Cloud Security Ecosystem for Data Security and Privacy

Authors

  • Divyashree D  Department of Computer Science, Soundarya Institute, Bangalore, Karnataka, India
  • Santhosh Kumar   Department of Computer Science, Soundarya Institute, Bangalore, Karnataka, India

Keywords:

Cloud Security, Data Security, Data Privacy, Cloud Simulator

Abstract

In the past couple of years Cloud Computing has become an eminent part of the IT industry. Because of its economic benefits more and more people are heading towards Cloud adoption. In present times there are numerous Cloud Service providers (CSP) allowing customers to host their applications and data onto Cloud. However, Cloud Security continues to be the biggest obstacle in Cloud adoption and thereby prevents customers from accessing its services. Various techniques have been implemented by provides to mitigate risks pertaining to Cloud security. In this paper, we present a Hybrid Cryptographic System (HCS) that combines the benefits of both symmetric and asymmetric encryption thus resulting in a secure Cloud environment. The paper focuses on creating a secure Cloud ecosystem wherein we make use of multifactor authentication along with multiple levels of hashing and encryption. The proposed system along with the algorithm are simulated using the Cloud simulator. To this end, we illustrate the working of our proposed system along with the simulated results.

References

  1. Subashini, Subashini, and Veeraruna Kavitha. "A survey on security issues in service delivery models of cloud computing." Journal of network and computer applications 34.1 (2011): 1-11.
  2. Pawar, Pramod S., et al. "Security-as-a-service in multi- cloud and federated cloud environments." IFIP International Conference on Trust Management. Springer International Publishing, 2015.
  3. Nair, Nikhitha K., K. S. Navin, and Soya Chandra. "Digital Signature and Advanced Encryption Standard for Enhancing Data Security and Authentication in Cloud Computing." (2015).
  4. Wang, Cong, et al. "Privacy-preserving public auditing for data storage security in cloud computing." INFOCOM, 2010 Proceedings IEEE. Ieee, 2010.
  5. Hendre, Amit, and Karuna Pande Joshi. "A semantic approach to cloud security and compliance." 2015 IEEE 8th International Conference on Cloud Computing. IEEE, 2015.
  6. Khanna, Abhirup, Sarishma. (2015). Mobile Cloud Computing: Principles and Paradigms. IK International.
  7. Khanna, Abhirup. "RAS: A novel approach for dynamic resource allocation." Next Generation Computing Technologies (NGCT), 2015 1st International Conference on. IEEE, 2015.
  8. Calheiros, Rodrigo N., et al. "CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms." Software: Practice and Experience 41.1 (2011): 23-50.
  9. Huang, Wei, et al. "The State of Public Infrastructureas- a-Service Cloud Security." ACM Computing Surveys (CSUR) 47.4 (2015): 68.
  10. Aich, Asish, Alo Sen, and Satya Ranjan Dash. "A Survey on Cloud Environment Security Risk and Remedy." Computational Intelligence and Networks (CINE), 2015 International Conference on. IEEE, 2015.
  11. Singh, Aarti, and Manisha Malhotra. "Security Concerns at Various Levels of Cloud Computing Paradigm: A Review." International Journal

Downloads

Published

2019-10-12

Issue

Section

Research Articles

How to Cite

[1]
Divyashree D, Santhosh Kumar , " Cloud Security Ecosystem for Data Security and Privacy, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 7, pp.38-42, September-October-2019.