A Framework for Data Storage Security in Cloud

  • Manoj TyagiEmail author
  • Manish Manoria
  • Bharat Mishra
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 38)


Cloud computing is the growing computing model and highly demandable technology which provide the digital services through Internet. Cloud has huge virtual storage where many users store their data. So selection of efficient and secure server from data centers is important for storing the data to achieve the availability and security. Security of data from unauthorized access is also mandatory. Cryptographic techniques are also used to protect the data by storing it in encrypted form on cloud. Many cryptographic algorithms which are based on attributes, prediction, and identity can be deficient to some level from various security attacks. So there is requirement to develop protected data storage frameworks which ensure the security of data. This proposed work presented security framework for cloud storage, based on metaheuristic approach “modified cuckoo algorithm” for server selection, three-stage authentication, ECC for confidentiality, and CMA-ES for cipher text optimization. The proposed model ensures the availability, authentication, confidentiality, and security of the data while accessing to cloud.


Cloud computing Three-stage authentication Server selection Modified cuckoo algorithm Confidentiality ECC CMA-ES Security 


  1. 1.
    Habib SM, Hauke S, Ries S, Mühlhäuser M (2012) Trust as a facilitator in cloud computing: a survey. J Cloud Comput Adv Syst Appl 1:19CrossRefGoogle Scholar
  2. 2.
    Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115CrossRefGoogle Scholar
  3. 3.
    Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11CrossRefGoogle Scholar
  4. 4.
    Younis YA, Kifayat K, Merabti M (2014) An access control model for cloud computing. J Inf Secur Appl 19(1):45–60Google Scholar
  5. 5.
    Madni SH, Latiff MS, Coulibaly Y (2016) Resource scheduling for infrastructure as a service (IaaS) in cloud computing: challenges and opportunities. J Netw Comput Appl 68:173–200CrossRefGoogle Scholar
  6. 6.
    Kaur N, Chhabra A (2016) Analytical review of three latest nature inspired algorithms for scheduling in clouds. In: International conference on electrical, electronics, and optimization techniques 2016, IEEE, pp 3296–3300Google Scholar
  7. 7.
    Banyal RK, Jain P, Jain VK (2013) Multi-factor authentication framework for cloud computing. In: Fifth international conference on computational intelligence, modeling and simulation, IEEE, pp 105–110Google Scholar
  8. 8.
    Shobha Bindu C (2015) Click based graphical CAPTCHA to Thwart spyware attack. In: International advance computing conference (IACC), IEEE, pp 324–328Google Scholar
  9. 9.
    Jiang X, Ling J (2013) Simple and effective one-time password authentication scheme. In: 2nd international symposium on instrumentation and measurement, sensor network and automation, IEEE, pp 529–531Google Scholar
  10. 10.
    Mahmoudi S, Lotfi S (2015) Modified cuckoo optimization algorithm (MCOA) to solve graph coloring problem. Appl Soft Comput 33:48–64CrossRefGoogle Scholar
  11. 11.
    Hankerson D, Menezes AJ, Vanstone S (2004) Guide to elliptic curve cryptography. Springer, Berlin, pp 32–40Google Scholar
  12. 12.
    Singh LD, Singh KM (2015) Implementation of text encryption using elliptic curve cryptography. Procedia Comput Sci 54:73–82CrossRefGoogle Scholar
  13. 13.
    Kämpf JH, Robinson D (2009) A hybrid CMA-ES and HDE optimization algorithm with application to solar energy potential. Appl Soft Comput 9(2):738–745CrossRefGoogle Scholar
  14. 14.
    Ahmed HEH, Kalash HM, Farag Allah OS (2007) Encryption efficiency analysis and security evaluation of RC6 block cipher for digital image. In: International conference on electrical engineering (ICEE), IEEE, pp 1–7Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Mahatma Gandhi Chitrakoot Gramodaya VishwavidyalayaChitrakootIndia
  2. 2.Sagar Institute of Research Technology and ScienceBhopalIndia

Personalised recommendations