Skip to main content

A Framework for Data Storage Security with Efficient Computing in Cloud

  • Conference paper
  • First Online:
International Conference on Advanced Computing Networking and Informatics

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 870))

Abstract

The modern technology defines cloud computing as a digital facility which is accessed by users over the web. The proposed framework provides the protection according to the classification of data. In this framework, cloud service provider (CSP) selects the eminent server using cuckoo algorithm with Markov chain process and Levy’s flight. After server selection, user encrypts their data using elliptic curve integrated encryption scheme (ECIES) at the user side and sends it to CSP for storage, where CSP stores the data after applying second encryption on it using advanced encryption standard (AES) at the cloud side. This double encryption provides the confidentiality on both the sides. This framework integrates server selection approach, authentication and encryption schemes in order to achieve the integrity, confidentiality as well as efficient computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S.M. Habib, S. Hauke, S. Ries, M. Muhlhauser, Trust as a facilitator in cloud computing: a survey. J. Cloud Comput. Adv. Syst. Appl. 1, 19 (2012)

    Article  Google Scholar 

  2. R. Buyyaa, C.S. Yeoa, S. Venugopala, J. Broberg, I. Brandic, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. J. Future Gener. Comput. Syst. 25, 599–616 (2009)

    Article  Google Scholar 

  3. M. Kalra, S. Singh, A review of metaheuristic scheduling techniques in cloud computing. Egypt. Inf. J 16, 275–295 (2015)

    Article  Google Scholar 

  4. A. Singh, K. Chatterjee, Cloud security issues and challenges: a survey. J. Netw. Comput. Appl. 79, 88–115 (2017)

    Article  Google Scholar 

  5. L. Coppolino, S. D’Antonio, G. Mazzeo, L. Romano, Cloud security: emerging threats and current solutions. Comput. Electr. Eng., 1–15 (2016)

    Google Scholar 

  6. S. Makhloufi, A. Mekhaldi, M. Teguar, Three powerful nature-inspired algorithms to optimize power flow in Algeria’s Adrar power system. J. Energy 116, 1117–1130 (2016)

    Article  Google Scholar 

  7. A.K. Bhateja, A. Bhateja, S. Chaudhury, P.K. Saxenaa, Cryptanalysis of Vigenere cipher using Cuckoo Search. Appl. Soft Comput. 26, 315–324 (2015)

    Article  Google Scholar 

  8. M. Zineddine, Vulnerabilities and mitigation techniques toning in the cloud, a cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with Levy flights. J. Comput. Secur. 48, 1–18 (2015)

    Article  Google Scholar 

  9. M. Mareli, B. Twala, An adaptive Cuckoo search algorithm for optimisation. Appl. Comput. Inf. (2017)

    Google Scholar 

  10. L. Tawalbeh, N.S. Darwazeh, R.S. AlQassas, F. AlDosari, A secure cloud computing model based on data classification. Procedia Comput. Sci. 52, 1153–1158 (2015)

    Article  Google Scholar 

  11. F. Yahya, R.J. Walters, G.B. Wills, Protecting data in personal cloud storage with security classifications, in Science and Information Conference, IEEE (2015)

    Google Scholar 

  12. V. Tilborg, C.A. Henk, S. Jajodia, Encyclopedia of Cryptography and Security. Springer (2011)

    Google Scholar 

  13. D. Hankerson A. Menezes, S. Vanstone, Guide to Elliptic Curve Cryptography. Springer (2004)

    Google Scholar 

  14. V.G. Martínez, L.H. Encinas, A.Q. Dios, Security and practical considerations when implementing the elliptic curve integrated encryption scheme. J. Cryptologia 39(3), 244–269 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manoj Tyagi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tyagi, M., Manoria, M., Mishra, B. (2019). A Framework for Data Storage Security with Efficient Computing in Cloud. In: Kamal, R., Henshaw, M., Nair, P. (eds) International Conference on Advanced Computing Networking and Informatics. Advances in Intelligent Systems and Computing, vol 870. Springer, Singapore. https://doi.org/10.1007/978-981-13-2673-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2673-8_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2672-1

  • Online ISBN: 978-981-13-2673-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics