Skip to main content

2020 | OriginalPaper | Buchkapitel

RTMDC for Effective Cloud Data Security

verfasst von : Pankaj Verma, Nilima Dongre, Vijaylaxmi Bittal

Erschienen in: Intelligent Communication Technologies and Virtual Mobile Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In today’s world, almost everything has been digitised and hence the cloud computing is emerging as a boom in its field. But the most disturbing fact is that the cloud computing also appears as a vulnerable platform and therefore the security becomes the most important aspect in the cloud computing applications. Security issues are mainly dealt with known and unknown threats, malware and network access by unknown or unauthorised users. Hence, it has become a fundamental feature to create a secure platform for the cloud computing technologies. In this scenario, we proposed a RTMDC (Reputation based Trust Management system with Data Colouring) systems, which builds and tests a secure platform using Reputation Based Trust Management technique. Reputation based trust factor is then calculated using the collective reviews given by the users. This research work focuses on the images that has been related to the cloud users.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shaik Hussain, S.I., Yuvaraj, V.: A secure data access control method using AES for P2P storage cloud. IEEE (2015) Shaik Hussain, S.I., Yuvaraj, V.: A secure data access control method using AES for P2P storage cloud. IEEE (2015)
2.
Zurück zum Zitat He, H., Li, R., Dong, X., Zhang, Z.: Secure, efficient and fine-grained data access control mechanism for P2P storage cloud. IEEE (2014) He, H., Li, R., Dong, X., Zhang, Z.: Secure, efficient and fine-grained data access control mechanism for P2P storage cloud. IEEE (2014)
3.
Zurück zum Zitat Manjusha, R., Ramachandran, R.: Sharing data in cloud based on Trust Attribute Based Encryption (TABE). ARPN J. Eng. Appl. Sci. 10(9), 3 (2015) Manjusha, R., Ramachandran, R.: Sharing data in cloud based on Trust Attribute Based Encryption (TABE). ARPN J. Eng. Appl. Sci. 10(9), 3 (2015)
4.
Zurück zum Zitat Bonatti, P., Duma, C., Olmedilla, D., Shahmehri, N.: An integration of reputation-based and policy based trust management Bonatti, P., Duma, C., Olmedilla, D., Shahmehri, N.: An integration of reputation-based and policy based trust management
5.
Zurück zum Zitat Liu, Y.-C., Ma, Y.-T., Zhang, H.-S., Li, D.-Y., Chen, G.-S.: A method for trust management in cloud computing: data coloring by cloud watermarking. Int. J. Autom. Comput. 8(3), 280 (2011)CrossRef Liu, Y.-C., Ma, Y.-T., Zhang, H.-S., Li, D.-Y., Chen, G.-S.: A method for trust management in cloud computing: data coloring by cloud watermarking. Int. J. Autom. Comput. 8(3), 280 (2011)CrossRef
6.
Zurück zum Zitat Banerjee, A., Neogy, S., Chowdhury, C.: Reputation based trust management system for MANET. In: Third International Conference on Emerging Applications of Information Technology (EAIT) (2012) Banerjee, A., Neogy, S., Chowdhury, C.: Reputation based trust management system for MANET. In: Third International Conference on Emerging Applications of Information Technology (EAIT) (2012)
7.
Zurück zum Zitat Selcuk, A.A., Uzun, E., Pariente, M.R.: A reputation-based trust management system for P2P networks. Int. J. Netw. Secur. 6(3), 235–245 (2008) Selcuk, A.A., Uzun, E., Pariente, M.R.: A reputation-based trust management system for P2P networks. Int. J. Netw. Secur. 6(3), 235–245 (2008)
8.
Zurück zum Zitat Noor, T.H., Sheng, Q.Z., Yao, L., Dustdar, S., Ngu, A.H.H.: CloudArmor: supporting reputation-based trust management for cloud services. IEEE Trans. Parallel Distrib. Syst. 27(2), 367–380 (2015)CrossRef Noor, T.H., Sheng, Q.Z., Yao, L., Dustdar, S., Ngu, A.H.H.: CloudArmor: supporting reputation-based trust management for cloud services. IEEE Trans. Parallel Distrib. Syst. 27(2), 367–380 (2015)CrossRef
9.
Zurück zum Zitat Nitya Lakshmi, R., Laavanya, R., Meenakshi, M., Suresh Gana Dhas, C.: Analysis of attribute based encryption schemes. Int. J. Comput. Sci. Eng. Commun. 3(3), 1076–1081 (2015) Nitya Lakshmi, R., Laavanya, R., Meenakshi, M., Suresh Gana Dhas, C.: Analysis of attribute based encryption schemes. Int. J. Comput. Sci. Eng. Commun. 3(3), 1076–1081 (2015)
10.
Zurück zum Zitat Saravana Kumar, N., Rajya Lakshmi, G.V., Balamurugan, B.: Enhanced attribute based encryption for cloud computing. In: International Conference on Information and Communication Technologies (ICICT 2014) (2014) Saravana Kumar, N., Rajya Lakshmi, G.V., Balamurugan, B.: Enhanced attribute based encryption for cloud computing. In: International Conference on Information and Communication Technologies (ICICT 2014) (2014)
11.
Zurück zum Zitat Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE (2010) Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE (2010)
12.
Zurück zum Zitat Chadha, K., Bajpai, A.: Security aspects of cloud computing. Int. J. Comput. Appl. 40(8), 43–47 (2012) Chadha, K., Bajpai, A.: Security aspects of cloud computing. Int. J. Comput. Appl. 40(8), 43–47 (2012)
13.
Zurück zum Zitat Security for Cloud Computing Ten Steps to Ensure Success: Cloud Standards Customer Council (2017) Security for Cloud Computing Ten Steps to Ensure Success: Cloud Standards Customer Council (2017)
Metadaten
Titel
RTMDC for Effective Cloud Data Security
verfasst von
Pankaj Verma
Nilima Dongre
Vijaylaxmi Bittal
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-28364-3_6