Abstract
Nowadays companies are increasingly adopting the technology of cloud computing. This technology is subject to a lot of research and continuous advances are made. The use of cloud computing in the companies advantages such as: reducing costs, sharing and exchange of information between institutions, but the data in the Cloud computing are susceptible to be compromised and the companies are exposing to see their data loss. In this study, we address the subject of security in cloud computing; we expose and discuss some researches that had been proposed to secure the data stored in the cloud. And then we will present our new frameworks that ensure confidentiality of data storage in the cloud environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Nithiavathy, R.: Data integrity and data dynamics with secure storage service in cloud. In: Proceedings of the International Conference on Pattern Recognition, Informatics and Mobile Engineering, pp. 125–131. IEEE (2015)
Clement, T.: The security in the cloud computing, presented in CQSI, October 2012
Nithiavathy, R.: Data integrity and data dynamics with secure storage service in cloud. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME). IEEE (2013)
Alzain, M.A, Pardede, E.: Protection of data and cloud computing Europe (2011)
Kumbhare, A., Simmhan, P., Prasanna, V.: Cryptonite: a secure and performant data repository on public clouds. In: IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 510–519. IEEE (2016)
Huang, H., Liu, K.: Efficient key management for preserving HIPAA regulations. J. Syst. Softw. 84, 113–119 (2015)
Gupta, A., Verma, A., Kalra, P., Kumar, L.: Big data: a security compliance model. In: IT in Business, Industry and Government (CSIBIG), pp. 1–5, Indore (2014)
Cigref, cloud computing and protection of data, network companies enterprises (2015)
Idrissi, H.K., Kartit, A., El Marraki, M.: A taxonomy and survey of cloud computing, presented at the Security Days (JNS3), pp. 1–5(2013)
Merkle, Ralph C.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, New York (1990). doi:10.1007/0-387-34805-0_21
Benslimane, D., Barhamgi, M., Cuppens, F.: PAIRSE: a privacy- preserving service- oriented data integration system. SIGMOD Record 42(3) (2013)
Heffetz, O., Ligett, K.: Privacy and data-based research. No. w19433. National Bureau of Economic Research (2013)
Deyan, D.C., Zhao, H.: Data security and privacy protection issues in CC. In: IEEE International Conference on Computer Science and Electronics Engineering (ICCSEE) (2015)
Petit, A., Ben Mokhtar, L.B., Kosch, H.: Towards Efficient and Accurate Privacy Pre-serving Web Search. In: MW4NG 2014, December 8–12, Bordeaux, France (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Leila, B., Abdelhafid, Z., Mahieddine, D. (2017). New Framework Model to Secure Cloud Data Storage. In: Silhavy, R., Silhavy, P., Prokopova, Z., Senkerik, R., Kominkova Oplatkova, Z. (eds) Software Engineering Trends and Techniques in Intelligent Systems. CSOC 2017. Advances in Intelligent Systems and Computing, vol 575. Springer, Cham. https://doi.org/10.1007/978-3-319-57141-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-57141-6_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57140-9
Online ISBN: 978-3-319-57141-6
eBook Packages: EngineeringEngineering (R0)