skip to main content
10.1145/3018896.3018954acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccConference Proceedingsconference-collections
research-article

Designing encryption and IDS for cloud security

Published: 22 March 2017 Publication History

Abstract

Usage of data is increasing exponentially with advancement of network and internet technologies. Cloud is becoming popular to save such enormous data along with facilities of using infrastructure, software and platform. Though cloud has many advantages but security is the biggest challenging factor in cloud. Cloud security includes the security in cloud client side, server side and when data is in transmission. Data is most vulnerable when data is in server as well as when data is in transmission medium. In this paper, two tier architecture of security system is proposed for cloud data. In the first tier, encryption is provided to secure data when the same is in medium. Encrypted data will be stored in server. In the second tier, Support Vector Machine based intrusion detection system is designed for cloud server to detect intruder.

References

[1]
Xiong, J., Liu, Z., Yao, J., Ma, J., Li., Q., Geng, K. and Chen, S. P. 2014. A Secure Data Self-Destructing Scheme in Cloud Computing. IEEE Transactions on Cloud Computing, 2 (4) (2014), pp. 448--458 October--December.
[2]
Jamshidi, P., Ahmad, A. and Pahl, C. 2013. Cloud Migration Research: A Systematic Review. IEEE Transactions on Cloud Computing, 1 (2) (2013), pp. 142--157 July--December
[3]
Zhang, Y., Liao, X., Jin, H. and Min., G. 2015. Resisting Skew-Accumulation for Time-Stepped Applications in the Cloud via Exploiting Parallelism. IEEE Transactions on Cloud Computing, 3 (1) (2015), pp. 54--65 January--March
[4]
Hashizume, K., Rosado, G. D., Medina, F.E. and Fernandez, B.E. 2013. An Analysis of Security Issues for Cloud Computing. Journal of Internet Services and Applications, 4 (5) (2013)
[5]
Padhy, P.R., Patra, R.M. and Satapathy, C.S. 2011. Cloud Computing: Security Issues and Research Challenges. IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), 1 (2) (2011) December.
[6]
Somani, U., Lakhani, K. and Mundra, M. 2010. Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing. 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010), 2010.
[7]
Ayoub, F., Singh, K. 2008. Cryptographic Techniques and Network Security. Communications, Radar and Signal Processing IEE Proceedings F, 131 (7) (2008) November.

Cited By

View all
  • (2024)Securing Neural Network in the Cloud: A Systematic Approach of Cloud Security Based on ANN-SVM Model2024 4th International Conference on Sustainable Expert Systems (ICSES)10.1109/ICSES63445.2024.10763230(1644-1649)Online publication date: 15-Oct-2024
  • (2021)AI and Soft Computing Techniques for Securing Cloud and Edge Computing: A Systematic Review2021 5th International Conference on Information Systems and Computer Networks (ISCON)10.1109/ISCON52037.2021.9702422(1-5)Online publication date: 22-Oct-2021
  • (2021)Machine Learning for Cloud Security: A Systematic ReviewIEEE Access10.1109/ACCESS.2021.30541299(20717-20735)Online publication date: 2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICC '17: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing
March 2017
1349 pages
ISBN:9781450347747
DOI:10.1145/3018896
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 March 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. big data
  2. cloud security
  3. encryption
  4. intrusion detection system
  5. support vector machine

Qualifiers

  • Research-article

Conference

ICC '17

Acceptance Rates

ICC '17 Paper Acceptance Rate 213 of 590 submissions, 36%;
Overall Acceptance Rate 213 of 590 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Securing Neural Network in the Cloud: A Systematic Approach of Cloud Security Based on ANN-SVM Model2024 4th International Conference on Sustainable Expert Systems (ICSES)10.1109/ICSES63445.2024.10763230(1644-1649)Online publication date: 15-Oct-2024
  • (2021)AI and Soft Computing Techniques for Securing Cloud and Edge Computing: A Systematic Review2021 5th International Conference on Information Systems and Computer Networks (ISCON)10.1109/ISCON52037.2021.9702422(1-5)Online publication date: 22-Oct-2021
  • (2021)Machine Learning for Cloud Security: A Systematic ReviewIEEE Access10.1109/ACCESS.2021.30541299(20717-20735)Online publication date: 2021
  • (2018)Security and Privacy at Cloud SystemCloud Computing for Optimization: Foundations, Applications, and Challenges10.1007/978-3-319-73676-1_9(207-234)Online publication date: 27-Feb-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media