Cryptographic Solution for Security Problem in Cloud Computing Storage During Global Pandemics

Cloud computing has emerged as a potential substitute over traditional computing systems during the time of the COVID-19 pandemic. Almost all organizations shift their working from conventional ways to the online form of working. Most of the organizations are planning to permanently change some % of their work to online WFH (Work from Home) mode. There are numerous benefits of using cloud services in terms of cost, portability, platform independence, accessibility, elasticity, etc. But security is the biggest barrier when one wants to move towards cloud computing services, especially the cloud storage service. To overcome the problem of security in cloud storage systems, we have presented an approach for data security in cloud storage. The proposed approach uses the cryptographic methods and provides security and monitoring features to the user data stored in cloud storage systems. The proposed approach continuously monitors user’s data for any kind of modification by attackers. Thus, approach not only provides data security but also improves user’s trust on cloud based storage services. © 2021 WITPress. All rights reserved.

[1]  Sudip Mittal,et al.  AI assisted Malware Analysis: A Course for Next Generation Cybersecurity Workforce , 2020, ArXiv.

[2]  Brij B. Gupta,et al.  Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment , 2019, J. Ambient Intell. Humaniz. Comput..

[3]  Ritika,et al.  Monitoring Based Security Approach for Cloud Computing , 2019, Ingénierie des Systèmes d Inf..

[4]  Diao Zhe,et al.  Study on Data Security Policy Based on Cloud Storage , 2017, 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS).

[5]  Pradeep Singh Rawat,et al.  Learning-Based Task Scheduling Using Big Bang Big Crunch for Cloud Computing Environment , 1969 .

[6]  S. Rajeswari,et al.  Survey of data and storage security in cloud computing , 2017, 2017 IEEE International Conference on Circuits and Systems (ICCS).

[7]  Jose María Álvarez Rodríguez,et al.  Semantic-based QoS management in cloud systems: Current status and future challenges , 2014, Future Gener. Comput. Syst..

[8]  Sushmita Ruj,et al.  Security Services Using Crowdsourcing , 2014, ANT/SEIT.

[9]  Ravi Tomar,et al.  An Architectural View Towards Autonomic Cloud Computing , 2018 .

[10]  E Munivel,et al.  New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing , 2019, Secur. Commun. Networks.

[11]  Sudip Mittal,et al.  Enabling and Enforcing Social Distancing Measures using Smart City and ITS Infrastructures: A COVID-19 Use Case , 2020, ArXiv.

[12]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[13]  Zhuolin Yang,et al.  Virtualization security for cloud computing service , 2011, 2011 International Conference on Cloud and Service Computing.

[14]  Yusuf Haider,et al.  Confidentiality Issues in Cloud Computing and countermeasures: A Survey , 2016 .

[15]  Olasupo Ajayi,et al.  An Overview of Data Storage in Cloud Computing , 2017, 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS).

[16]  Vidhyacharan Bhaskar,et al.  Identity and access management in cloud environment: Mechanisms and challenges , 2018 .

[17]  Rongzhi Wang Research on Data Security Technology Based on Cloud Storage , 2017 .