skip to main content
10.1145/3167020.3167037acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmedesConference Proceedingsconference-collections
research-article

Alteration Agent for Cloud Data Security

Published: 07 November 2017 Publication History

Abstract

In the big data era, the cloud computing services have been adopted to face the emergence of data that needs to be stored and processed properly. However, these services need to provide safety mechanisms to insure its secure adoption. Thus, several solutions have been proposed including the use of secure architectures by customers. In that context, an architecture based on multi-agent systems has been proposed which aims to secure both storage and exploration of data hosted in the Cloud. In this paper, we present a brief synthesis of data security methods. We then focus on the multi-agent system architecture. Finally, we propose our solution considering the design and implementation in Java of an alteration agent which will ensure the secure storage of data stored in the Cloud. We finally present the test results of this agent on real datasets.

References

[1]
M. Agarwal. 2013. Text steganographic approaches: A comparison. International Journal of Network Security and Its Applications (IJNSA) 5 (January 2013).
[2]
Indradip Banerjee, Souvik Bhattacharyya, and Gautam Sanyal. 2011. Novel Text Steganography through Special Code Generation. (2011), 298--303.
[3]
Yves Demazeau. 1995. From Interactions To Collective Behaviour In Agent-Based Systems. (1995), 117--132.
[4]
Jacques Ferber. 1995. Les systemes multi-agents: vers une intelligence collective. (1995).
[5]
Nelson Gonzalez, Charles Miers, Fernando Redigolo, Marcos Simplicio, Tereza Carvalho, Mats NÃd'slund, and Makan Pourzandi. 2012. A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications (July 2012), 1--11.
[6]
Zunera Jalil and Anwar M. Mirza. 2009. A Review of Digital Watermarking Techniques for Text Documents. (2009), 230--234.
[7]
Young-Won Kim, Kyung-Ae Moon, and Il-Seok Oh. 2003. A text watermarking algorithm based on word classification and inter-word space statistics. (2003), 775--779.
[8]
Abhishek Koluguri, Sheikh Gous, and Dr. P. Bhaskara Reddy. 2014. Text Steganography Methods and its Tools. International Journal of Advanced Scientific and Technical Research 2 (March-April 2014), 888--902.
[9]
A. Nadeem and M.Y. Javed. 2005. A Performance Comparison of Data Encryption Algorithms. (2005), 84--89.
[10]
Nikita Pandey, Sayani Nandy, and Shelly Sinha Choudhury. 2012. Text steganographic approaches: A comparison. International Journal of Scientific and Research Publications 2, 10 (October 2012).
[11]
Neha Rawat, Ratnesh Srivastava, Binay Kumar Pandey, Poonam Rawat, Shikha Singh, and Awantika Sharma. 2014. Data Security Issues in Cloud Computing. Open Journal of Mobile Computing and Cloud Computing 1 (2014), 9--17.
[12]
Sara Rhazlane, Hassan Badir, Nouria Harbi, and Nadia Kabachi. 2016. Intelligent multi agent system based solution for data protection in the cloud. (2016), 111--122.
[13]
Sara Rhazlane, Amina El Ouazzani, Nouria Harbi, Nadia Kabachi, and Hassan Badir. 2017. Data Alteration: A Better Approach to Securing Cloud Data with Encryption. (2017), 111--122.
[14]
Vidhya Saraswathi and Mrs. Sumathy Kingslin. 2014. Different Approaches to Text Steganography: A Comparison. International Journal of Emerging Research in Management and Technology 3, 11 (November 2014).
[15]
Mohammad Shirali-Shahreza. 2008. Text Steganography by Changing Words Spelling. (2008).
[16]
Simar Preet Singh and Raman Maini. 2011. Comparison of Data Encryption Algorithms. International Journal of Computer Science and Communication 2, 1 (January-June 2011).
[17]
A. M. Talib, R. Atan, R. Abdullah, and Masrah Azrifah Azmi Murad. 2012. Security framework of cloud data storage based on Multi Agent system architecture - A pilot study. International Conference. (2012), 54--59.
[18]
Elzbieta Zielinska, Wojciech Mazurczyk, and Krzysztof Szczypiorski. 2014. Trends in Steganography. (2014), 86--95.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MEDES '17: Proceedings of the 9th International Conference on Management of Digital EcoSystems
November 2017
299 pages
ISBN:9781450348959
DOI:10.1145/3167020
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 November 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Alteration
  2. Cloud
  3. Multi agent systems
  4. Security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

MEDES '17

Acceptance Rates

MEDES '17 Paper Acceptance Rate 41 of 65 submissions, 63%;
Overall Acceptance Rate 267 of 682 submissions, 39%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 78
    Total Downloads
  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media