A Security Framework for Cloud Data Storage(CDS) Based on Agent

  title={A Security Framework for Cloud Data Storage(CDS) Based on Agent},
  author={Oussama Arki and Abdelhafid Zitouni},
The Cloud has become a new Information Technology(IT) model for delivering resources such as computing and storage to customers on demand, it provides both high flexibility and resources use. However we are gaining these advantages at the cost of high security threats, which presents the major brake for the migration towards Cloud Computing. Cloud Data Storage(CDS) is one of the Cloud services, it allows users to store their data in the Cloud, this service is very useful for companies and… Expand
Secure Framework Enhancing AES Algorithm in Cloud Computing
This research presents a framework with key features including enhanced security and owner’s data privacy, which involves less power consumption, better load balancing, and enhanced trust and resource management on the network. Expand
Custom-Aes: A Novel Framework To Enhance Data Security In Cloud Environment
The exponential growth in clouds’ computing has an affinity to an all-encompassing computing skill naturally overstretching the already strained client logistics. With all pervading security threatsExpand
Intelligent Multi-Agent Collaboration Model for Smart Home IoT Security
This paper presents a new approach towards securing smart home networks through multi-agent collaboration that uses Beliefs, Desires, and Intentions (BDI) architecture for intelligent agent decision making, as well as a multi- agent collaboration model for achieving mutual security goals within the smart home network. Expand


Agent based framework for providing security to data storage in cloud
  • M. Islam, M. Habiba
  • Computer Science
  • 2012 15th International Conference on Computer and Information Technology (ICCIT)
  • 2012
The performance with respect to overhead for different security services such as confidentiality, integrity and authenticity showed that data classification according to different level of security enhances the performance of the system that provides security services to the data in cloud. Expand
A framework of multi-agent system to facilitate security of cloud data storage
This paper considers components of MAS framework, implementing a simulation framework by using JAVA and performing an input analysis of the data and an output analysis ofthe simulation results, and proposes MAS framework. Expand
A cloud security framework based on trust model and mobile agent
This model aims to protect user's sensitive information from other internal or external users and hackers and can detect policy breaches, where the users are notified in order to take necessary actions when malicious access or malicious activity would occur. Expand
A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security
This research aims towards proposing a new trusted and collaborative agent-based two-tier framework, titled WAY (Who Are You?), to protect cloud resources and ensure security and privacy both at the service provider level as well as at the user level in a cloud environment. Expand
Security Agents: A Mobile Agent Based Trust Model for Cloud Computing
A trust model for cloud architecture is proposed which uses mobile agent as security agents to acquire useful information from the virtual machine which the user and service provider can utilize to keep track of privacy of their data and virtual machines. Expand
The architecture is based on mobile agents that have kept the goal of security communication in cloud computing, and is relying on the ability of security of agents. Expand
Security for Cloud Storage Systems
  • Kan Yang, X. Jia
  • Computer Science
  • SpringerBriefs in Computer Science
  • 2014
To solve the attribute revocation problem, new Revocable CP-ABE methods are proposed in both ABAC and DAC-MACS, which can support dynamic auditing and batch auditing. Expand
This paper classified cloud security based on the three service models of cloud computing SaaS, PaaS and IaaS; attributes for each type of security has been identified and briefly described here. Expand
A Survey on Data Integrity Techniques in Cloud Computing
This paper will focus on some of the integrity proving techniques in detail along with their limitations and how to overcome data integrity problem under different systems and security models. Expand
Ensuring the data integrity in cloud data storage
  • Wenjun Luo, Guojing Bai
  • Computer Science
  • 2011 IEEE International Conference on Cloud Computing and Intelligence Systems
  • 2011
This paper proposes a remote data integrity checking protocol based on HLAs and RSA signature with the support public verifiability, which makes the protocol very flexible, since the user can commission the data possession to check the TPA. Expand