skip to main content
10.1145/3341325.3342012acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

An Intelligent Cloud Data Protection Technique Based on Multi Agent System Using Advanced Cryptographic Algorithms

Authors Info & Claims
Published:01 July 2019Publication History

ABSTRACT

In last decade, cloud computing has been envisioned as the next generation architecture of Information Technology (IT). This advent motivates the data owners to outsource their complex systems from local sites to the cloud for great flexibility and economic savings. However, the protected data should to be encrypted before outsourcing. The main objective of this paper is to implement properly this approach. The solution must provide an encryption scheme such that the user may maintain some functions such as arithmetic operations, research, update requests and preserving order, i.e., the homomorphism, on the encrypted cloud data. Moreover, even if another tenant can access to the stored data, all the stored data will appear is gibberish to the unknown users. We look to propose a strong solution that combines obfuscation technique for securing user interface, hybrid encryption algorithms for securing transport, communication operations and fully homomorphic encryption approach for securing storage operations. Then, this work is a new security architecture based on multi-agent system for cloud computing communications and storage environment that considers the intelligent various security gaps as much as possible.

References

  1. Neha A Puri, Ajay R. Karare, and Rajesh C. Dharmik., "Deployment of Application on Cloud and Enhanced Data Security in Cloud Computing using ECC Algorithm", Interational Conference on Advanced Communication Control and Computing Technologies, (2014), IEEE (ICACCCT)Google ScholarGoogle Scholar
  2. J.W. Rittinghouse and J. F. Ransome, "Cloud Computing: Implementation, Management, and Security", (Chapter 6), CRC press, (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa, \Depsky: dependable and secure storage in a cloud-ofclouds," ACM Transactions on Storage (TOS), vol. 9, no. 4, p. 12, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. A. AlZain, E. Pardede, B. Soh, and J. A. Thom, \Cloud computing security: from single to multi-clouds," in System Science (HICSS), 2012 45th Hawaii International Conference on. IEEE, 2012, pp. 5490--5499. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. K. D. Bowers, A. Juels, and A. Oprea, \Hail: A high-availability and integrity layer for cloud storage," in Proceedings of the 16th ACM Conference on Computer and communications Security. ACM, 2009, pp. 187--198 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Kilian, Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. A. Melchor, P. Gaborit, and J. Herranz, \Additively homomorphic encryption with d-operand multiplications," in Annual Cryptology Conference. Springer, 2010, pp. 138{154. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Z. Brakerski et al., \Efficient fully homomorphic encryption from (standard) lwe, focs," 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Boldyreva, N. Chenette, Y. Lee, and A. Oneill, \Order-preserving symmetric encryption," in Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 2009, pp. 224--241.Google ScholarGoogle Scholar
  10. D. Liu and S. Wang, \Programmable order-preserving secure index for encrypted database query," in Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on. IEEE, 2012, pp. 502--509. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Liu, Dongxi, and Shenlu Wang. "Nonlinear order preserving index for encrypted database query in service cloud environments." Concurrency and Computation: Practice and Experience 25.13 (2013): 1967--1984.Google ScholarGoogle ScholarCross RefCross Ref
  12. Yagoub, Mohammed Amine, et al. "An adaptive and efficient fully homomorphic encryption technique." Proceedings of the 2nd International Conference on Future Networks and Distributed Systems. ACM, 2018 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Atul Kahate, "Cryptography and network security. Tata McGraw-Hill Education, (2013).Google ScholarGoogle Scholar
  14. Babitha M. P., and KR Remesh Babu., "Secure cloud storage using AES encryption." Automatic Control and Dynamic Optimization Techniques (ICACDOT), International Conference on. IEEE, (2016).Google ScholarGoogle Scholar
  15. El-etriby, Sherif, Eman M. Mohamed, and Hatem S. Abdul-kader. "Modern encryption techniques for cloud computing." ICCIT, (2012).Google ScholarGoogle Scholar
  16. Sana Belguith, Abderrazak Jemai, and Rabah Attia, "Enhancing Data Security in Cloud Computing Using a Lightweight Cryptographic Algorithm", The Eleventh International Conference on Autonomic and Autonomous Systems (ICAS), (2015).Google ScholarGoogle Scholar
  17. Thakur Jawahar, and Nagesh Kumar., "DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis." International journal of emerging technology and advanced engineering 1.2 (2011): 6--12.Google ScholarGoogle Scholar
  18. S. Jajodia, W. Litwin, and T. Schwarz, \Numerical sql value expressions over encrypted cloud databases," in International Conference on Database and Expert Systems Applications. Springer, 2015, pp. 455--478.Google ScholarGoogle Scholar
  19. T. Schwarz, \Dodrant-homomorphic encryption for cloud databases using table lookup," in Networks, Computers and Communications (ISNCC), 2017 International Symposium on. IEEE, 2017, pp. 1--6.Google ScholarGoogle Scholar
  20. D. Catalano, R. Gennaro, N. Howgrave-Graham, and P. Q. Nguyen, \Paillier's cryptosystem revisited," in Proceedings of the 8th ACM Conference on Computer and Communications Security. ACM, 2001, p. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. NIE Tingyuan and Teng Zhang., " A study of DES and Blowfish encryption algorithm". In: Tencon 2009-2009 IEEE Region 10 Conference. IEEE, (2009), p. 1--4.Google ScholarGoogle Scholar
  22. K. Govinda, and E. Sathiyamoorthy., "agent based security for cloud computing using Obfuscation technique", science direct, Procedia Engineering 38 (2012) 125--129.Google ScholarGoogle ScholarCross RefCross Ref
  23. D. Zissis and D. Lekkas. "Addressing cloud computing security issues". Future Generation Computer Systems, 28(3), (2012), pp. 583--592 Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Kevin D. Bowers, Ari Juels, and Alina Oprea. "HAIL: A high-availability and integrity layer for cloud storage." Proceedings of the 16th ACM conference on Computer and communications security. ACM, (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. V. D. Cunsolo, Distefano S., Puliafito A. and Scarpa M., "Achieving information security in network computing systems", Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC'09.), (2009), pp. 71--77. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Nilesh N. Kumbhar, Virendrasingh V. Chaudhari, and A. Badhe Mohit. "The comprehensive approach for data security in cloud computing: A survey." International Journal of Computer Applications (0975-8887) Volume (2012).Google ScholarGoogle Scholar
  27. Calheiros N. R, Ranjan. R, Beloglazov. A, De Rose. A. C. F. and Buyya. R, "CloudSim: A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms", Software: Practice and Experience (SPE), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Bellifemine, F., Poggi, A., & Rimassa, G. (1999, April). JADE-A FIPA-compliant agent framework. In Proceedings of PAAM (Vol. 99, No. 97--108, p. 33).Google ScholarGoogle Scholar
  29. Poggi, A., Rimassa, G., & Tomaiuolo, M. (2001). Multi-user and security support for multi-agent systems. In In: Proceedings of WOA 2001 (Dagli oggetti agli.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICFNDS '19: Proceedings of the 3rd International Conference on Future Networks and Distributed Systems
    July 2019
    346 pages
    ISBN:9781450371636
    DOI:10.1145/3341325

    Copyright © 2019 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 1 July 2019

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader