Abstract
Cloud computing is one of the latest and encouraging solutions to the increasing demand for using and accessing the resources endowed over the internet. It has significantly emerged as a standard for deploying services, applications for both end-users and enterprises. It offers powerful processing and storage resources as on-demand services with reduced cost, increased efficiency and performance. All these features promote enterprises, critical infrastructure providers and even government projects or applications to drift towards the cloud. In recent years, for all the fast growing segments of Information Technology industry, cloud computing has grown as a promising business concept. However, issues begin to grow on cloud as vast amount of information of individuals and organizations are stored on cloud, which raise a question about cloud environment providing stability, reliability and safety. With many well provisioned, well adapted promising facilities and benefits, there are still a number of technical obstacles such as security and quality of service which hinder the proper utilization of the cloud. In this regard, a possible solution is proposed to provide high level confidentiality by preserving the data integrity. An analysis is performed for the proposed method to verify the repeatability in the encryption process in given environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cloudsim (2009). www.cloudbus.org/cloudsim/
Demystifying Cloud Computing. http://static1.1.sqspcdn.com/static/f/702523/10181434/1294788395300/201101-Hassan.pdf
Anisetti, M., Ardagna, C., Damiani, E., Gaudenzi, F.: A semi-automatic and trustworthy scheme for continuous cloud service certification. IEEE Trans. Serv. Comput. (2017)
Armbrust, M., et al.: A view on cloud computing. Commun. ACM 53(4), 50–58 (2010)
Hamdaqa, M., Tahvildari, L.: Cloud computing uncovered: a research landscape. Adv. Comput. 86, 41–85 (2012)
Kaaniche, N.: Cloud data storage security based on cryptographic mechanisms. Ph.D. dissertation, Informatique, Télécommunications et Électronique de Paris (2014)
Kwon, O., Koo, D., Shin, Y., Yoon, H.: A secure and efficient audit mechanism for dynamic shared data in cloud storage. Sci. World J. 2014, 10 (2014)
Li, R., Shen, C., He, H., Gu, X., Xu, Z., Xu, C.Z.: A lightweight secure data sharing scheme for mobile cloud computing. IEEE Trans. Cloud Comput. 6(2), 344–357 (2018)
Mell, P., Grance, T.: NIST definition of cloud computing. National Institute of Standards and Technology (2009)
More, S., Chaudhari, S.: Third party public auditing scheme for cloud storage. In: 7th International Conference on Communication, Computing and Virtualization (2016)
Srinivasan, M.K., Sarukesi, K., Rodrigues, P., Manoj, M.S., Revathy, P.: State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment. In: Proceedings of the International Conference on Advances in Computing, Communications and Informatics, pp. 470–476 (2012)
Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)
Winkler, V.J.: Securing the Cloud: Cloud Computer Security Techniques and Tactics. Syngress, Waltham (2011)
Yuan, J., Yu, S.: Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 10(8), 1717–1726 (2015)
Zargad, S.V., Tambile, A.V., Sankoli, S.S., Bhongale, R.C.: Data integrity checking protocol with data dynamics and public verifiability for secure cloud computing. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 5(3), 4062–4064 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
K. C., A., Muniyal, B. (2019). Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment. In: Thampi, S., Madria, S., Wang, G., Rawat, D., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2018. Communications in Computer and Information Science, vol 969. Springer, Singapore. https://doi.org/10.1007/978-981-13-5826-5_48
Download citation
DOI: https://doi.org/10.1007/978-981-13-5826-5_48
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5825-8
Online ISBN: 978-981-13-5826-5
eBook Packages: Computer ScienceComputer Science (R0)