Techniques used to formulate confidential data by means of fragmentation and hybrid encryption
Cloud computing is a concept shifting in the approach how computing resources are deployed and purchased. Even though the cloud has a capable, elastic, and consistent design, several security concerns restrain customers to completely accept this novel technology and move from traditional computing to cloud computing. In the article, we aspire to present a form of a novel architectural model for offering protection to numerous cloud service providers with the intention to devise and extend security means for cloud computing. In this work, we presented a two-tier architecture for security in multi-clouds; one at the client side, and other at the server side. The article presented a security domination outline for multi-clouds and supports security needs like Confidentiality, Integrity, Availability, Authorization, and Non-repudiation for cloud storage. Through this document we have anticipated, HBDaSeC, a secure-computation protocol to ease the challenges of enforcing the protection of data for information security in the cloud.
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383. https://doi.org/10.1016/j.ins.2015.01.025
Engoulou, R. G., Bellaïche, M., Pierre, S., & Quintero, A. (2014). VANET security surveys. Computer Communications, 44, 1-13. https://doi.org/10.1016/j.comcom.2014.02.020
Fernández-Alemán, J. L., Señor, I. C., Lozoya, P. Á. O., & Toval, A. (2013). Security and privacy in electronic health records: A systematic literature review. Journal of biomedical informatics, 46(3), 541-562. https://doi.org/10.1016/j.jbi.2012.12.003
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660. https://doi.org/10.1016/j.future.2013.01.010
Keshavamurthy, B. N., Toshniwal, D., & Eshwar, B. K. (2012). Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams. Journal of Network and Computer Applications, 35(3), 1116-1129. https://doi.org/10.1016/j.jnca.2011.12.011
Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad hoc networks, 10(7), 1497-1516. https://doi.org/10.1016/j.adhoc.2012.02.016
Mokhtar, B., & Azab, M. (2015). Survey on security issues in vehicular ad hoc networks. Alexandria engineering journal, 54(4), 1115-1126. https://doi.org/10.1016/j.aej.2015.07.011
Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017). Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84, 38-54. https://doi.org/10.1016/j.jnca.2017.02.001
Nguyen, K. T., Laurent, M., & Oualha, N. (2015). Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks, 32, 17-31. https://doi.org/10.1016/j.adhoc.2015.01.006
Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad hoc networks, 11(8), 2661-2674. https://doi.org/10.1016/j.adhoc.2013.04.014
Sobh, T. S. (2006). Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art. Computer Standards & Interfaces, 28(6), 670-694. https://doi.org/10.1016/j.csi.2005.07.002
Srivastava, S., & Nandi, G. C. (2014). Fragmentation based encryption approach for self protected mobile agent. Journal of King Saud University-Computer and Information Sciences, 26(1), 131-142. https://doi.org/10.1016/j.jksuci.2013.08.002
Zissis, D., & Lekkas, D. (2011). Securing e-Government and e-Voting with an open cloud computing architecture. Government Information Quarterly, 28(2), 239-251. https://doi.org/10.1016/j.giq.2010.05.010
Copyright (c) 2019 International research journal of management, IT and social sciences
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All articles in the IRJMIS is published under the terms of the Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA) which allows authors and users to copy, distribute, transmit and adapt the article. The Creative Commons Attribution-ShareAlike 4.0 International License of an open-access article, as long as the author is properly attributed. Copyright on any research article published by SLOAP is retained by the author(s). Authors grant to the SLOAP right to publish the article, to be cited as its original publisher in case of reuse, and to distribute it in all forms and media. Copyright and source must be acknowledged and a link must be made to the article's DOI.