35,451 research outputs found

    Survey of Data Confidentiality and Privacy in the Cloud Computing Environment

    Get PDF
    The objective of this research is to develop a scheme for improving cloud data confidentiality. A considerable number of people are sharing data through third-party applications in the cloud computing environment. According to reviewed literature, it has been realized that data security and privacy were the key challenges to the wider adoption of cloud services with insider threats being the most prevalent. Similarly, our online survey indicated that 53.3% of the respondents citing insider breaches as the main threat to their organizational data. The survey also confirmed that data security and privacy is one of the greatest barriers to the adoption of cloud services in their organization. Noting the flaws of Attribute-Based Encryption (ABE) and Identity-based encryption (IBE), and with the growth of computing power, applications are constantly being developed which makes them vulnerable to attacks. Since data confidentiality is essential in the provision of information security in the cloud, this paper suggested the development and the deployment of a hybrid attribute-based re-encryption scheme, which is a scheme that bridges the ABE and IBE, to secure data in the cloud computing environment. Keywords: Encryption, Cloud Computing, Data, confidentiality, Privacy DOI: 10.7176/CEIS/11-5-03 Publication date:September 30th 2020

    Privacy-Preserving in Cloud Computing with Security-as-a-Service

    Get PDF
    Cloud computing is on-demand delivery of data and IT resources in which applications are rapidly provisioned as standardized offerings to users over the web. In the recent years Cloud Computing has grown significantly, it became an important area of research and one of the vital areas in the redevelopment of the infrastructure of information technology. Cloud Computing has been classified into several models based on the type of service provided to customers. Cloud Computing has many benefits, as well as, it has many challenges and concerns such as: security, privacy, data integrity and other problems that make users and organizations fear to dealing with it. The main problem in Cloud Computing is the security of data. The proposed work focuses on secure data transfer by using different combination of mechanisms which not only ensure multi tier authenticities but also maintain the confidentiality of data and integrity of message in terms of authenticity, confidentiality and integrity of data. The proposed system aims to store data in a secure and safe way in order to avoid intrusions and attacks. Also, it will reduce the cost and time to store the encrypted data in the Cloud Computing. In this paper, ECC encryption and decryption algorithm has been proposed to maintain the confidentiality of data in transfer. The same algorithm is implemented in cloud architecture and is compared with the conventional RSA algorithm

    Dynamic virtual cluster cloud security using hybrid steganographic image authentication algorithm

    Get PDF
    Storing data in a third party cloud system causes serious problems on data confidentiality. Generally, encryption techniques provide data confidentiality but with limited functionality, which occurs due to unsupported actions of encryption operation in cloud storage space. Hence, developing a decentralized secure storage system with multiple support functions like encryption, encoding, and forwarding tends to get complicated, when the storage system spreads. This paper aims mainly on hiding image information using specialized steganographic image authentication (SSIA) algorithm in clustered cloud systems. The SSIA algorithm is applied to virtual elastic clusters in a public cloud platform. Here, the SSIA algorithm embeds the image information using blowfish algorithm and genetic operators. Initially, the blowfish symmetric block encryption is applied over the image and then the genetic operator is applied to re-encrypt the image information. The proposed algorithm provides an improved security than conventional blowfish algorithm in a clustered cloud system
    • …
    corecore