Skip to main content

A Composite Technique to Fortify Security for DaaS Services in Cloud Environment

Part of the Advances in Intelligent Systems and Computing book series (AISC,volume 1122)

Abstract

Cloud computing gives an extensive amount of virtual storage to users. The demands, the importance and the usage of cloud computing are increasing day by day. Therefore, security problems and threats are also increasing. An individual and any business organization or a company may have a huge amount of data; they cannot store it physically because the cost of that huge data storage will be more. Cloud computing solves this problem by providing the platform to store huge amount of data. The data storage on the cloud can be blend with the other users’ data. This can lead to data protection issues in cloud storage. As confidentiality is the main parameter of security, if confidentiality is broken then it will result in loss of data for individuals and organizations. This data needs to be protect with confidentiality measures before being store on cloud. To provide security of this data we are using composite technique i.e. obfuscation with encryption to fortify the security level. In this paper, we propose a composite technique to increase the security level while reducing the data size, and the time of execution.

Keywords

  • Internet of things
  • Cloud computing
  • Encryption
  • Obfuscation
  • Integrity
  • Data security
  • Data storage

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-39875-0_17
  • Chapter length: 10 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   149.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-39875-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   199.99
Price excludes VAT (USA)
Fig. 1.
Fig. 2.

References

  1. Arockiam, L., Monikandan, S.: Arocrypt: a confidentiality technique for securing enterprise’s data in the cloud. Int. J. Eng. Technol. 7, 245–253 (2015)

    Google Scholar 

  2. Suthar, K., Patel, J.: Proceedings of International Conference on Communication and Networks, vol. 508 (2017)

    Google Scholar 

  3. Velumadhava Rao, R., Selvamani, K.: Data security challenges and its solutions in cloud computing. Procedia Comput. Sci. 48, 204–209 (2015)

    CrossRef  Google Scholar 

  4. Basu, S., et al: Cloud computing security challenges & solutions-a survey. In: 2018 IEEE 8th Annual Computing and Communication Workshop and Conference, pp. 347–356 (2018)

    Google Scholar 

  5. Suthar, K., Patel, J.: ObfuCloud : An Enhanced Framework for Securing DaaS services using Data Obfuscation Mechanism in Cloud Environment, pp. 1–10 (2017)

    Google Scholar 

  6. Saravana Kumar, N., Rajya Lakshmi, G.V., Balamurugan, B.: Enhanced attribute-based encryption for cloud computing. Procedia Comput. Sci. 46, 689–696 (2015). ICICT 2014

    CrossRef  Google Scholar 

  7. Oli, S.A., Arockiam, L., IEEE: Confidentiality Technique to Obfuscate the Numerical Data to Enhance Security in Public Cloud Storage (2017)

    Google Scholar 

  8. Celesti, A., Fazio, M., Villari, M., Puliafito, A.: Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems. J. Netw. Comput. Appl. 59, 208–218 (2016)

    CrossRef  Google Scholar 

  9. Hosseinzadeh, S., Hyrynsalmi, S., Conti, M., Leppänen, V.: Security and privacy in cloud computing via obfuscation and diversification: a survey. In: Proceedings of the IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015 (2016)

    Google Scholar 

  10. Shankarwar, M.U., Pawar, A.V.: Security and privacy in cloud computing: a survey. In: Advances in Intelligent Systems and Computing (2015)

    Google Scholar 

  11. Partheeban, P., Kavitha, V.: A study with security concerns in service delivery models of cloud computing. Int. J. Appl. Eng. Res. 10, 42219–42230 (2015)

    Google Scholar 

  12. Deshpande, P., Sharma, S.C., Kumar, P.S.: Security threats in cloud computing. In: International Conference on Computing, Communication, and Automation, ICCCA 2015 (2015)

    Google Scholar 

  13. Chauhan, K.K., Sanger, A.K.S., Verma, A.: Homomorphic encryption for data security in cloud computing. In: Proceedings of the 2015 14th International Conference on Information Technology, ICIT 2015 (2016)

    Google Scholar 

  14. Mell, P., Grance, T.: The NIST Definition of Cloud Computing (Draft) Recommendations of the National Institute of Standards and Technology, NIST Special Publication (2011)

    Google Scholar 

  15. Collberg, C., Thomborson, C., Low, D.: A taxonomy of obfuscating transformations. Technical report (1997)

    Google Scholar 

  16. George Amalarethinam, D.I., Fathima Mary, B.: Confidentiality technique for enhancing data security in public cloud storage using data obfuscation. Int. J. Control Theory Appl. 9, 107–113 (2016)

    Google Scholar 

  17. Maheshwari, V., Nourian, A., Maheswaran, M.: Character-based search with data confidentiality in the clouds. In: CloudCom 2012 - Proceedings of the 2012 4th IEEE International Conference on Cloud Computing Technology and Science, pp. 895–899 (2012)

    Google Scholar 

  18. Duggins, S., Tsui, F., Karam, O., Kubanyi, Z.: Semantic Obfuscation and Software Intention. Cse.Spsu.Edu

  19. Kaur, M., Singh, R.: Implementing encryption algorithms to enhance data security of cloud in cloud computing. Int. J. Comput. Appl. 70, 16–21 (2013)

    Google Scholar 

  20. Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. I(9), 2–5 (2014)

    Google Scholar 

  21. Younis, Y.A., Kifayat, K., Merabti, M.: An access control model for cloud computing. J. Inf. Secure Appl. 19(1), 45–60 (2014)

    Google Scholar 

  22. Velumadhava Rao, R., Selvamani, K.: Data security challenges and its solutions in cloud computing. Procedia Comput. Sci. 48(C), 204–209 (2015)

    Google Scholar 

  23. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    CrossRef  Google Scholar 

  24. Khan, K.M., Shaheen, M.: Data obfuscation for privacy and confidentiality in cloud computing. In: Proceedings of the 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015 (2015)

    Google Scholar 

  25. Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges. IEEE Commun. Mag. 55, 26–33 (2017)

    CrossRef  Google Scholar 

  26. Fang, J., He, J., Pathan, M.S., Gao, M.: A novel storage and search scheme in cloud computing. In: Proceedings of the 12th International Conference on Computational Intelligence and Security, CIS 2016 (2017)

    Google Scholar 

  27. Arockiam, L., Monikandan, S.: Efficient cloud storage confidentiality to ensure data security (2014). ieeexplore.ieee.org

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samarjeet Yadav .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Yadav, S., Saxena, P., Dayal, N., Prakash, S. (2020). A Composite Technique to Fortify Security for DaaS Services in Cloud Environment. In: Nain, N., Vipparthi, S. (eds) 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019. ICIoTCT 2019. Advances in Intelligent Systems and Computing, vol 1122. Springer, Cham. https://doi.org/10.1007/978-3-030-39875-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-39875-0_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-39874-3

  • Online ISBN: 978-3-030-39875-0

  • eBook Packages: EngineeringEngineering (R0)