A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms

Cloud computing is the concept used to decode Daily Computing Issues. It is essentially a virtual pool of resources and also provides these tools to customers through the Internet. It is the net-based advancement and utilized in computer technology. The widespread problem connected with cloud computing is information privacy, protection, anonymity, and dependability, etc. However, the main issue involving them is safety and how the cloud supplier guarantees it. Securing the cloud means to secure the treatments (calculations) and storage (databases hosted by the Cloud provider). The paper reviews concurrent articles on security in cloud computing. By conducting research, we have managed to identify and analyze different security issues associated with the cloud as well as various cryptographic algorithms adaptable to better security for the cloud, and based on those algorithms, we have proposed a hybrid framework for security in cloud computing.

[1]  Eric Jui-Lin Lu,et al.  Cryptanalysis of the Batch Verifying Multiple DSA-Type Digital Signature , 2001 .

[2]  Deepak R Bharadwaj,et al.  Cloud Threat Defense – A Threat Protection and Security Compliance Solution , 2018, 2018 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).

[3]  Min-Shiang Hwang,et al.  A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing , 2016, Int. J. Netw. Secur..

[4]  Luigi Coppolino,et al.  Cloud security: Emerging threats and current solutions , 2017, Comput. Electr. Eng..

[5]  Shraddha Kulkarni Study of Modern Cryptographic Algorithms , 2017 .

[6]  Valentina Casola,et al.  On the Adoption of Security SLAs in the Cloud , 2014, A4Cloud.

[7]  Lahdir Mourad,et al.  Meteosat Images Encryption based on AES and RSA Algorithms , 2015 .

[8]  I. George Amalarethinam,et al.  Enhanced RSA Algorithm with Varying Key Sizes for Data Security in Cloud , 2017, 2017 World Congress on Computing and Communication Technologies (WCCCT).

[9]  Nazim Agoulmine,et al.  State of the art and challenges of security SLA for cloud computing , 2017, Comput. Electr. Eng..

[10]  M. Arun Fera,et al.  Enhancing Security in Cloud Using Trusted Monitoring Framework , 2015 .

[11]  Majid Bayat,et al.  A Lightweight and Efficient Data Sharing Scheme for Cloud Computing , 2018 .

[12]  Mohammad V. Malakooti,et al.  A Two Level-Security Model for Cloud Computing based on the Biometric Features and Multi-Level Encryption , 2015 .

[13]  Amit Asthana,et al.  Three step data security model for cloud computing based on RSA and steganography , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[14]  Andrew Warfield,et al.  Cloud security: a gathering storm , 2014, CACM.

[15]  Neeraj Suri,et al.  Leveraging the Potential of Cloud Security Service-Level Agreements through Standards , 2015, IEEE Cloud Computing.

[16]  Min-Shiang Hwang,et al.  A Survey of Public Auditing for Secure Data Storage in Cloud Computing , 2016, Int. J. Netw. Secur..

[17]  Qiyu Chen,et al.  Fine-Grained Outsourced Data Deletion Scheme in Cloud Computing , 2019 .

[18]  Kailas Devadkar,et al.  Understanding DDoS Attack & its Effect in Cloud Environment , 2015 .

[19]  Amir Herzberg,et al.  CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds , 2016, NDSS.

[20]  B. B. Zaidan,et al.  Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques , 2009, ArXiv.

[21]  D. K. Lakhtaria,et al.  New robust and secure alphabet pairing Text Steganography Algorithm , 2016 .

[22]  Dimitris Gritzalis,et al.  The Insider Threat in Cloud Computing , 2011, CRITIS.

[23]  Kim-Kwang Raymond Choo,et al.  Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..