Abstract
The modern technology defines cloud computing as a digital facility which is accessed by users over the web. The proposed framework provides the protection according to the classification of data. In this framework, cloud service provider (CSP) selects the eminent server using cuckoo algorithm with Markov chain process and Levy’s flight. After server selection, user encrypts their data using elliptic curve integrated encryption scheme (ECIES) at the user side and sends it to CSP for storage, where CSP stores the data after applying second encryption on it using advanced encryption standard (AES) at the cloud side. This double encryption provides the confidentiality on both the sides. This framework integrates server selection approach, authentication and encryption schemes in order to achieve the integrity, confidentiality as well as efficient computing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S.M. Habib, S. Hauke, S. Ries, M. Muhlhauser, Trust as a facilitator in cloud computing: a survey. J. Cloud Comput. Adv. Syst. Appl. 1, 19 (2012)
R. Buyyaa, C.S. Yeoa, S. Venugopala, J. Broberg, I. Brandic, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. J. Future Gener. Comput. Syst. 25, 599–616 (2009)
M. Kalra, S. Singh, A review of metaheuristic scheduling techniques in cloud computing. Egypt. Inf. J 16, 275–295 (2015)
A. Singh, K. Chatterjee, Cloud security issues and challenges: a survey. J. Netw. Comput. Appl. 79, 88–115 (2017)
L. Coppolino, S. D’Antonio, G. Mazzeo, L. Romano, Cloud security: emerging threats and current solutions. Comput. Electr. Eng., 1–15 (2016)
S. Makhloufi, A. Mekhaldi, M. Teguar, Three powerful nature-inspired algorithms to optimize power flow in Algeria’s Adrar power system. J. Energy 116, 1117–1130 (2016)
A.K. Bhateja, A. Bhateja, S. Chaudhury, P.K. Saxenaa, Cryptanalysis of Vigenere cipher using Cuckoo Search. Appl. Soft Comput. 26, 315–324 (2015)
M. Zineddine, Vulnerabilities and mitigation techniques toning in the cloud, a cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with Levy flights. J. Comput. Secur. 48, 1–18 (2015)
M. Mareli, B. Twala, An adaptive Cuckoo search algorithm for optimisation. Appl. Comput. Inf. (2017)
L. Tawalbeh, N.S. Darwazeh, R.S. AlQassas, F. AlDosari, A secure cloud computing model based on data classification. Procedia Comput. Sci. 52, 1153–1158 (2015)
F. Yahya, R.J. Walters, G.B. Wills, Protecting data in personal cloud storage with security classifications, in Science and Information Conference, IEEE (2015)
V. Tilborg, C.A. Henk, S. Jajodia, Encyclopedia of Cryptography and Security. Springer (2011)
D. Hankerson A. Menezes, S. Vanstone, Guide to Elliptic Curve Cryptography. Springer (2004)
V.G. Martínez, L.H. Encinas, A.Q. Dios, Security and practical considerations when implementing the elliptic curve integrated encryption scheme. J. Cryptologia 39(3), 244–269 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tyagi, M., Manoria, M., Mishra, B. (2019). A Framework for Data Storage Security with Efficient Computing in Cloud. In: Kamal, R., Henshaw, M., Nair, P. (eds) International Conference on Advanced Computing Networking and Informatics. Advances in Intelligent Systems and Computing, vol 870. Springer, Singapore. https://doi.org/10.1007/978-981-13-2673-8_13
Download citation
DOI: https://doi.org/10.1007/978-981-13-2673-8_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2672-1
Online ISBN: 978-981-13-2673-8
eBook Packages: EngineeringEngineering (R0)