Towards secure multikeyword top-k retrieval over encrypted cloud data. In: IEEE Trans Dependable Secure Comput 10(4):239–250. July/August 2013CrossRef Yu J, Lu P, Zhu Y, Xue G, Li M (2013) Towards secure multikeyword top-k retrieval over encrypted cloud data. In: IEEE Trans Dependable Secure Comput 10(4):239–250. July/August 2013CrossRef
Metadaten
Titel
An Advanced Dynamic Authentic Security Method for Cloud Computing
verfasst von
S. Srinivasan
K. Raja
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8536-9_15