New Security Approach of Confidential Resources in Hybrid Clouds
Authors: Haythem Yahyaoui, Samir Moalla, Mounir Bouden, Skander Ghorbel
Abstract:
Nowadays, cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime. It also provides an optimized and secured access to the resources and gives more security for the data which is stored in the platform. However, some companies do not trust Cloud providers, they think that providers can access and modify some confidential data such as bank accounts. Many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, but, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some operations on the data before sending them to the provider Cloud in the objective to make them unreadable. The principal idea is to allow user how it can protect his data with his own methods. In this paper, we are going to demonstrate our approach and prove that is more efficient in term of execution time than some existing methods. This work aims at enhancing the quality of service of providers and ensuring the trust of the customers.
Keywords: Confidentiality, cryptography, security issues, trust issues.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1107381
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1477References:
[1] J. Liu, Q. Zhang, and H. Chen, “The Characteristics of Cloud Computing,” IEEE 39th International conf. Parallel Processing Workshops. San Diego CA, pp. 275-279, September 2010.
[2] M. Zhou, R. Zhang, D.Zeng, and W. Qian, “Services in the Cloud Computing era: A survey,” IEEE 4th International Universal Communication Symposium. Beijing CHINA, pp. 40-46, October 2010.
[3] K. Jasem Mohammad Omar, S. Abbas, M. El-Sayed El-Horbaty, and M. Abdel-Badeeh Salem, “A comparative study between modern encryption algorithms based on cloud computing environment,” IEEE 8th International Conference for Internet Technology and Secured Transactions. London, United Kingdom, pp. 531-535, December 2013.
[4] C.P. Gupta, and I. Sharma, “A fully homomorphic encryption scheme with symmetric keys with application to private data processing in clouds,” IEEE Fourth International Conference on the Network of the Future. Pohang, p. 1-4, October 2013.
[5] M. Zhou, R. Zhang, W. Xie, W. Qian, and A.Zhou, “Security and Privacy in Cloud Computing: A Survey,” IEEE Sixth International Conference on Semantics Knowledge and Grid. Beijing, pp. 105-112, November 2010.
[6] DropBox, “Privacy Policy” https://www.dropbox.com/en/privacy published 2015-02-13.
[7] D. Sheng, D. Kondo, and F. Cappello, “Characterizing Cloud Applications on a Google Data Center,” IEEE 42nd International Conference on Parallel Processing. Lyon, pp. 468-473, October 2013.
[8] Microsoft, “Windows Azure Privacy Overview” http://download.microsoft.com/download/1/6/0/160216AA-8445-480BB60F-5C8EC8067FCA/WindowsAzure-SecurityPrivacyCompliance.pdf
[9] M. Mohamed. Eman, H. S. Abdelkader, S. El-Etriby, “Data Security Model For Cloud Computing,” The Twelfth International Conference on Networks. Seville, pp. 66-74, January 2013.
[10] A.S.R. Armel, and V. Thavavel, “Ghost encryption: Mobile data security model encrypting data before moving it to the cloud service provider,” IEEE Fifth International Conference on Advanced Computing. Chennai, pp. 512-516, December 2013.