Skip to main content

A Proposed Technique for Cloud Computing Security

  • Conference paper
  • First Online:
Book cover Innovations in Computer Science and Engineering

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 8))

  • 674 Accesses

Abstract

This paper proposes a security technique called Encrypted Data Flow Mechanism (EDFM) based on the concept of Fog computing. EDFM primarily is proposed to secure cloud data storage from unauthorized/illegal access. The EDFM prototype was developed utilizing virtual machine(s), hosted hypervisor (VMware), Zentyal server and PHP. This simulated environment depends on a Fog Data Center called Broker, to hide actual cloud storage underneath it. To escalate cloud storage security, the simulated cloud communication paradigms make use of encrypted channels. This technique also tries to fool the intruder by providing fake document, in case he fails to prove his authenticity or he tries to access some document to which he is not entitled/permitted to access.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Suo H, Liu Z, Wan J, Zhou K.: Security and privacy in mobile cloud computing. In: 9th International Wireless Communications and Mobile Computing Conference (IWCMC), IEEE, Jul 1, pp. 655–659, (2013).

    Google Scholar 

  2. Pearson S, Benameur A.: Privacy, security and trust issues arising from cloud computing. In Cloud Computing Technology and Science (CloudCom), IEEE Second International Conference on Nov 30, pp. 693–702 (2010).

    Google Scholar 

  3. Singh, Jatinder, et al.: Twenty security considerations for cloud-supported Internet of Things. (2015).

    Google Scholar 

  4. Puthal D, Sahoo BP, Mishra S, Swain S.: Cloud computing features, issues, and challenges: a big picture. In Computational Intelligence and Networks (CINE), IEEE International Conference on Jan 12, pp. 116–123 (2015).

    Google Scholar 

  5. R. Raut, M. Waje, S. Kulkarni and A. Gupta: Security for Cloud using Fog Computing. IJRIT International Journal of Research in Information Technology, Volume 2, pp: 98–101, (2014).

    Google Scholar 

  6. Aazam M, Huh EN. Fog computing and smart gateway based communication for cloud of things. In Future Internet of Things and Cloud (FiCloud), International Conference IEEE on Aug 27, pp. 464–470 (2014).

    Google Scholar 

  7. Devi TR.: Importance of Cryptography in Network Security. In Communication Systems and Network Technologies (CSNT), IEEE International Conference on Apr 6, pp. 462–467 (2013).

    Google Scholar 

  8. Alabaichi A, Ahmad F, Mahmod R.: Security analysis of blowfish algorithm. In Informatics and Applications (ICIA), Second International Conference on Sep 23, IEEE, 12–18 (2013).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kanika Garg .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Garg, K., Singh, J. (2017). A Proposed Technique for Cloud Computing Security. In: Saini, H., Sayal, R., Rawat, S. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems, vol 8. Springer, Singapore. https://doi.org/10.1007/978-981-10-3818-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3818-1_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3817-4

  • Online ISBN: 978-981-10-3818-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics