Augmenting The Cloud Environment Security Through Blockchain Based Hash Algorithms
Abstract
Many techniques and algorithms are developed to enhance the security in the cloud environment. This helps the users to secure their server from malicious attacks. Hence the study and investigation of the performance enhanced security algorithms is a must demanded field in the research industry. When large number users using same server to store their information in cloud environment security is a must needed component to preserve the privacy and confidentiality of every individual user. This can be further strengthened by detecting the attacks in earlier stages and taking countermeasure to prevent the attack. Thus securing the data network without any leakage and loss of the information is a challenging task in the cloud environment. When the attacks or intrusion is detected after the occurrence there may be damage to the data in the form of data damage or theft. Hence it is necessary to predict and detect the attacks before the occurrence to protect the privacy and confidentiality of the user information.
Keywords: Cloud security; Data privacy; Data confidentiality; Hash Algorithm; Substitutional encryption
Keywords:
Cloud security; Data privacy; Data confidentiality; Hash Algorithm; Substitutional encryptionReferences
M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz, Above the clouds: A berkeley view of cloud com-puting, Technical Report No. UCB/EECS-2009-28, EECS Department, University of California, Berkeley (2009).
Google Scholar
N. Fernando, S.W. Loke, W. Rahayu, Mobile cloud computing: A survey, Future generation computer systems 29(1) (2013) 84-106.
DOI: https://doi.org/10.1016/j.future.2012.05.023
Google Scholar
C. Yang, Q. Huang, Z. Li, K. Liu, F. Hu, Big Data and cloud computing: innovation opportunities and challenges, International Journal of Digital Earth 10(1) (2017) 13-53.
DOI: https://doi.org/10.1080/17538947.2016.1239771
Google Scholar
S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of network and computer applications 34(1) (2011) 1-11.
DOI: https://doi.org/10.1016/j.jnca.2010.07.006
Google Scholar
M.A. Rababaa, M.A. Kofahi, F.A. Saqqar, S.A. Rababavh, Hash algorithms for security on GSM system, International Review on Computers and Software 4 (2009) 698-703.
Google Scholar
M. Ali, S.U. Khan, A.V. Vasilakos, Security in cloud computing: Opportunities and challenges, Information sciences 305 (2015) 357-383.
DOI: https://doi.org/10.1016/j.ins.2015.01.025
Google Scholar
N. Santos, K.P. Gummadi, R. Rodrigues, Towards Trusted Cloud Computing, HotCloud 9(9) (2009) 3.
Google Scholar
H. Hui, D. McLernon, Design and Application of a Service Outsourcing Cloud for the Insurance Industry, Proceedings of the 9th International Conference on Information Communication and Management (2019) 1-5.
DOI: https://doi.org/10.1145/3357419.3357420
Google Scholar
S. Srisakthi, A.P. Shanthi,Towards the Design of a Stronger AES: AES with Key Dependent Shift Rows (KDSR), Wireless Personal Communications 114(4) (2020) 3003-3015.
DOI: https://doi.org/10.1007/s11277-020-07514-9
Google Scholar
S. Namasudra, R. Chakraborty, A. Majumder, Securing Multimedia by Using DNA-Based Encryption in the Cloud Computing Environment, ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 16(3s) (2020) 1-19.
DOI: https://doi.org/10.1145/3392665
Google Scholar
P. Sivakumar, M. NandhaKumar, R. Jayaraj, A. Sakthi Kumaran, Securing Data and Reducing the Time Traffic Using AES Encryption with Dual Cloud, IEEE International Conference on System, Computation, Automation and Networking (ICSCAN) (2019) 1-5.
DOI: https://doi.org/10.1109/ICSCAN.2019.8878749
Google Scholar
A.K. Gautam, R. Kumar, A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks, SN Applied Sciences 3(1) (2021) 1-27.
DOI: https://doi.org/10.1007/s42452-020-04089-9
Google Scholar
S.P. Kumar, A. Aswini, M. Kavithadevi, S. Ramya, Improvised dedupication with keys and chunks in HDFS storage, Third International Conference on Science Technology Engineering & Management (ICONSTEM), (2017) 226-230.
DOI: https://doi.org/10.1109/ICONSTEM.2017.8261419
Google Scholar
M.B. Yassein, S. Aljawarneh, E. Qawasmeh, W. Mardini, Y. Khamayseh, Comprehensive study of symmetric key and asymmetric key encryption algorithms, International conference on engineering and technology (ICET) (2017) 1-7.
DOI: https://doi.org/10.1109/ICEngTechnol.2017.8308215
Google Scholar
A. Bhuvaneshwaran, P. Manickam, M. Ilayaraja, K. Sathesh Kumar, K. Shankar, Clustering Based Cybersecurity Model for Cloud Data, Cyber security and Secure Information Systems (2019) 227-240.
DOI: https://doi.org/10.1007/978-3-030-16837-7_11
Google Scholar
A. El-Yahyaoui, M.D.E.C. El Kettani, Data privacy in cloud computing, 4th International Conference on Computer and Technology Applications (ICCTA) (2018) 25-28.
DOI: https://doi.org/10.1109/CATA.2018.8398650
Google Scholar
Z.H. Mahmood, M.K. Ibrahem, New fully homomorphic encryption scheme based on multistage partial homomorphic encryption applied in cloud computing, 1st Annual International Conference on Information and Sciences (AiCIS) (2018) 182-186.
DOI: https://doi.org/10.1109/AiCIS.2018.00043
Google Scholar
R. Gayatri, Y. Gayatri, Detection of Trojan based DoS Attacks on RSA Cryptosystem using Hybrid Supervised Learning Models, IEEE Third International Conference on Smart Systems and Inventive Technology (ICSSIT) (2020) 1-5.
DOI: https://doi.org/10.1109/ICSSIT48917.2020.9214116
Google Scholar
D. Zissis, D. Lekkas, Addressing cloud computing security issues, Future Generation computer systems 28(3) (2012) 583-592.
DOI: https://doi.org/10.1016/j.future.2010.12.006
Google Scholar
A.T. Hashem, I. Yaqoob, N.B. Anuar, S. Mokhtar, A. Gani, The rise of big data on cloud computing: Review and open research issues, Information systems 47 (2015) 98-115.
DOI: https://doi.org/10.1016/j.is.2014.07.006
Google Scholar
D. Sun, G. Chang, L. Sun, X. Wang, Surveying and analyzing security, privacy and trust issues in cloud computing environments, Procedia Engineering 15 (2011) 2852-2856.
DOI: https://doi.org/10.1016/j.proeng.2011.08.537
Google Scholar
Statistics
Abstract views: 133PDF downloads: 197
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.