A New Approach for Cloud Security Using Hybrid Querying System Over Cloud Scenario

  • Priya SenEmail author
  • Ritu Prasad
  • Praneet SaurabhEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 904)


Cloud computing is one of the most important and remarkable innovations of recent times. Since all the data is stored in servers located at different locations operating on different hardware so data consistency, availability, and security while accessing becomes a challenging task. Cloud introduces different data access management techniques that make sure of information security within the cloud even in the scenarios of outsourcing and untrusted cloud servers. Information access management in the cloud is a difficult issue due to the distributed architecture of cloud storage systems. Low trust of such a storage paradigm leads to limited proliferation and acceptability. These challenges further soar while addressing the issues of security, since it remains a massive risk. In this scenario, hybrid information prove a meaningful solution as it assists and stores all these varied information depending on privacy, needs of information and initial supply and offered capability. In this context, this paper proposes a cloud security hybrid querying system (CSHQS) that help to overcome data storage complexity and its subsequent access. The query input mechanism help in data computation, its processing, and deriving output with input test. The experimental results show the efficiency of the proposed CSHQS as it outperforms the existing state of art.


Cloud computing Indexing analysis Data storage Data outsourcing Big data analytics 


  1. 1.
    Pancholi, V.R., Patel, P.B.: Enhancement of cloud computing security. Int. J. Innov. Res. Sci. Technol. 2(09), 18–21 (2016). ISSN (online) 2349-6010Google Scholar
  2. 2.
    Rashmi, S.G., Mehfuz, S.: Securing software as a service model of cloud computing: issues and solutions. Int. J. Cloud Comput. Serv. Architect. (IJCCSA) 3(4), 1–11 (2013)CrossRefGoogle Scholar
  3. 3.
    Joshi, P., Saurabh, P., Prasad, R., Mewada, P.: A new neural network based IDS for cloud computing, progress in computing, analytics and networking. In: Advances in Intelligent Systems and Computing, vol. 710, pp. 161–170. Springer (2018)Google Scholar
  4. 4.
    Kumar, S., Goudar, H.R.: Cloud computing—research issues, challenges, architecture, platforms and applications: a survey. Int. J. Future Comput. Commun. 1(4), 356–360 (2012)CrossRefGoogle Scholar
  5. 5.
    Padhy, R.P., Patra, R.M., Satapathy, S.C.: Cloud computing: security issues and research challenges. IRACST Int. J. Comput. Sci. Inf. Technol. Secur. (IJCSITS) 1(2), 136–146 (2011)Google Scholar
  6. 6.
    Vyas, I., Saurabh, P.: Danger theory based load balancing (DTLB) algorithm for cloud computing. IJCSI 12(2), 301–306 (2015)Google Scholar
  7. 7.
    Batham, S., Prasad, R., Saurabh, P., Verma, B.: A new approach for data security using deduplication over cloud data storage. In: 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), MNIT Jaipur, SSRN-Elsevier, pp. 961–966 (2018). ISSN 1556-5068Google Scholar
  8. 8.
    Han, J., Susilo, W., Mu, Y.: Identity-based data storage in cloud computing. Future Gener. Comput. Syst. 29, 673–681 (2013)CrossRefGoogle Scholar
  9. 9.
    Durairaj, M., Kannan, P.: A study on virtualization techniques and challenges in cloud computing. In. J. Sci. Technol. Res. 3(11), 147–151 (2014). ISSN 2277-8616Google Scholar
  10. 10.
    Casola, V., Cuomo, A., Rak, M., Villano, U.: The cloud grid approach-security analysis and performance evaluation. Future Gener. Comput. Syst. 29, 387–401 (2013)CrossRefGoogle Scholar
  11. 11.
    Arshad, J., Townsend, P., Xu, J.: A novel intrusion severity analysis approach for Clouds. Future Gener. Comput. Syst. 29, 416–428 (2013)CrossRefGoogle Scholar
  12. 12.
    Gonzalez, N., Miers, C., Redígolo, F., Simplício, M., Carvalho, T., Näslund, M., Pourzandi, M.: A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput. Adv. Syst. Appl. 1, 11 (2012)Google Scholar
  13. 13.
    Saurabh, P., Verma, B.: An efficient proactive artificial immune system based anomaly detection and prevention system. Expert Syst. Appl. 60, 311–320 (2016). ElsevierCrossRefGoogle Scholar
  14. 14.
    Saurabh, P., Verma, B.: Immunity inspired cooperative agent based security system. Int. Arab J. Inf. Technol. 15(2), 289–295 (2018)Google Scholar
  15. 15.
    Saurabh, P., Verma, B.: Cooperative negative selection algorithm. Int. J. Comput. Appl. 95(17), 27–32 (2014). 0975-8887Google Scholar
  16. 16.
    Saurabh, P., Verma, B, Sharma, S.: An immunity inspired anomaly detection system: a general framework. In: 7th BioInspired Computing: Theories and Applications, pp. 417–428. Springer (2012)Google Scholar
  17. 17.
    Saurabh, P., Verma, B., Sharma, S.: Biologically inspired computer security system: the way ahead. In: CICS, vol 335, pp. 474–484. Springer (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Technocrats Institute of Technology (Advance)BhopalIndia
  2. 2.Technocrats Institute of TechnologyBhopalIndia

Personalised recommendations