Data Protection Techniques for Building Trust in Cloud Computing

  title={Data Protection Techniques for Building Trust in Cloud Computing},
  author={Muhammad Yousaf Saeed and Murad Khan},
  journal={International Journal of Modern Education and Computer Science},
  • M. Y. Saeed, Murad Khan
  • Published 8 August 2015
  • Computer Science
  • International Journal of Modern Education and Computer Science
Cloud computing has played much important role in comparison to other fields of IT, in providing Data storage, Data security, Quality of Services (QoS) etc. In the last few years, it had emerged and evolved so quickly due to its number of facilities and advantages to the organizations and end users. Many data security factors have also increased due to this fast evolution of cloud in the IT industry. Therefore several security models and trust establishing techniques have been deployed and are… 

Tables from this paper

Secure data integration systems

This research proposes a novel framework, called SecureDIS, to mitigate data leakage threats in Data Integration Systems (DIS), and helps software engineers to lessenData leakage threats during the early phases of DIS development.

Cloud Computing Security Services to Mitigate DDoS Attacks

This chapter endorses the best practices in successfully deploying a secure private cloud infrastructure with security measures and mitigation and proposed a unique three-tier infrastructure design to mitigate distributed denial of service attacks on cloud infrastructures.

Cloud-Based Business Process Security Risk Management: A Systematic Review, Taxonomy, and Future Directions

This study presented an exhaustive review of the current state-of-the-art methodology for managing cloud-based business process security risk, and found that security risk management, usage of existing securityrisk management techniques, and security risk standards should be integrated with business process phases to protect against security issues in cloud services.

Enhanced Ranking Based Cloud Searching with Improved Metadata Storage: A Case Study for Relevancy of Files

In this proposed work further enhancements are done to reduce storage space for encrypted metadata using Porter Stemming method and improvements in retrieval time are also done by using Boyer Moore’s searching algorithm.

A Risk-Aware Application Scheduling Model in Cloud Computing Scenarios

A riskaware scheduling model is proposed, using risk analysis to allocate the applications to the virtual machines, so that, the expected total pay-off of an application is maximized, by taking into account of the priority of applications.

Ad-Hoc Data Processing and Its Relation with Cloud Computing Process Using Functional Approach

Comparing the performance of two on-demand routing protocols for mobile ad hoc networks – Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector (AODV) is compared.

Estudio y análisis de estrategias de seguridad para cloud computing híbrido

This dissertation aims to provide a history of Informática y Cereceto y Meglioli de F.F.C.E. y N.N.S.J.

An Analysis for Security Issues and their Solutions in Cloud Computing

Main security issues of cloud computing such as reliability, correctness of data, sharing of personal and sensitive information, unauthorized access of data), misbehavior or insider attacks and storage security are addressed.



Centralized Database Security in Cloud

A RSA Key Exchange Protocol between cloud service provider and the user for secretly sharing a symmetric key for the secure data access that solves the problem of key distribution and management is proposed.

Enhanced data security model for cloud computing

This paper presents the data security model of cloud computing based on the study of the cloud architecture, and implements software to enhance work in a dataSecurity model for cloud computing.

MCDB: Using Multi-clouds to Ensure Security in Cloud Computing

  • M. AlzainB. SohE. Pardede
  • Computer Science
    2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing
  • 2011
A Multi-clouds Database Model (MCDB) which is based on Multi- clouds service providers instead of using single cloud service provider such as in Amazon cloud service is proposed.

Data Security over Cloud

A Diffie-Hellman key exchange protocol between cloud service provider and the user for secretly sharing a symmetric key for secure data access that solves the problem of key distribution and management is proposed.

Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation

  • A. Behl
  • Computer Science
    2011 World Congress on Information and Communication Technologies
  • 2011
The security issues related to the cloud are explored, some key research challenges of implementing new cloud-aware security solutions that can provide the likes of pre-emptive protection for complex and ever dynamic Cloud infrastructure are explored and a security strategy is formulated to enable the Cloud providers and customers alike to fight against ever emerging security threats.

A privacy preserving repository for securing data across the cloud

This paper aims at simultaneously achieving data confidentiality while still keeping the harmonizing relations intact in the cloud by constructing a privacy preserving repository that enables the data owner to delegate most of computation intensive tasks to cloud servers without disclosing data contents or user access privilege information.


This paper suggests a technique to enhance the security of cloud database that uses RSA, Triple DES and Random Number generator algorithms as an encrypting tool and provides the flexible multilevel and hybrid security.

A Review of Trust Aspects in Cloud Computing Security

A critical analysis of the trust models along with some gaps in the existing models is reported and some security services practices like authentication, confidentiality and integrity as well as the trust management are looked at.

Implementing Trust in Cloud Infrastructures

This work presents a system that enables periodical and necessity-driven integrity measurements and remote attestations of vital parts of cloud computing infrastructures and shows how this system attests the integrity of a cloud infrastructure and detects all changes performed by system administrators in a typical software configuration, even in the presence of a simulated denial-of-service attack.