ABSTRACT
In last decade, cloud computing has been envisioned as the next generation architecture of Information Technology (IT). This advent motivates the data owners to outsource their complex systems from local sites to the cloud for great flexibility and economic savings. However, the protected data should to be encrypted before outsourcing. The main objective of this paper is to implement properly this approach. The solution must provide an encryption scheme such that the user may maintain some functions such as arithmetic operations, research, update requests and preserving order, i.e., the homomorphism, on the encrypted cloud data. Moreover, even if another tenant can access to the stored data, all the stored data will appear is gibberish to the unknown users. We look to propose a strong solution that combines obfuscation technique for securing user interface, hybrid encryption algorithms for securing transport, communication operations and fully homomorphic encryption approach for securing storage operations. Then, this work is a new security architecture based on multi-agent system for cloud computing communications and storage environment that considers the intelligent various security gaps as much as possible.
- Neha A Puri, Ajay R. Karare, and Rajesh C. Dharmik., "Deployment of Application on Cloud and Enhanced Data Security in Cloud Computing using ECC Algorithm", Interational Conference on Advanced Communication Control and Computing Technologies, (2014), IEEE (ICACCCT)Google Scholar
- J.W. Rittinghouse and J. F. Ransome, "Cloud Computing: Implementation, Management, and Security", (Chapter 6), CRC press, (2009). Google ScholarDigital Library
- A. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa, \Depsky: dependable and secure storage in a cloud-ofclouds," ACM Transactions on Storage (TOS), vol. 9, no. 4, p. 12, 2013. Google ScholarDigital Library
- M. A. AlZain, E. Pardede, B. Soh, and J. A. Thom, \Cloud computing security: from single to multi-clouds," in System Science (HICSS), 2012 45th Hawaii International Conference on. IEEE, 2012, pp. 5490--5499. Google ScholarDigital Library
- K. D. Bowers, A. Juels, and A. Oprea, \Hail: A high-availability and integrity layer for cloud storage," in Proceedings of the 16th ACM Conference on Computer and communications Security. ACM, 2009, pp. 187--198 Google ScholarDigital Library
- J. Kilian, Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10--12. Google ScholarDigital Library
- C. A. Melchor, P. Gaborit, and J. Herranz, \Additively homomorphic encryption with d-operand multiplications," in Annual Cryptology Conference. Springer, 2010, pp. 138{154. Google ScholarDigital Library
- Z. Brakerski et al., \Efficient fully homomorphic encryption from (standard) lwe, focs," 2011. Google ScholarDigital Library
- A. Boldyreva, N. Chenette, Y. Lee, and A. Oneill, \Order-preserving symmetric encryption," in Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 2009, pp. 224--241.Google Scholar
- D. Liu and S. Wang, \Programmable order-preserving secure index for encrypted database query," in Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on. IEEE, 2012, pp. 502--509. Google ScholarDigital Library
- Liu, Dongxi, and Shenlu Wang. "Nonlinear order preserving index for encrypted database query in service cloud environments." Concurrency and Computation: Practice and Experience 25.13 (2013): 1967--1984.Google ScholarCross Ref
- Yagoub, Mohammed Amine, et al. "An adaptive and efficient fully homomorphic encryption technique." Proceedings of the 2nd International Conference on Future Networks and Distributed Systems. ACM, 2018 Google ScholarDigital Library
- Atul Kahate, "Cryptography and network security. Tata McGraw-Hill Education, (2013).Google Scholar
- Babitha M. P., and KR Remesh Babu., "Secure cloud storage using AES encryption." Automatic Control and Dynamic Optimization Techniques (ICACDOT), International Conference on. IEEE, (2016).Google Scholar
- El-etriby, Sherif, Eman M. Mohamed, and Hatem S. Abdul-kader. "Modern encryption techniques for cloud computing." ICCIT, (2012).Google Scholar
