Securing Cloud Data in Transit using Data Masking Technique in Cloud Enabled Multi Tenant Software Service

Background/Objectives: The paper discusses about the data security issues in the cloud computing environment. It employs data masking to hide sensitive data from cloud services thereby ensuring reliability and trust in the cloud environment. Methods/Statistical Analysis: Data access in the cloud environment can be categorized into three such as at rest, at transit ,in use. The main aim of this paper is integrate security in data masking techniques. We employ the existing mechanisms to the cloud environment to secure the data with virtual machine masking and platform masking. Findings: The masked data is transmitted to the processing environment. The services in cloud utilize this masked data for processing. It is comparatively secured when compared to the conventional technique. This mechanism increases the trust worthiness and can be masked dynamically or statistically in application or database based service environments. Application/Improvements: The main application of this research is to serve people with secured cloud, thereby overcoming the data security issues.

[1]  Eystein Mathisen,et al.  Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).

[2]  Sawan Kumar,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[3]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[4]  Amalraj Irudayasamy,et al.  Enhanced Algorithm for Data Privacy Preservation using Data Anonymization with Low Information , 2014 .

[5]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[6]  Ari Juels,et al.  Proofs of retrievability: theory and implementation , 2009, CCSW '09.

[7]  Wentao Liu,et al.  Research on cloud computing security problem and strategy , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[8]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.