"Security-as-a-Service" for Files in Cloud Computing - A Novel Application Model

被引:0
|
作者
Mahalakshmi, J. [1 ]
Kuppusamy, K. [1 ]
机构
[1] Alagappa Univ, Dept Comp Sci & Engn, Karaikkudi, Tamil Nadu, India
关键词
Seurity-as-a-Service; Sensitive data; Encryption; Decryption; Block ciphers;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing gains more popularity in current era, as it offers on-demand services. Numerous services are delivering upon the user request to make their process easier and more rapidly. It is necessary to secure the services which contain huge volume of data, while centralizing into cloud data centers for outsourcing. Challenge or the issue of each cloud service application lies in the confidentiality, availability and scalability in the data centers. In this paper, a new Security-as-a-Service based application model is proposed that offers encryption as a service to its consigners for assorted type of files. The proposed innovative application in public cloud model serves better to encrypt files consists of sensitive data and the result demonstrates efficiency of the application. Security analysis is performed for the proposed encryption algorithm that resist against various cryptanalytic attacks Comparative Analysis shows evidence of the efficacy of proposed pioneering application model.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A SECURITY-AS-A-SERVICE SOLUTION FOR APPLICATIONS IN CLOUD COMPUTING ENVIRONMENT
    Chen, Wen
    Sharieh, Salah
    Blainey, Bob
    [J]. COMMUNICATIONS AND NETWORKING SYMPOSIUM (CNS 2018), 2018,
  • [2] A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing
    Chase, Jonathan
    Niyato, Dusit
    Wang, Ping
    Chaisiri, Sivadon
    Ko, Ryan K. L.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 565 - 579
  • [3] Security-as-a-Service in Multi-cloud and Federated Cloud Environments
    Pawar, Pramod S.
    Sajjad, Ali
    Dimitrakos, Theo
    Chadwick, David W.
    [J]. TRUST MANAGEMENT IX, 2015, 454 : 251 - 261
  • [4] Implementing Intrusion Management as Security-as-a-Service from Cloud
    Sharma, Deepak H.
    Dhote, C. A.
    Potey, Manish M.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 363 - 366
  • [5] Security-as-a-Service for Microservices-Based Cloud Applications
    Sun, Yuqiong
    Nanda, Susanta
    Jaeger, Trent
    [J]. 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2015, : 50 - 57
  • [6] Implementing Anti-Malware as Security-as-a-Service from Cloud
    Sharma, Deepak H.
    Dhote, C. A.
    Potey, Manish M.
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 533 - 539
  • [7] Leveraging Cloud Native Design Patterns for Security-as-a-Service Applications
    Torkura, Kennedy A.
    Sukmana, Muhammad I. H.
    Cheng, Feng
    Meinel, Christoph
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2017, : 90 - 97
  • [8] A Novel Approach to Cloud Computing: Infrastructure as a Service Security
    Jain, Sarika
    Tyagi, Prachi
    Kalra, Siddharth
    [J]. 2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 501 - 504
  • [9] Security as a Service Model for Virtualization Vulnerabilities in Cloud Computing
    Paikrao, Rahul L.
    Patil, Varsha H.
    [J]. 2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 559 - 562
  • [10] Research on the security mechanism of cloud computing service model
    Zhang Y.
    [J]. Automatic Control and Computer Sciences, 2016, 50 (2) : 98 - 106