Abstract
Cloud computing is one of the most important and remarkable innovations of recent times. Since all the data is stored in servers located at different locations operating on different hardware so data consistency, availability, and security while accessing becomes a challenging task. Cloud introduces different data access management techniques that make sure of information security within the cloud even in the scenarios of outsourcing and untrusted cloud servers. Information access management in the cloud is a difficult issue due to the distributed architecture of cloud storage systems. Low trust of such a storage paradigm leads to limited proliferation and acceptability. These challenges further soar while addressing the issues of security, since it remains a massive risk. In this scenario, hybrid information prove a meaningful solution as it assists and stores all these varied information depending on privacy, needs of information and initial supply and offered capability. In this context, this paper proposes a cloud security hybrid querying system (CSHQS) that help to overcome data storage complexity and its subsequent access. The query input mechanism help in data computation, its processing, and deriving output with input test. The experimental results show the efficiency of the proposed CSHQS as it outperforms the existing state of art.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Pancholi, V.R., Patel, P.B.: Enhancement of cloud computing security. Int. J. Innov. Res. Sci. Technol. 2(09), 18–21 (2016). ISSN (online) 2349-6010
Rashmi, S.G., Mehfuz, S.: Securing software as a service model of cloud computing: issues and solutions. Int. J. Cloud Comput. Serv. Architect. (IJCCSA) 3(4), 1–11 (2013)
Joshi, P., Saurabh, P., Prasad, R., Mewada, P.: A new neural network based IDS for cloud computing, progress in computing, analytics and networking. In: Advances in Intelligent Systems and Computing, vol. 710, pp. 161–170. Springer (2018)
Kumar, S., Goudar, H.R.: Cloud computing—research issues, challenges, architecture, platforms and applications: a survey. Int. J. Future Comput. Commun. 1(4), 356–360 (2012)
Padhy, R.P., Patra, R.M., Satapathy, S.C.: Cloud computing: security issues and research challenges. IRACST Int. J. Comput. Sci. Inf. Technol. Secur. (IJCSITS) 1(2), 136–146 (2011)
Vyas, I., Saurabh, P.: Danger theory based load balancing (DTLB) algorithm for cloud computing. IJCSI 12(2), 301–306 (2015)
Batham, S., Prasad, R., Saurabh, P., Verma, B.: A new approach for data security using deduplication over cloud data storage. In: 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), MNIT Jaipur, SSRN-Elsevier, pp. 961–966 (2018). ISSN 1556-5068
Han, J., Susilo, W., Mu, Y.: Identity-based data storage in cloud computing. Future Gener. Comput. Syst. 29, 673–681 (2013)
Durairaj, M., Kannan, P.: A study on virtualization techniques and challenges in cloud computing. In. J. Sci. Technol. Res. 3(11), 147–151 (2014). ISSN 2277-8616
Casola, V., Cuomo, A., Rak, M., Villano, U.: The cloud grid approach-security analysis and performance evaluation. Future Gener. Comput. Syst. 29, 387–401 (2013)
Arshad, J., Townsend, P., Xu, J.: A novel intrusion severity analysis approach for Clouds. Future Gener. Comput. Syst. 29, 416–428 (2013)
Gonzalez, N., Miers, C., RedÃgolo, F., SimplÃcio, M., Carvalho, T., Näslund, M., Pourzandi, M.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 1, 11 (2012)
Saurabh, P., Verma, B.: An efficient proactive artificial immune system based anomaly detection and prevention system. Expert Syst. Appl. 60, 311–320 (2016). Elsevier
Saurabh, P., Verma, B.: Immunity inspired cooperative agent based security system. Int. Arab J. Inf. Technol. 15(2), 289–295 (2018)
Saurabh, P., Verma, B.: Cooperative negative selection algorithm. Int. J. Comput. Appl. 95(17), 27–32 (2014). 0975-8887
Saurabh, P., Verma, B, Sharma, S.: An immunity inspired anomaly detection system: a general framework. In: 7th BioInspired Computing: Theories and Applications, pp. 417–428. Springer (2012)
Saurabh, P., Verma, B., Sharma, S.: Biologically inspired computer security system: the way ahead. In: CICS, vol 335, pp. 474–484. Springer (2011)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sen, P., Prasad, R., Saurabh, P. (2019). A New Approach for Cloud Security Using Hybrid Querying System Over Cloud Scenario. In: Hu, YC., Tiwari, S., Mishra, K., Trivedi, M. (eds) Ambient Communications and Computer Systems. Advances in Intelligent Systems and Computing, vol 904. Springer, Singapore. https://doi.org/10.1007/978-981-13-5934-7_33
Download citation
DOI: https://doi.org/10.1007/978-981-13-5934-7_33
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5933-0
Online ISBN: 978-981-13-5934-7
eBook Packages: EngineeringEngineering (R0)