Techniques used to formulate confidential data by means of fragmentation and hybrid encryption

  • Olly Beckham University Of Surrey, Guildford, UK
  • Gord Oldman University Of Surrey, Guildford, UK
  • Julie Karrie University of Huddersfield, Huddersfield, UK
  • Dorth Craig University of Huddersfield, Huddersfield, UK
Keywords: authorization, cloud computing, novel technology, protection, traditional

Abstract

Cloud computing is a concept shifting in the approach how computing resources are deployed and purchased. Even though the cloud has a capable, elastic, and consistent design, several security concerns restrain customers to completely accept this novel technology and move from traditional computing to cloud computing. In the article, we aspire to present a form of a novel architectural model for offering protection to numerous cloud service providers with the intention to devise and extend security means for cloud  computing. In this work, we presented a two-tier architecture for security in multi-clouds; one at the client side, and other at the server side. The article presented a security domination outline for multi-clouds and supports security needs like Confidentiality, Integrity, Availability, Authorization, and Non-repudiation for cloud storage. Through this document we have anticipated, HBDaSeC, a secure-computation protocol to ease the challenges of enforcing the protection of data for information security in the cloud.

Downloads

Download data is not yet available.

References

Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383. https://doi.org/10.1016/j.ins.2015.01.025

Engoulou, R. G., Bellaïche, M., Pierre, S., & Quintero, A. (2014). VANET security surveys. Computer Communications, 44, 1-13. https://doi.org/10.1016/j.comcom.2014.02.020

Fernández-Alemán, J. L., Señor, I. C., Lozoya, P. Á. O., & Toval, A. (2013). Security and privacy in electronic health records: A systematic literature review. Journal of biomedical informatics, 46(3), 541-562. https://doi.org/10.1016/j.jbi.2012.12.003

Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660. https://doi.org/10.1016/j.future.2013.01.010

Keshavamurthy, B. N., Toshniwal, D., & Eshwar, B. K. (2012). Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams. Journal of Network and Computer Applications, 35(3), 1116-1129. https://doi.org/10.1016/j.jnca.2011.12.011

Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad hoc networks, 10(7), 1497-1516. https://doi.org/10.1016/j.adhoc.2012.02.016

Mokhtar, B., & Azab, M. (2015). Survey on security issues in vehicular ad hoc networks. Alexandria engineering journal, 54(4), 1115-1126. https://doi.org/10.1016/j.aej.2015.07.011

Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017). Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84, 38-54. https://doi.org/10.1016/j.jnca.2017.02.001

Nguyen, K. T., Laurent, M., & Oualha, N. (2015). Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks, 32, 17-31. https://doi.org/10.1016/j.adhoc.2015.01.006

Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad hoc networks, 11(8), 2661-2674. https://doi.org/10.1016/j.adhoc.2013.04.014

Sobh, T. S. (2006). Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art. Computer Standards & Interfaces, 28(6), 670-694. https://doi.org/10.1016/j.csi.2005.07.002

Srivastava, S., & Nandi, G. C. (2014). Fragmentation based encryption approach for self protected mobile agent. Journal of King Saud University-Computer and Information Sciences, 26(1), 131-142. https://doi.org/10.1016/j.jksuci.2013.08.002

Zissis, D., & Lekkas, D. (2011). Securing e-Government and e-Voting with an open cloud computing architecture. Government Information Quarterly, 28(2), 239-251. https://doi.org/10.1016/j.giq.2010.05.010

Published
2019-10-15
How to Cite
Beckham, O., Oldman, G., Karrie, J., & Craig, D. (2019). Techniques used to formulate confidential data by means of fragmentation and hybrid encryption. International Research Journal of Management, IT and Social Sciences, 6(6), 68-86. https://doi.org/10.21744/irjmis.v6n6.766
Section
Articles