New Framework Model to Secure Cloud Data Storage

  • Beldjezzar LeilaEmail author
  • Zitouni Abdelhafid
  • Djoudi Mahieddine
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 575)


Nowadays companies are increasingly adopting the technology of cloud computing. This technology is subject to a lot of research and continuous advances are made. The use of cloud computing in the companies advantages such as: reducing costs, sharing and exchange of information between institutions, but the data in the Cloud computing are susceptible to be compromised and the companies are exposing to see their data loss. In this study, we address the subject of security in cloud computing; we expose and discuss some researches that had been proposed to secure the data stored in the cloud. And then we will present our new frameworks that ensure confidentiality of data storage in the cloud environment.


Cloud computing Security Authentication 


  1. 1.
    Nithiavathy, R.: Data integrity and data dynamics with secure storage service in cloud. In: Proceedings of the International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp. 125–131. IEEE (2015)Google Scholar
  2. 2.
    Clement, T.: The security in the cloud computing, presented in CQSI, October 2012Google Scholar
  3. 3.
    Nithiavathy, R.: Data integrity and data dynamics with secure storage service in cloud. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME). IEEE (2013)Google Scholar
  4. 4.
    Alzain, M.A, Pardede, E.: Protection of data and cloud computing Europe (2011)Google Scholar
  5. 5.
    Kumbhare, A., Simmhan, P., Prasanna, V.: Cryptonite: a secure and performant data repository on public clouds. In: IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 510–519. IEEE (2016)Google Scholar
  6. 6.
    Huang, H., Liu, K.: Efficient key management for preserving HIPAA regulations. J. Syst. Softw. 84, 113–119 (2015)CrossRefGoogle Scholar
  7. 7.
    Gupta, A., Verma, A., Kalra, P., Kumar, L.: Big data: a security compliance model. In: IT in Business, Industry and Government (CSIBIG), pp. 1–5, Indore (2014)Google Scholar
  8. 8.
    Cigref, cloud computing and protection of data, network companies enterprises (2015)Google Scholar
  9. 9.
    Idrissi, H.K., Kartit, A., El Marraki, M.: A taxonomy and survey of cloud computing, presented at the Security Days (JNS3), pp. 1–5(2013)Google Scholar
  10. 10.
    Merkle, Ralph C.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, New York (1990). doi: 10.1007/0-387-34805-0_21 CrossRefGoogle Scholar
  11. 11.
    Benslimane, D., Barhamgi, M., Cuppens, F.: PAIRSE: a privacy- preserving service- oriented data integration system. SIGMOD Record 42(3) (2013)Google Scholar
  12. 12.
    Heffetz, O., Ligett, K.: Privacy and data-based research. No. w19433. National Bureau of Economic Research (2013)Google Scholar
  13. 13.
    Deyan, D.C., Zhao, H.: Data security and privacy protection issues in CC. In: IEEE International Conference on Computer Science and Electronics Engineering (ICCSEE) (2015)Google Scholar
  14. 14.
    Petit, A., Ben Mokhtar, L.B., Kosch, H.: Towards Efficient and Accurate Privacy Pre-serving Web Search. In: MW4NG 2014, December 8–12, Bordeaux, France (2014)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Beldjezzar Leila
    • 1
    Email author
  • Zitouni Abdelhafid
    • 1
  • Djoudi Mahieddine
    • 2
  1. 1.Lire LabsAbdelhamid Mehri Constantine 2 UniversityConstanineAlgeria
  2. 2.Techne LabsUniversity of PoitiersPoitiers Cedex 9France

Personalised recommendations