scispace - formally typeset
Proceedings ArticleDOI

A novel based security architecture of cloud computing

Reads0
Chats0
TLDR
In-depth security and enactment inspection proved the proposed scheme as greatly efficient and robust against spiteful data alteration outbreak and achieves scalability as well as flexibility due to its hierarchical structure.
Abstract
Cloud computing is considered as the future of IT organizations. In weigh against to conventional solutions where all type of computing services are controlled through any type of personnel controls, it transfers all computing resources to the centralized large data centers, so users can enjoy services in a large scale on demand. Chiefly small and medium-size organizations can manage their projects by using cloud-based services and also able to achieve productivity enhancement with limited budgets. But, apart from all of these benefits, it may not be fully trustworthy. Cloud Computing do not keep data on the user's system, so there is a need of data security. The user pays progressively attention about data security due to this off-side storage of data on cloud computing. In order to retain confidentiality of data against un-trusted cloud service providers, There are so many approaches. All modern cloud service providers solve this problem by encryption and decryption techniques. They all have their merits and demerits. In present thesis, the basic dilemma of cloud computing security is inspected. We have also proposed a survey of various models for cloud security. To ensure the data security in the cloud, we suggest an efficient, accessible and adaptable cryptography based scheme. In-depth security and enactment inspection proved the proposed scheme as greatly efficient and robust against spiteful data alteration outbreak. The proposed scheme achieves scalability as well as flexibility due to its hierarchical structure.

read more

Citations
More filters
Book ChapterDOI

Securing Healthcare Information over Cloud Using Hybrid Approach

TL;DR: This work advocates the use of linear network coding and re-encryption based on ElGamal cryptography in the form of hybrid approach to secure healthcare information over cloud to provide security and fault tolerance for cloud storage.
Proceedings ArticleDOI

Analysis of Weather Prediction using Machine Learning & Big Data

TL;DR: Under the proposed scheme, the augmented algorithmic rule that provides approximate and nearby results to forecast the climate for the next 5 days and at the end results are calculated on the idea of mathematical and statistical decision tree and conditions vide confusion matrix for more appropriate and accurate forecasting using Big Data.
Proceedings ArticleDOI

Secured cloud architecture for cloud service provider

TL;DR: The secure architecture for cloud is proposed which is going to map some cloud security issues that are authentication of user, confidentiality, privacy, access control and checking the integrity of data.

Cloud Computing Security: A Systematic Literature Review

Anton Backe, +1 more
TL;DR: This literature review shows that while plenty of issues have been identified future research should focus more on the practical implications of these security risks.
Proceedings ArticleDOI

Cloud computing sensitive data protection using multi layered approach

TL;DR: A framework is proposed to accommodate the protection of sensitive data in cloud computing environment that consists of three levels authorization, security and privacy and saves and verifies level and it is expected from the research a verified framework to protect private and sensitiveData in cloud environment.
References
More filters
Journal ArticleDOI

Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility

TL;DR: This paper defines Cloud computing and provides the architecture for creating Clouds with market-oriented resource allocation by leveraging technologies such as Virtual Machines (VMs), and provides insights on market-based resource management strategies that encompass both customer-driven service management and computational risk management to sustain Service Level Agreement (SLA) oriented resource allocation.
Proceedings ArticleDOI

Ciphertext-Policy Attribute-Based Encryption

TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Proceedings ArticleDOI

Attribute-based encryption for fine-grained access control of encrypted data

TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Book ChapterDOI

Fuzzy identity-based encryption

TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content

Fuzzy Identity Based Encryption.

TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Related Papers (5)