Enhance Data Security and Privacy in Cloud

Author(s):  
Hicham Amellal ◽  
Abdelmajid Meslouhi ◽  
Abderahim El Allati ◽  
Annas El Haddadi

With the advancement of communication and information technology, the internet has become used as a platform for computing and not only a way of communications networks. Accordingly, the large spread of cloud computing led to the emergence of different privacy implications and data security complexities. In order to enhance data security in the cloud, the authors propose in this chapter the use of an encryption box, which includes different cryptosystems. In fact, this step gives the user the opportunities to encrypt data with an unknown algorithm and makes a private key before the storage of data in the host company servers. Moreover, to manage the encryption database, the authors propose a quantum approach in search based on Grover's algorithm.

Integration of Cloud Computing and Wireless Sensor Network led tremendous growth in the development of Information Technology, during the trust and reputation of service providers for information technology play an essential role. Cloud computing is web-based computing was in the services based on the internet such as data, storage, and computing resources are delivered to the local devices through the internet. Wireless sensor network deals with monitoring, gathering of the information about the physical or environmental conditions. The integration of these two domains has tremendous advantages to improve the business infrastructure and performance worldwide. The security of data on the cloud and calculation of trust and reputation of the Cloud Service Provides (CSP) and Sensor Network Providers (SNP) are the issues for this new paradigm. To fulfill these issues This paper presents novel techniques, for 1) trust and reputation calculation 2) data security on cloud 3) choosing desirable CSP and SNP for the service. This paper proposes Data Security by taking into account the services of Wireless Sensor Network (WSN) and Cloud Service Providers. Our experimental results help users to choose the best service providers in case of both Cloud and Wireless Sensor Network. In addition to that, data security is provided using a data encryption algorithm.


Author(s):  
Eter Basar ◽  
Ankur Pan Saikia ◽  
L. P. Saikia

Data Technology industry has been utilizing the customary social databases for around 40 years. Be that as it may, in the latest years, there was a generous transformation in the IT business as far as business applications. Remain solitary applications have been supplanted with electronic applications, conferred servers with different proper servers and committed stockpiling with framework stockpiling. Lower expense, adaptability, the model of pay-as-you-go are the fundamental reasons, which caused the conveyed processing are transformed into reality. This is a standout amongst the hugest upsets in Information Technology, after the development of the Internet. Cloud databases, Big Table, Sherpa, and SimpleDB are getting the opportunity to be more natural to groups. They featured the hindrances of current social databases as far as convenience, adaptability, and provisioning. Cloud databases are basically utilized for data raised applications, for example, stockpiling and mining of gigantic information or business information. These applications are adaptable and multipurpose in nature. Various esteem based data organization applications, such as managing an account, online reservation, e-exchange and stock organization, and so on are delivered. Databases with the help of these sorts of uses need to incorporate four essential highlights: Atomicity, Consistency, Isolation, and Durability (ACID), in spite of the fact that utilizing these databases isn't basic for utilizing as a part of the cloud. The objective of this paper is to discover the points of interest and disservices of databases generally utilized in cloud frameworks and to survey the difficulties in creating cloud databases


2014 ◽  
Vol 10 (7) ◽  
pp. 190903 ◽  
Author(s):  
Yunchuan Sun ◽  
Junsheng Zhang ◽  
Yongping Xiong ◽  
Guangyu Zhu

2015 ◽  
pp. 782-807
Author(s):  
Yushi Shen ◽  
Yale Li ◽  
Ling Wu ◽  
Shaofeng Liu ◽  
Qian Wen

Cloud-era Information Technology (IT) contains three main themes: The information hub (cloud), network communications (pipes), and intelligent terminals. In this chapter, the developmental stages of these three main components of cloud computing are discussed, with emphasis on future development. The Internet of things is also examined, which is expected to thrive as a direct result of the development of cloud computing.


2012 ◽  
pp. 1609-1620
Author(s):  
Anette Weisbecker

Cloud Computing has become the predominant paradigm in information technology for the use of distributed resources. It enables the Internet of Services where different provider offer services and compose services to new value added services. For the emerging service value chains the quality the services plays an important role. Therefore, beside software engineering methods aspects like quality of services, business models, and the interaction with the customer have to be considered during the development of cloud services. This chapter describes how these aspects can be integrated in the development process by combining software and service engineering methods and considering quality as a critical success factor in the design time.


Author(s):  
N. Raghavendra Rao

Information technology has advanced by delivering an exponential increase in computing power. Telecommunication technology has likewise advanced communicating capabilities. Convergence of these two technologies has become possible due to the rapid advancements made in the respective technology. This convergence is termed as information and communication technology as a discipline. Many concepts are emerging in this discipline. These concepts enable business, government, and human beings to reach new realities in their required activities. Some of these concepts have created various opportunities for designing and manufacturing electronic devices. When these devices are connected to other devices and systems over the internet, this is now known as internet of things (IoT). This chapter gives a brief overview of the concepts such as cloud computing and ubiquitous and pervasive computing in the context of internet of things. Further, this chapter discusses five case illustrations with the relevance of internet of things.


2015 ◽  
pp. 1370-1414
Author(s):  
Jaydip Sen

Cloud computing transforms the way Information Technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand (Leighton, 2009). According to Gartner, while the hype grew exponentially during 2008 and continued since, it is clear that there is a major shift towards the cloud computing model and that the benefits may be substantial (Gartner Hype-Cycle, 2012). However, as the shape of cloud computing is emerging and developing rapidly both conceptually and in reality, the legal/contractual, economic, service quality, interoperability, security, and privacy issues still pose significant challenges. In this chapter, the authors describe various service and deployment models of cloud computing and identify major challenges. In particular, they discuss three critical challenges: regulatory, security, and privacy issues in cloud computing. Some solutions to mitigate these challenges are also proposed along with a brief presentation on the future trends in cloud computing deployment.


Sign in / Sign up

Export Citation Format

Share Document