7 research outputs found
Running Big Data Privacy Preservation in the Hybrid Cloud Platform
Now a day’s cloud computing has been used all over the industry, due to rapid growth in information technology and mobile device technology. It is more important task, user’s data privacy preservation in the cloud environment. Big data platform is collection of sensitive and non-sensitive data. To provide solution of big data security in the cloud environment, organization comes with hybrid cloud approach. There are many small scale industries arising and making business with other organization. Any organization data owner or customers never want to scan or expose their private data by the cloud service provider. To improve security performance, cloud uses data encryption technique on original data in public cloud. Proposed system work is carried out how to improve image data privacy preserving in hybrid cloud. For that we are implementing image encryption algorithm based on Rubik’s cube principle improves the image cryptography for the public cloud data securit
Privacy-Preserving in Cloud Computing with Security-as-a-Service
Cloud computing is on-demand delivery of data and IT resources in which applications are rapidly provisioned as standardized offerings to users over the web. In the recent years Cloud Computing has grown significantly, it became an important area of research and one of the vital areas in the redevelopment of the infrastructure of information technology. Cloud Computing has been classified into several models based on the type of service provided to customers. Cloud Computing has many benefits, as well as, it has many challenges and concerns such as: security, privacy, data integrity and other problems that make users and organizations fear to dealing with it. The main problem in Cloud Computing is the security of data. The proposed work focuses on secure data transfer by using different combination of mechanisms which not only ensure multi tier authenticities but also maintain the confidentiality of data and integrity of message in terms of authenticity, confidentiality and integrity of data. The proposed system aims to store data in a secure and safe way in order to avoid intrusions and attacks. Also, it will reduce the cost and time to store the encrypted data in the Cloud Computing. In this paper, ECC encryption and decryption algorithm has been proposed to maintain the confidentiality of data in transfer. The same algorithm is implemented in cloud architecture and is compared with the conventional RSA algorithm
A Scalable Model for Secure Multiparty Authentication
Distributed system architectures such as cloud computing or the emergent
architectures of the Internet Of Things, present significant challenges for
security and privacy. Specifically, in a complex application there is a need to
securely delegate access control mechanisms to one or more parties, who in turn
can govern methods that enable multiple other parties to be authenticated in
relation to the services that they wish to consume. We identify shortcomings in
an existing proposal by Xu et al for multiparty authentication and evaluate a
novel model from Al-Aqrabi et al that has been designed specifically for
complex multiple security realm environments. The adoption of a Session
Authority Cloud ensures that resources for authentication requests are
scalable, whilst permitting the necessary architectural abstraction for myriad
hardware IoT devices such as actuators and sensor networks, etc. In addition,
the ability to ensure that session credentials are confirmed with the relevant
resource principles means that the essential rigour for multiparty
authentication is established
Dynamic Multiparty Authentication of Data Analytics Services within Cloud Environments
Business analytics processes are often composed from orchestrated,
collaborating services, which are consumed by users from multiple cloud systems
(in different security realms), which need to be engaged dynamically at
runtime. If heterogeneous cloud systems located in different security realms do
not have direct authentication relationships, then it is a considerable
technical challenge to enable secure collaboration. In order to address this
security challenge, a new authentication framework is required to establish
trust amongst business analytics service instances and users by distributing a
common session secret to all participants of a session. We address this
challenge by designing and implementing a secure multiparty authentication
framework for dynamic interaction, for the scenario where members of different
security realms express a need to access orchestrated services. This novel
framework exploits the relationship of trust between session members in
different security realms, to enable a user to obtain security credentials that
access cloud resources in a remote realm. The mechanism assists cloud session
users to authenticate their session membership, thereby improving the
performance of authentication processes within multiparty sessions. We see
applicability of this framework beyond multiple cloud infrastructure, to that
of any scenario where multiple security realms has the potential to exist, such
as the emerging Internet of Things (IoT).Comment: Submitted to the 20th IEEE International Conference on High
Performance Computing and Communications 2018 (HPCC2018), 28-30 June 2018,
Exeter, U
Secure Data Sharing in Cloud Computing: A Comprehensive Review
Cloud Computing is an emerging technology, which relies on sharing computing resources. Sharing of data in the group is not secure as the cloud provider cannot be trusted. The fundamental difficulties in distributed computing of cloud suppliers is Data Security, Sharing, Resource scheduling and Energy consumption. Key-Aggregate cryptosystem used to secure private/public data in the cloud. This key is consistent size aggregate for adaptable decisions of ciphertext in cloud storage. Virtual Machines (VMs) provisioning is effectively empowered the cloud suppliers to effectively use their accessible resources and get higher benefits. The most effective method to share information resources among the individuals from the group in distributed storage is secure, flexible and efficient. Any data stored in different cloud data centers are corrupted, recovery using regenerative coding. Security is provided many techniques like Forward security, backward security, Key-Aggregate cryptosystem, Encryption and Re-encryption etc. The energy is reduced using Energy-Efficient Virtual Machines Scheduling in Multi-Tenant Data Centers
Secure data sharing in cloud computing: a comprehensive review
Cloud Computing is an emerging technology, which relies on sharing computing resources. Sharing of data in the group is not secure as the cloud provider cannot be trusted. The fundamental difficulties in distributed computing of cloud suppliers is Data Security, Sharing, Resource scheduling and Energy consumption. Key-Aggregate cryptosystem used to secure private/public data in the cloud. This key is consistent size aggregate for adaptable decisions of ciphertext in cloud storage. Virtual Machines (VMs) provisioning is effectively empowered the cloud suppliers to effectively use their accessible resources and get higher benefits. The most effective method to share information resources among the individuals from the group in distributed storage is secure, flexible and efficient. Any data stored in different cloud data centers are corrupted, recovery using regenerative coding. Security is provided many techniques like Forward security, backward security, Key-Aggregate cryptosystem, Encryption and Re-encryption etc. The energy is reduced using Energy-Efficient Virtual Machines Scheduling in Multi-Tenant Data Centers