- Sana Belguith, Abderrazak Jemai, and Rabah Attia, "Enhancing Data Security in Cloud Computing Using a Lightweight Cryptographic Algorithm", The Eleventh International Conference on Autonomic and Autonomous Systems (ICAS), (2015).Google Scholar
- Thakur Jawahar, and Nagesh Kumar., "DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis." International journal of emerging technology and advanced engineering 1.2 (2011): 6--12.Google Scholar
- S. Jajodia, W. Litwin, and T. Schwarz, \Numerical sql value expressions over encrypted cloud databases," in International Conference on Database and Expert Systems Applications. Springer, 2015, pp. 455--478.Google Scholar
- T. Schwarz, \Dodrant-homomorphic encryption for cloud databases using table lookup," in Networks, Computers and Communications (ISNCC), 2017 International Symposium on. IEEE, 2017, pp. 1--6.Google Scholar
- D. Catalano, R. Gennaro, N. Howgrave-Graham, and P. Q. Nguyen, \Paillier's cryptosystem revisited," in Proceedings of the 8th ACM Conference on Computer and Communications Security. ACM, 2001, p. Google ScholarDigital Library
- NIE Tingyuan and Teng Zhang., " A study of DES and Blowfish encryption algorithm". In: Tencon 2009-2009 IEEE Region 10 Conference. IEEE, (2009), p. 1--4.Google Scholar
- K. Govinda, and E. Sathiyamoorthy., "agent based security for cloud computing using Obfuscation technique", science direct, Procedia Engineering 38 (2012) 125--129.Google ScholarCross Ref
- D. Zissis and D. Lekkas. "Addressing cloud computing security issues". Future Generation Computer Systems, 28(3), (2012), pp. 583--592 Google ScholarDigital Library
- Kevin D. Bowers, Ari Juels, and Alina Oprea. "HAIL: A high-availability and integrity layer for cloud storage." Proceedings of the 16th ACM conference on Computer and communications security. ACM, (2009). Google ScholarDigital Library
- V. D. Cunsolo, Distefano S., Puliafito A. and Scarpa M., "Achieving information security in network computing systems", Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC'09.), (2009), pp. 71--77. Google ScholarDigital Library
- Nilesh N. Kumbhar, Virendrasingh V. Chaudhari, and A. Badhe Mohit. "The comprehensive approach for data security in cloud computing: A survey." International Journal of Computer Applications (0975-8887) Volume (2012).Google Scholar
- Calheiros N. R, Ranjan. R, Beloglazov. A, De Rose. A. C. F. and Buyya. R, "CloudSim: A Toolkit for Modeling and Simulation of Cloud Computing Environments and Evaluation of Resource Provisioning Algorithms", Software: Practice and Experience (SPE), 2011. Google ScholarDigital Library
- Bellifemine, F., Poggi, A., & Rimassa, G. (1999, April). JADE-A FIPA-compliant agent framework. In Proceedings of PAAM (Vol. 99, No. 97--108, p. 33).Google Scholar
- Poggi, A., Rimassa, G., & Tomaiuolo, M. (2001). Multi-user and security support for multi-agent systems. In In: Proceedings of WOA 2001 (Dagli oggetti agli.Google Scholar
Recommendations
Protecting data confidentiality in cloud systems
Internetware '12: Proceedings of the Fourth Asia-Pacific Symposium on InternetwareTo achieve a trustworthy cloud data service, there is a need to both provide the right services from a security engineering perspective, as well as to allows specific types of computations to be carried out on encrypted cloud data. However, traditional ...
A multi-agent system approach based on cryptographic algorithm for securing communications and protecting stored data in the cloud-computing environment
The cloud computing has been envisioned as the next generation architecture of information technology enterprise. The Internet is indispensable in present days to provide and maintain the data. Such applications can be used by the end-user via the cloud ...
Chosen-Ciphertext Secure Multi-identity and Multi-attribute Pure FHE
Cryptology and Network SecurityAbstractA multi-identity pure fully homomorphic encryption (MIFHE) enables a server to perform arbitrary computation on the ciphertexts that are encrypted under different identities. In case of multi-attribute pureFHE (MAFHE), the ciphertexts are ...
Comments