Author : K.Bhavadharani M.E 1
Date of Publication :20th July 2022
Abstract: With the rapid development of Cloud computing, further Cloud services are into our diurnal life, and therefore security protection of Cloud services, especially data sequestration protection, becomes more important. Still to perform sequestration protection causes a huge outflow. Therefore, it's a critical issue to perform the most suitable protection to decline performance consumption while giving sequestration protection. In this design, the Complete Sequestration Protection Scheme (PPPS) is proposed to give the applicable sequestration protection which is satisfying stoner-demanded sequestration demand and maintains system performance contemporaneously. At first, the sequestration position is anatomized by druggies those bear and quantify the security degree and performance of 3DES and AES encryption algorithms. Also, relevant security creation is deduced by the output of analysis and quantified data. Eventually, the simulation results show that they not only fulfill stoner-demand and sequestration but also maintain the Cloud system performance in different Cloud surrounding
Reference :
-
- J. Domingo-Ferrer, O. Farràs, J. Ribes-González, and D. Sánchez, „„Privacy-preserving cloud computing on sensitive data: A survey of methods, products, and challenges,‟‟ Compute. Common., vols. 140–141, pp. 38–60, May 2019.
- V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, „„A survey on IOT security: Application areas, security threats, and solution architectures,‟‟ IEEE Access, vol. 7, pp. 82721–82743, 2019.
- Deng, Quinn, Wuhu, Guan, Deng , Wang, and Y. Zhou, „„Identity-based encryption transformation for flexible sharing of encrypted data in the public cloud,‟‟ IEEE Trans. Inf. Forensics Security, vol. 15, pp. 3168–3180, 2020.
- Eurostat, Cloud computing - statistics on the use by enterprises (Dec. 2016 (Accessed 14 February 2019)).
- C. S. Alliance, Cloud usage: Risks and opportunities report (Sep. 2014 (Accessed 14 February 2019)).
- T. aeberle, . Dupr e, Cloud computing. benefits, risks, and recommendations for information security (rev. b), European Network and Information Security Agency (Dec. 2012).
- A. Westin, Privacy and Freedom, Atheneum, 1967.
- E. Ramirez, J. Brill, M. K. Holshausen, J. D. Wright, T. McSweeney, Data brokers: A call for transparency and accountability, U.S. Federal Trade Commission (May 2014).
- M. A. Khan, A survey of security issues for cloud computing, Journal of Network and Computer Applications 71 (2016) 11–29.
- S. Singh, Y.-S. Jeong, J. Park, A survey on cloud computing security: Issues, threats, and solutions, Journal of Network and Computer Applications 75 (2016) 200–222.
- A. Singh, K. Chatterjee, Cloud security issues and challenges: A survey, Journal of Network and Computer Applications 79 (2017) 88–115.
- P. Praveen-Kumar, P. Syam-Kumar, P. Alphonse, Attribute-based encryption in cloud computing: A survey, gap analysis, and future directions, Journal of Network and Computer Applications 108 (2018) 37–52.
- N. Kaaniche, M. Laurent, Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms, Computer Communications 111 (2017) 120–141.
- J. Tang, Y. Cui, Q. Li, K. Ren, J. Liu, R. Buyya, Ensuring security and privacy preservation for cloud data services, ACM Computing Surveys 49 (1) (2016)