Skip to main content

Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 969))

Included in the following conference series:

  • 1425 Accesses

Abstract

Cloud computing is one of the latest and encouraging solutions to the increasing demand for using and accessing the resources endowed over the internet. It has significantly emerged as a standard for deploying services, applications for both end-users and enterprises. It offers powerful processing and storage resources as on-demand services with reduced cost, increased efficiency and performance. All these features promote enterprises, critical infrastructure providers and even government projects or applications to drift towards the cloud. In recent years, for all the fast growing segments of Information Technology industry, cloud computing has grown as a promising business concept. However, issues begin to grow on cloud as vast amount of information of individuals and organizations are stored on cloud, which raise a question about cloud environment providing stability, reliability and safety. With many well provisioned, well adapted promising facilities and benefits, there are still a number of technical obstacles such as security and quality of service which hinder the proper utilization of the cloud. In this regard, a possible solution is proposed to provide high level confidentiality by preserving the data integrity. An analysis is performed for the proposed method to verify the repeatability in the encryption process in given environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cloudsim (2009). www.cloudbus.org/cloudsim/

  2. Demystifying Cloud Computing. http://static1.1.sqspcdn.com/static/f/702523/10181434/1294788395300/201101-Hassan.pdf

  3. Anisetti, M., Ardagna, C., Damiani, E., Gaudenzi, F.: A semi-automatic and trustworthy scheme for continuous cloud service certification. IEEE Trans. Serv. Comput. (2017)

    Google Scholar 

  4. Armbrust, M., et al.: A view on cloud computing. Commun. ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  5. Hamdaqa, M., Tahvildari, L.: Cloud computing uncovered: a research landscape. Adv. Comput. 86, 41–85 (2012)

    Article  Google Scholar 

  6. Kaaniche, N.: Cloud data storage security based on cryptographic mechanisms. Ph.D. dissertation, Informatique, Télécommunications et Électronique de Paris (2014)

    Google Scholar 

  7. Kwon, O., Koo, D., Shin, Y., Yoon, H.: A secure and efficient audit mechanism for dynamic shared data in cloud storage. Sci. World J. 2014, 10 (2014)

    Google Scholar 

  8. Li, R., Shen, C., He, H., Gu, X., Xu, Z., Xu, C.Z.: A lightweight secure data sharing scheme for mobile cloud computing. IEEE Trans. Cloud Comput. 6(2), 344–357 (2018)

    Article  Google Scholar 

  9. Mell, P., Grance, T.: NIST definition of cloud computing. National Institute of Standards and Technology (2009)

    Google Scholar 

  10. More, S., Chaudhari, S.: Third party public auditing scheme for cloud storage. In: 7th International Conference on Communication, Computing and Virtualization (2016)

    Google Scholar 

  11. Srinivasan, M.K., Sarukesi, K., Rodrigues, P., Manoj, M.S., Revathy, P.: State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment. In: Proceedings of the International Conference on Advances in Computing, Communications and Informatics, pp. 470–476 (2012)

    Google Scholar 

  12. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)

    Article  Google Scholar 

  13. Winkler, V.J.: Securing the Cloud: Cloud Computer Security Techniques and Tactics. Syngress, Waltham (2011)

    Google Scholar 

  14. Yuan, J., Yu, S.: Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Trans. Inf. Forensics Secur. 10(8), 1717–1726 (2015)

    Article  Google Scholar 

  15. Zargad, S.V., Tambile, A.V., Sankoli, S.S., Bhongale, R.C.: Data integrity checking protocol with data dynamics and public verifiability for secure cloud computing. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 5(3), 4062–4064 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Akshay K. C. .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

K. C., A., Muniyal, B. (2019). Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment. In: Thampi, S., Madria, S., Wang, G., Rawat, D., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2018. Communications in Computer and Information Science, vol 969. Springer, Singapore. https://doi.org/10.1007/978-981-13-5826-5_48

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5826-5_48

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5825-8

  • Online ISBN: 978-981-13-5826-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics