Cloud computing has emerged as one of the most groundbreaking technologies to have redefined the bounds of conventional computing techniques. It has ushered in a paradigm shift and pushed the frontiers of how computing assets, inclusive of infrastructure resources, software, and applications can be used, adopted, and purchased. The economic benefits or rather the fundamental economic shift offered by cloud computing in reducing capital expenditure and converting it to operational expenditure has been a primary motivating factor for early adopters. However, despite its inherent advantages that include better access and control, there exist several reservations around cloud computing that have impeded its growth. The control, elasticity, and ease of use that cloud computing is associated with also engender many security issues. Security is considered to be the topmost hurdle out of the nine identified challenges of cloud computing as underlined by the study conducted by the International Data Corporation. It therefore follows that an exceedingly secure system is essential for the safeguarding of an organizational entity, its resources, and assets. In this article, it is our endeavor to offer insights into the implementation of a novel architecture that can deliver an enhanced degree of security for outsourcing information in a cloud computing environment while involving numerous independent cloud providers. The framework comprises of dual encryption and data fragmentation techniques that envision the secure distribution of information in a multicloud environment. The various concerns surrounding this area, specifically, the challenges of integrity, security, confidentiality, and authentication have been addressed. All simulations and scrutiny have been accomplished on an Oracle virtual machine Virtual‐Box and a Fog environment on an Ubuntu 16.04 platform. Extensive safety measures and performance analysis that take into account diverse parameters, especially execution time, integrity, throughput, entropy, transfer rate, and delay demonstrate that our projected proposal is vastly proficient and satisfies the security prerequisites of secure data sharing and can efficiently withstand security attacks.
Cloud computing utilizes enormous clusters of serviceable and manageable resources that can be virtually and dynamically recon gured in order to deliver optimum resource utilization by exploiting the pay-per-use model. However, concerns around security have been an impediment in the extensive adoption of the cloud computing model. In this regard, advancements in cryptography, accelerated by the wide usage of the internet worldwide, has emerged as a key area in addressing some of these security concerns. In this document, a hybrid cryptographic protocol deploying Blow sh and Paillier encryption algorithms has been presented and its strength compared with the existing hybrid Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) techniques. Algorithms for secure data storage protocol in two phases have been presented. The proposed hybrid protocol endeavors to improve the power of cloud storage through a decrease in computation time and ciphertext size. Simulations have been carried out with Oracle Virtual Box and Fog server used on an Ubuntu 16.04 platform. This grouping of asymmetric and homomorphic procedures has demonstrated enhanced security. Compression usage has helped in decreasing the storage space and computation time. Performance analysis in terms of computation overhead and quality of service parameters like loads of parameters with and without attacks, throughput, and stream length for different modes of block cipher mode has been carried out. Security analysis has been carried out by utilizing the Hardening Index as an audit parameter using Lynis 2.7.1. Similarly, for halting the aforementioned approaches and for regulating traf c, rewall protection has been generated in the chosen hybrid algorithms. Finally, enhancements in the performance of the Paillier and Blow sh hybrid scheme with and without compression
Cloud Computing is observed as the greatest paradigm change in Information technology. Data outsourcing is an inventive representation with the intention of trustworthy storage and proficient query execution to customers. Data stored on the cloud is showing great attention. However, the security issues allied with data storage over the cloud is a chief daunting cause for potential adopters. Hence the focus is to find techniques that will offer more security. Many diseases fighting organizations are working together io implement cloud as a data sharing vehicle. It is obligatory to build up innovative solutions with the intention of amalgamate diverse approaches in order to generate flexible and adaptable systems, particularly for achieving elevated levels of utilization of developed algorithms. In this document, we suggest an innovative model based on fragmentation, secret sharing and encryption for medical databases which will divide the data amongst several cloud service providers. We develop a systematic structure exploiting the sensitive nature of information and results in enhanced security level. A database for medical system is represented as Entity association and Relational model. A cloud based model is proposed to offer secure patient centric right to access PHR in a competent way. The simulation results implemented in NetBeans Java for performance evaluation of existing cryptographic techniques are shown. Our security model is evaluated using CrypTool 1.4.30 considering the entropy of algorithms. The future work includes development of a computerized system retrieving, storing and maintaining data efficiently and quickly.
Cloud Computing is observed as the greatest paradigm change in Information technology. Data outsourcing is an inventive representation with the intention of trustworthy storage and proficient query execution to customers. Data stored on the cloud is showing great attention. However, the security issues allied with data storage over the cloud is a chief daunting cause for potential adopters. Hence the focus is to find techniques that will offer more security. Many diseases fighting organizations are working together io implement cloud as a data sharing vehicle. It is obligatory to build up innovative solutions with the intention of amalgamate diverse approaches in order to generate flexible and adaptable systems, particularly for achieving elevated levels of utilization of developed algorithms. In this document, we suggest an innovative model based on fragmentation, secret sharing and encryption for medical databases which will divide the data amongst several cloud service providers. We develop a systematic structure exploiting the sensitive nature of information
The Internet of things (IoT) is an important technology that is highly beneficial in establishing smart items, connections and cities. However, there are worries regarding security and privacy vulnerabilities in IoT in which some emerge from numerous sources, including cyberattacks, unsecured networks, data, connections or communication. This paper provides an ensemble intrusion strategy based on Cyborg Intelligence (machine learning and biological intelligence) framework to boost security of IoT enabled networks utilized for network traffic of smart cities. To do this, multiple algorithms such Random Forest, Bayesian network (BN), C5.0, CART and Artificial Neural Network were investigated to determine their usefulness in identifying threats and attacks-botnets in IoT networks based on cyborg intelligence using the KDDcup99 dataset. The results reveal that the AdaBoost ensemble learning based on Cyborg Intelligence Intrusion Detection framework facilitates dissimilar network characteristics with the capacity to swiftly identify different botnet assaults efficiently. The suggested framework has obtained good accuracy, detection rate and a decreased false positive rate in comparison to other standard methodologies. The conclusion of this study would be a valuable complement to the efforts toward protecting IoT-powered networks and the accomplishment of safer smart cities.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.