Abstract
Cloud computing is the growing computing model and highly demandable technology which provide the digital services through Internet. Cloud has huge virtual storage where many users store their data. So selection of efficient and secure server from data centers is important for storing the data to achieve the availability and security. Security of data from unauthorized access is also mandatory. Cryptographic techniques are also used to protect the data by storing it in encrypted form on cloud. Many cryptographic algorithms which are based on attributes, prediction, and identity can be deficient to some level from various security attacks. So there is requirement to develop protected data storage frameworks which ensure the security of data. This proposed work presented security framework for cloud storage, based on metaheuristic approach “modified cuckoo algorithm” for server selection, three-stage authentication, ECC for confidentiality, and CMA-ES for cipher text optimization. The proposed model ensures the availability, authentication, confidentiality, and security of the data while accessing to cloud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Habib SM, Hauke S, Ries S, Mühlhäuser M (2012) Trust as a facilitator in cloud computing: a survey. J Cloud Comput Adv Syst Appl 1:19
Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11
Younis YA, Kifayat K, Merabti M (2014) An access control model for cloud computing. J Inf Secur Appl 19(1):45–60
Madni SH, Latiff MS, Coulibaly Y (2016) Resource scheduling for infrastructure as a service (IaaS) in cloud computing: challenges and opportunities. J Netw Comput Appl 68:173–200
Kaur N, Chhabra A (2016) Analytical review of three latest nature inspired algorithms for scheduling in clouds. In: International conference on electrical, electronics, and optimization techniques 2016, IEEE, pp 3296–3300
Banyal RK, Jain P, Jain VK (2013) Multi-factor authentication framework for cloud computing. In: Fifth international conference on computational intelligence, modeling and simulation, IEEE, pp 105–110
Shobha Bindu C (2015) Click based graphical CAPTCHA to Thwart spyware attack. In: International advance computing conference (IACC), IEEE, pp 324–328
Jiang X, Ling J (2013) Simple and effective one-time password authentication scheme. In: 2nd international symposium on instrumentation and measurement, sensor network and automation, IEEE, pp 529–531
Mahmoudi S, Lotfi S (2015) Modified cuckoo optimization algorithm (MCOA) to solve graph coloring problem. Appl Soft Comput 33:48–64
Hankerson D, Menezes AJ, Vanstone S (2004) Guide to elliptic curve cryptography. Springer, Berlin, pp 32–40
Singh LD, Singh KM (2015) Implementation of text encryption using elliptic curve cryptography. Procedia Comput Sci 54:73–82
Kämpf JH, Robinson D (2009) A hybrid CMA-ES and HDE optimization algorithm with application to solar energy potential. Appl Soft Comput 9(2):738–745
Ahmed HEH, Kalash HM, Farag Allah OS (2007) Encryption efficiency analysis and security evaluation of RC6 block cipher for digital image. In: International conference on electrical engineering (ICEE), IEEE, pp 1–7
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tyagi, M., Manoria, M., Mishra, B. (2018). A Framework for Data Storage Security in Cloud. In: Kolhe, M., Trivedi, M., Tiwari, S., Singh, V. (eds) Advances in Data and Information Sciences. Lecture Notes in Networks and Systems, vol 38. Springer, Singapore. https://doi.org/10.1007/978-981-10-8360-0_25
Download citation
DOI: https://doi.org/10.1007/978-981-10-8360-0_25
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8359-4
Online ISBN: 978-981-10-8360-0
eBook Packages: EngineeringEngineering (R0)